Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
PROD_Start_DriverPack.hta
|
HTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\MSIMGSIZ.DAT
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\matomo[1].htm
|
ASCII text, with no line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\client_ip[1].js
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\missing-scripts-detector[1].js
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\step1_av[1].htm
|
HTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\style[1].css
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\1[1].js
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\2[1].js
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\3[1].js
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\4[1].js
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\5[1].js
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\background[1].jpg
|
JPEG image data, JFIF standard 1.01, resolution (DPI), density 72x72, segment length 16, baseline, precision 8, 1400x700,
components 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\lang[1].js
|
HTML document, Unicode text, UTF-8 (with BOM) text, with very long lines (399), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\matomo[1].htm
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\script[1].js
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\statistics[1].js
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
There are 7 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\SysWOW64\mshta.exe
|
mshta.exe "C:\Users\user\Desktop\PROD_Start_DriverPack.hta"
|
||
C:\Windows\System32\wbem\WmiPrvSE.exe
|
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://dwrapper-prod.herokuapp.com/bin/src/missing-scripts-detector.js
|
46.137.15.86
|
||
http://dwrapper-prod.herokuapp.com/bin/src/variables/5.js
|
46.137.15.86
|
||
http://dwrapper-prod.herokuapp.com/bin/src/script.js
|
46.137.15.86
|
||
http://dwrapper-prod.herokuapp.com/bin/src/statistics.js
|
46.137.15.86
|
||
http://dwrapper-prod.herokuapp.com/bin/src/style.css
|
46.137.15.86
|
||
http://dwrapper-prod.herokuapp.com/client_ip.js
|
46.137.15.86
|
||
http://dwrapper-prod.herokuapp.com/bin/src/lang.js
|
46.137.15.86
|
||
http://dwrapper-prod.herokuapp.com/bin/src/variables/3.js
|
46.137.15.86
|
||
http://dwrapper-prod.herokuapp.com/bin/step1_av.html
|
46.137.15.86
|
||
http://dwrapper-prod.herokuapp.com/bin/src/variables/4.js
|
46.137.15.86
|
||
http://dwrapper-prod.herokuapp.com/bin/src/variables/1.js
|
46.137.15.86
|
||
http://dwrapper-prod.herokuapp.com/bin/src/variables/2.js
|
46.137.15.86
|
||
http://dwrapper-prod.herokuapp.com/bin/img/background.jpg
|
46.137.15.86
|
||
http://exampledd.matomo.cloud/F
|
unknown
|
||
http://dwrapper-prod.herokuapp.com/bin/src/lang.js(
|
unknown
|
||
http://dwrapper-prod.herokuapp.com/bin/step1_av.htmlHKLM
|
unknown
|
||
http://dwrapper-prod.herokuapp.com/bin/src/variables/4.js_
|
unknown
|
||
http://dwrapper-prod.herokuapp.com/bin/src/script.js8B
|
unknown
|
||
http://dwrapper-prod.herokuapp.com/bin/src/variables/3.jsI4
|
unknown
|
||
http://dwrapper-prod.herokuapp.com/bin/step1_av.htmlC:
|
unknown
|
||
http://dwrapper-prod.herokuapp.com/bin/src/statistics.jsate
|
unknown
|
||
http://dwrapper-prod.herokuapp.com/bin/src/variables/2.js;
|
unknown
|
||
http://dwrapper-prod.herokuapp.com/bin/src/variables/3.jsenu
|
unknown
|
||
http://exampledd.matomo.cloud/
|
unknown
|
||
http://dwrapper-prod.herokuapp.com/bin/step1_av.htmll)B
|
unknown
|
||
http://dwrapper-prod.herokuapp.com/bin/src/variables/2.jsu
|
unknown
|
||
http://dwrapper-prod.herokuapp.com/bin/src/variables/4.jsI
|
unknown
|
||
http://dwrapper-prod.herokuapp.com/bin/step1_av.html)B
|
unknown
|
||
http://dwrapper-prod.herokuapp.com/bin/img/background.jpg2
|
unknown
|
||
http://exampledd.matomo.cloud/matomo.php?idsite=1&rec=1&rand=3535895&apiv=1&cookie=1&bots=1&res=1280x1024&h=9&m=58&s=28&uid=8118157522024418&e_c=Wrapper%20%2F%20Errors%20%2F%20Missing%20scripts&e_a=%D0%92%D1%81%D0%B5%20%D1%81%D0%BA%D1%80%D0%B8%D0%BF%D1%82%D1%8B%20%D1%83%D1%81%D0%BF%D0%B5%D1%88%D0%BD%D0%BE%20%D0%B7%D0%B0%D0%B3%D1%80%D1%83%D0%B7%D0%B8%D0%BB%D0%B8%D1%81%D1%8C&e_n=&e_v=&ca=1
|
3.126.133.169
|
||
http://dwrapper-prod.herokuapp.com/bin/src/script.jsnEr
|
unknown
|
||
http://dwrapper-prod.herokuapp.com/bin/step1_av.htmlhta
|
unknown
|
||
http://dwrapper-prod.herokuapp.com/bin/src/variables/4.js?
|
unknown
|
||
https://my-domain.com
|
unknown
|
||
http://dwrapper-prod.herokuapp.com/bin/src/variables/5.jsC:
|
unknown
|
||
http://dwrapper-prod.herokuapp.com/bin/src/lang.jsG
|
unknown
|
||
http://dwrapper-prod.herokuapp.com/bin/src/variables/4.js94
|
unknown
|
||
http://dwrapper-prod.herokuapp.com/client_ip.jsng-scripts-detector.js
|
unknown
|
||
http://dwrapper-prod.herokuapp.com/bin/src/variables/5.js/
|
unknown
|
||
http://dwrapper-prod.herokuapp.com/bin/step1_av.html9E
|
unknown
|
||
http://dwrapper-prod.herokuapp.com/bin/src/lang.jsC:
|
unknown
|
||
http://dwrapper-prod.herokuapp.com/bin/src/variables/5.jshttp://dwrapper-prod.herokuapp.com/bin/src/
|
unknown
|
||
http://dwrapper-prod.herokuapp.com/bin/src/statistics.js)7
|
unknown
|
||
https://my-domain.com&queuedtracking=0&apiv=1&cookie=1&bots=1z
|
unknown
|
||
https://nel.heroku.com/reports?ts=1713427107&sid=812dcc77-0bd0-43b1-a5f1-b25750382959&s=ob
|
unknown
|
||
http://dwrapper-prod.herokuapp.com/bin/src/missing-scripts-detector.js/html
|
unknown
|
||
http://dwrapper-prod.herokuapp.com/bin/step1_av.html3
|
unknown
|
||
http://dwrapper-prod.herokuapp.com/bin/src/statistics.jssV
|
unknown
|
||
http://exampledd.matomo.cloud/matomo.php
|
unknown
|
||
http://dwrapper-prod.herokuapp.com/bin/src/variables/1.js&
|
unknown
|
||
http://dwrapper-prod.herokuapp.com/bin/step1_av.htmlA
|
unknown
|
||
http://exampledd.matomo.cloud/matomo.php?idsite=1&rec=1&rand=5523935&apiv=1&cookie=1&bots=1&res=1280x1024&h=9&m=58&s=28&uid=8118157522024418&action_name=Wrapper%20%2F%20Start%20screen%20page&url=https%3A%2F%2Fmy-domain.com%2Fstart_screen.html
|
3.126.133.169
|
||
http://dwrapper-prod.herokuapp.com/bin/src/lang.jss
|
unknown
|
||
http://dwrapper-prod.herokuapp.com/bin/step1_av.html~9
|
unknown
|
||
http://dwrapper-prod.herokuapp.com/bin/src/lang.jsJK
|
unknown
|
||
http://dwrapper-prod.herokuapp.com/bin/src/variables/1.js-detector.js
|
unknown
|
||
http://dwrapper-prod.herokuapp.com/bin/src/variables/1.js6
|
unknown
|
||
http://dwrapper-prod.herokuapp.com/bin/src/variables/5.jsDV
|
unknown
|
||
http://dwrapper-prod.herokuapp.com/bin/src/script.jsoC:
|
unknown
|
||
http://dwrapper-prod.herokuapp.com/bin/src/variables/3.jsbV
|
unknown
|
||
http://dwrapper-prod.herokuapp.com/bin/src/script.js5.jsSE7
|
unknown
|
||
http://exampledd.matomo.cloud/matomo.php?idsite=1&rec=1&rand=5523935&apiv=1&cookie=1&bots=1&res=1280
|
unknown
|
||
http://dwrapper-prod.herokuapp.com/bin/step1_av.htmlb
|
unknown
|
||
http://dwrapper-prod.herokuapp.com/bin/img/background.jpg94
|
unknown
|
||
http://dwrapper-prod.herokuapp.com/bin/src/style.csshta
|
unknown
|
||
http://dwrapper-prod.herokuapp.com/bin/src/missing-scripts-detector.jsN
|
unknown
|
||
http://dwrapper-prod.herokuapp.com/bin/step1_av.htmlf
|
unknown
|
||
http://dwrapper-prod.herokuapp.com/bin/src/variables/1.js;
|
unknown
|
||
http://dwrapper-prod.herokuapp.com/client_ip.jshtmlhta#
|
unknown
|
||
http://dwrapper-prod.herokuapp.com/bin/src/statistics.js_
|
unknown
|
||
http://dwrapper-prod.herokuapp.com/bin/img/background.jpgI2
|
unknown
|
||
http://dwrapper-prod.herokuapp.com/bin/step1_av.htmlv
|
unknown
|
||
http://dwrapper-prod.herokuapp.com/bin/src/style.cssu
|
unknown
|
||
http://dwrapper-prod.herokuapp.com/bin/src/style.cssl
|
unknown
|
||
http://dwrapper-prod.herokuapp.com/bin/step1_av.htmlh
|
unknown
|
||
http://dwrapper-prod.herokuapp.com/bin/step1_av.htmll
|
unknown
|
||
http://dwrapper-prod.herokuapp.com/bin/src/statistics.jso
|
unknown
|
||
http://dwrapper-prod.herokuapp.com/bin/src/missing-scripts-detector.jsp
|
unknown
|
||
http://dwrapper-prod.herokuapp.com/bin/src/variables/1.jssC:
|
unknown
|
||
http://dwrapper-prod.herokuapp.com/bin/step1_av.htmll7B
|
unknown
|
||
http://dwrapper-prod.herokuapp.com/bin/step1_av.html~
|
unknown
|
||
http://dwrapper-prod.herokuapp.com/client_ip.js7
|
unknown
|
||
http://dwrapper-prod.herokuapp.com/bin/src/missing-scripts-detector.jst
|
unknown
|
||
http://dwrapper-prod.herokuapp.com/bin/src/variables/3.jsK
|
unknown
|
||
http://dwrapper-prod.herokuapp.com/bin/src/variables/1.jsk
|
unknown
|
||
https://nel.heroku.com/reports
|
unknown
|
||
http://dwrapper-prod.herokuapp.com/client_ip.js&
|
unknown
|
||
http://dwrapper-prod.herokuapp.com/bin/src/variables/3.js3H
|
unknown
|
||
http://exampledd.matomo.cloud/matomo.php?idsite=1&rec=1&rand=3535895&apiv=1&cookie=1&bots=1&res=1280
|
unknown
|
||
http://dwrapper-prod.herokuapp.com/bin/src/style.cssD
|
unknown
|
||
http://emojipedia-us.s3.dualstack.us-west-1.amazonaws.com/thumbs/240/apple/285/white-heavy-check-mar
|
unknown
|
||
http://dwrapper-prod.herokuapp.com/bin/src/variables/2.jssV
|
unknown
|
||
http://dwrapper-prod.herokuapp.com/bin/src/variables/5.jsrtcuts
|
unknown
|
||
https://developer.matomo.org/api-reference/tracking-api
|
unknown
|
||
http://dwrapper-prod.herokuapp.com/bin/src/variables/5.jsy4l
|
unknown
|
||
http://dwrapper-prod.herokuapp.m/bin/step1_av.html
|
unknown
|
||
http://dwrapper-prod.herokuapp.com/bin/src/variables/3.jshttp://dwrapper-prod.herokuapp.com/bin/src/
|
unknown
|
||
http://dwrapper-prod.herokuapp.com/
|
unknown
|
||
http://dwrapper-prod.herokuapp.com/bin/img/background.jpgcal
|
unknown
|
||
http://dwrapper-prod.herokuapp.com/client_ip.jsPack.hta8
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
dwrapper-prod.herokuapp.com
|
46.137.15.86
|
||
exampledd.matomo.cloud
|
3.126.133.169
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
46.137.15.86
|
dwrapper-prod.herokuapp.com
|
Ireland
|
||
3.126.133.169
|
exampledd.matomo.cloud
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\dwrapper
|
clientID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DirectDraw\MostRecentApplication
|
Name
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DirectDraw\MostRecentApplication
|
ID
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
98EC000
|
trusted library allocation
|
page read and write
|
||
879B000
|
trusted library allocation
|
page read and write
|
||
4FE7000
|
trusted library allocation
|
page read and write
|
||
8847000
|
trusted library allocation
|
page read and write
|
||
658F000
|
heap
|
page read and write
|
||
2E47000
|
heap
|
page read and write
|
||
63F7000
|
heap
|
page read and write
|
||
65A1000
|
heap
|
page read and write
|
||
90A2000
|
trusted library allocation
|
page read and write
|
||
658E000
|
heap
|
page read and write
|
||
6597000
|
heap
|
page read and write
|
||
500C000
|
trusted library allocation
|
page read and write
|
||
C4A0000
|
trusted library allocation
|
page read and write
|
||
6592000
|
heap
|
page read and write
|
||
653E000
|
heap
|
page read and write
|
||
6597000
|
heap
|
page read and write
|
||
C5B5000
|
trusted library allocation
|
page read and write
|
||
B16E000
|
stack
|
page read and write
|
||
90A4000
|
trusted library allocation
|
page read and write
|
||
63FC000
|
heap
|
page read and write
|
||
98EA000
|
trusted library allocation
|
page read and write
|
||
659B000
|
heap
|
page read and write
|
||
4FCC000
|
trusted library allocation
|
page read and write
|
||
2E50000
|
heap
|
page read and write
|
||
659E000
|
heap
|
page read and write
|
||
91A8000
|
heap
|
page read and write
|
||
8FA2000
|
trusted library allocation
|
page read and write
|
||
6597000
|
heap
|
page read and write
|
||
6597000
|
heap
|
page read and write
|
||
659E000
|
heap
|
page read and write
|
||
98E5000
|
trusted library allocation
|
page read and write
|
||
29C9000
|
stack
|
page read and write
|
||
6467000
|
heap
|
page read and write
|
||
6467000
|
heap
|
page read and write
|
||
9195000
|
heap
|
page read and write
|
||
658E000
|
heap
|
page read and write
|
||
8847000
|
trusted library allocation
|
page read and write
|
||
6597000
|
heap
|
page read and write
|
||
658E000
|
heap
|
page read and write
|
||
645C000
|
heap
|
page read and write
|
||
6585000
|
heap
|
page read and write
|
||
7F431000
|
trusted library allocation
|
page execute read
|
||
6576000
|
heap
|
page read and write
|
||
6467000
|
heap
|
page read and write
|
||
658F000
|
heap
|
page read and write
|
||
AD6F000
|
stack
|
page read and write
|
||
6596000
|
heap
|
page read and write
|
||
64A6000
|
heap
|
page read and write
|
||
6492000
|
heap
|
page read and write
|
||
9111000
|
heap
|
page read and write
|
||
9247000
|
heap
|
page read and write
|
||
658F000
|
heap
|
page read and write
|
||
8836000
|
trusted library allocation
|
page read and write
|
||
658F000
|
heap
|
page read and write
|
||
879B000
|
trusted library allocation
|
page read and write
|
||
657F000
|
heap
|
page read and write
|
||
657D000
|
heap
|
page read and write
|
||
63B0000
|
heap
|
page read and write
|
||
659E000
|
heap
|
page read and write
|
||
4DCA000
|
heap
|
page read and write
|
||
8FB4000
|
trusted library allocation
|
page read and write
|
||
658F000
|
heap
|
page read and write
|
||
6575000
|
heap
|
page read and write
|
||
2D30000
|
heap
|
page read and write
|
||
658E000
|
heap
|
page read and write
|
||
659E000
|
heap
|
page read and write
|
||
87DE000
|
stack
|
page read and write
|
||
8FCC000
|
trusted library allocation
|
page read and write
|
||
501A000
|
trusted library allocation
|
page read and write
|
||
659E000
|
heap
|
page read and write
|
||
3210000
|
heap
|
page read and write
|
||
8795000
|
trusted library allocation
|
page read and write
|
||
7F401000
|
trusted library allocation
|
page execute read
|
||
4FB8000
|
trusted library allocation
|
page read and write
|
||
2DFA000
|
heap
|
page read and write
|
||
65A1000
|
heap
|
page read and write
|
||
654F000
|
heap
|
page read and write
|
||
7F411000
|
trusted library allocation
|
page execute read
|
||
991E000
|
trusted library allocation
|
page read and write
|
||
6457000
|
heap
|
page read and write
|
||
65A1000
|
heap
|
page read and write
|
||
6576000
|
heap
|
page read and write
|
||
6583000
|
heap
|
page read and write
|
||
659E000
|
heap
|
page read and write
|
||
659E000
|
heap
|
page read and write
|
||
31D0000
|
trusted library allocation
|
page read and write
|
||
8844000
|
trusted library allocation
|
page read and write
|
||
2E5E000
|
heap
|
page read and write
|
||
659E000
|
heap
|
page read and write
|
||
509A000
|
trusted library allocation
|
page read and write
|
||
657F000
|
heap
|
page read and write
|
||
8847000
|
trusted library allocation
|
page read and write
|
||
65A1000
|
heap
|
page read and write
|
||
4FC0000
|
trusted library allocation
|
page read and write
|
||
9247000
|
heap
|
page read and write
|
||
884E000
|
trusted library allocation
|
page read and write
|
||
C4F8000
|
trusted library allocation
|
page read and write
|
||
C4F2000
|
trusted library allocation
|
page read and write
|
||
6576000
|
heap
|
page read and write
|
||
C622000
|
trusted library allocation
|
page read and write
|
||
657D000
|
heap
|
page read and write
|
||
8FF0000
|
trusted library allocation
|
page execute
|
||
A9B0000
|
trusted library allocation
|
page read and write
|
||
658F000
|
heap
|
page read and write
|
||
6597000
|
heap
|
page read and write
|
||
89D0000
|
trusted library allocation
|
page read and write
|
||
657D000
|
heap
|
page read and write
|
||
6597000
|
heap
|
page read and write
|
||
6558000
|
heap
|
page read and write
|
||
6467000
|
heap
|
page read and write
|
||
500E000
|
trusted library allocation
|
page read and write
|
||
91D1000
|
heap
|
page read and write
|
||
6580000
|
heap
|
page read and write
|
||
657D000
|
heap
|
page read and write
|
||
6597000
|
heap
|
page read and write
|
||
6451000
|
heap
|
page read and write
|
||
5064000
|
trusted library allocation
|
page read and write
|
||
5018000
|
trusted library allocation
|
page read and write
|
||
63FC000
|
heap
|
page read and write
|
||
7F450000
|
trusted library allocation
|
page execute read
|
||
658F000
|
heap
|
page read and write
|
||
6591000
|
heap
|
page read and write
|
||
8794000
|
trusted library allocation
|
page read and write
|
||
640B000
|
heap
|
page read and write
|
||
6558000
|
heap
|
page read and write
|
||
658F000
|
heap
|
page read and write
|
||
8BDE000
|
stack
|
page read and write
|
||
6580000
|
heap
|
page read and write
|
||
C4D2000
|
trusted library allocation
|
page read and write
|
||
65A1000
|
heap
|
page read and write
|
||
C3C0000
|
trusted library allocation
|
page read and write
|
||
A9A0000
|
trusted library allocation
|
page read and write
|
||
9916000
|
trusted library allocation
|
page read and write
|
||
98E6000
|
trusted library allocation
|
page read and write
|
||
2E52000
|
heap
|
page read and write
|
||
90A9000
|
trusted library allocation
|
page read and write
|
||
65A1000
|
heap
|
page read and write
|
||
8FBE000
|
trusted library allocation
|
page read and write
|
||
659E000
|
heap
|
page read and write
|
||
658F000
|
heap
|
page read and write
|
||
ADAE000
|
stack
|
page read and write
|
||
6555000
|
heap
|
page read and write
|
||
C3C2000
|
trusted library allocation
|
page read and write
|
||
8FC7000
|
trusted library allocation
|
page read and write
|
||
6597000
|
heap
|
page read and write
|
||
658F000
|
heap
|
page read and write
|
||
6580000
|
heap
|
page read and write
|
||
6597000
|
heap
|
page read and write
|
||
31D4000
|
trusted library allocation
|
page read and write
|
||
658F000
|
heap
|
page read and write
|
||
6594000
|
heap
|
page read and write
|
||
6580000
|
heap
|
page read and write
|
||
AAEF000
|
stack
|
page read and write
|
||
65A1000
|
heap
|
page read and write
|
||
657D000
|
heap
|
page read and write
|
||
2E58000
|
heap
|
page read and write
|
||
6588000
|
heap
|
page read and write
|
||
645C000
|
heap
|
page read and write
|
||
2D35000
|
heap
|
page read and write
|
||
6597000
|
heap
|
page read and write
|
||
31D5000
|
trusted library allocation
|
page read and write
|
||
659E000
|
heap
|
page read and write
|
||
8845000
|
trusted library allocation
|
page read and write
|
||
505A000
|
trusted library allocation
|
page read and write
|
||
90AD000
|
trusted library allocation
|
page read and write
|
||
C620000
|
trusted library allocation
|
page read and write
|
||
6597000
|
heap
|
page read and write
|
||
5860000
|
trusted library allocation
|
page read and write
|
||
C692000
|
heap
|
page read and write
|
||
879B000
|
trusted library allocation
|
page read and write
|
||
6580000
|
heap
|
page read and write
|
||
B3B0000
|
trusted library allocation
|
page read and write
|
||
6576000
|
heap
|
page read and write
|
||
90F5000
|
heap
|
page read and write
|
||
2E29000
|
heap
|
page read and write
|
||
658F000
|
heap
|
page read and write
|
||
624F000
|
stack
|
page read and write
|
||
4FEE000
|
trusted library allocation
|
page read and write
|
||
657F000
|
heap
|
page read and write
|
||
659E000
|
heap
|
page read and write
|
||
2E30000
|
heap
|
page read and write
|
||
5088000
|
trusted library allocation
|
page read and write
|
||
6451000
|
heap
|
page read and write
|
||
89B0000
|
trusted library allocation
|
page execute
|
||
654F000
|
heap
|
page read and write
|
||
AEEE000
|
stack
|
page read and write
|
||
6580000
|
heap
|
page read and write
|
||
C4B2000
|
trusted library allocation
|
page read and write
|
||
658F000
|
heap
|
page read and write
|
||
2E4E000
|
heap
|
page read and write
|
||
6467000
|
heap
|
page read and write
|
||
90AE000
|
trusted library allocation
|
page read and write
|
||
6576000
|
heap
|
page read and write
|
||
504A000
|
trusted library allocation
|
page read and write
|
||
8830000
|
trusted library allocation
|
page read and write
|
||
90DF000
|
trusted library allocation
|
page read and write
|
||
555D000
|
stack
|
page read and write
|
||
C5D0000
|
trusted library allocation
|
page read and write
|
||
2D90000
|
heap
|
page read and write
|
||
6576000
|
heap
|
page read and write
|
||
90A5000
|
trusted library allocation
|
page read and write
|
||
89C0000
|
trusted library section
|
page readonly
|
||
90B3000
|
trusted library allocation
|
page read and write
|
||
658F000
|
heap
|
page read and write
|
||
640B000
|
heap
|
page read and write
|
||
877D000
|
stack
|
page read and write
|
||
65A1000
|
heap
|
page read and write
|
||
659E000
|
heap
|
page read and write
|
||
C621000
|
trusted library allocation
|
page read and write
|
||
C623000
|
trusted library allocation
|
page read and write
|
||
658F000
|
heap
|
page read and write
|
||
924F000
|
heap
|
page read and write
|
||
4DD6000
|
heap
|
page read and write
|
||
90B3000
|
trusted library allocation
|
page read and write
|
||
2E41000
|
heap
|
page read and write
|
||
658F000
|
heap
|
page read and write
|
||
6576000
|
heap
|
page read and write
|
||
6597000
|
heap
|
page read and write
|
||
8FCD000
|
trusted library allocation
|
page read and write
|
||
C624000
|
trusted library allocation
|
page read and write
|
||
6594000
|
heap
|
page read and write
|
||
6597000
|
heap
|
page read and write
|
||
6597000
|
heap
|
page read and write
|
||
658F000
|
heap
|
page read and write
|
||
931B000
|
stack
|
page read and write
|
||
2DED000
|
heap
|
page read and write
|
||
9247000
|
heap
|
page read and write
|
||
C610000
|
trusted library allocation
|
page read and write
|
||
4FA0000
|
heap
|
page read and write
|
||
2E91000
|
heap
|
page read and write
|
||
8834000
|
trusted library allocation
|
page read and write
|
||
654F000
|
heap
|
page read and write
|
||
6597000
|
heap
|
page read and write
|
||
6591000
|
heap
|
page read and write
|
||
4DC2000
|
heap
|
page read and write
|
||
659E000
|
heap
|
page read and write
|
||
8FA9000
|
trusted library allocation
|
page read and write
|
||
941E000
|
stack
|
page read and write
|
||
6576000
|
heap
|
page read and write
|
||
658F000
|
heap
|
page read and write
|
||
5081000
|
trusted library allocation
|
page read and write
|
||
5000000
|
trusted library allocation
|
page read and write
|
||
91C0000
|
heap
|
page read and write
|
||
65A1000
|
heap
|
page read and write
|
||
6459000
|
heap
|
page read and write
|
||
645E000
|
heap
|
page read and write
|
||
6500000
|
heap
|
page read and write
|
||
6555000
|
heap
|
page read and write
|
||
2E6D000
|
heap
|
page read and write
|
||
8FB3000
|
trusted library allocation
|
page read and write
|
||
6576000
|
heap
|
page read and write
|
||
659B000
|
heap
|
page read and write
|
||
6585000
|
heap
|
page read and write
|
||
8791000
|
trusted library allocation
|
page read and write
|
||
6597000
|
heap
|
page read and write
|
||
90E0000
|
heap
|
page read and write
|
||
C600000
|
trusted library allocation
|
page read and write
|
||
321A000
|
heap
|
page read and write
|
||
6580000
|
heap
|
page read and write
|
||
2E70000
|
heap
|
page read and write
|
||
8798000
|
trusted library allocation
|
page read and write
|
||
C626000
|
trusted library allocation
|
page read and write
|
||
90C0000
|
trusted library allocation
|
page read and write
|
||
6580000
|
heap
|
page read and write
|
||
658F000
|
heap
|
page read and write
|
||
65A1000
|
heap
|
page read and write
|
||
882F000
|
stack
|
page read and write
|
||
2DA0000
|
heap
|
page read and write
|
||
91E5000
|
heap
|
page read and write
|
||
6575000
|
heap
|
page read and write
|
||
6580000
|
heap
|
page read and write
|
||
65A1000
|
heap
|
page read and write
|
||
659E000
|
heap
|
page read and write
|
||
879B000
|
trusted library allocation
|
page read and write
|
||
5035000
|
trusted library allocation
|
page read and write
|
||
90CA000
|
trusted library allocation
|
page read and write
|
||
91C0000
|
heap
|
page read and write
|
||
90B3000
|
trusted library allocation
|
page read and write
|
||
4D90000
|
heap
|
page read and write
|
||
6591000
|
heap
|
page read and write
|
||
62AD000
|
stack
|
page read and write
|
||
90DD000
|
trusted library allocation
|
page read and write
|
||
5048000
|
trusted library allocation
|
page read and write
|
||
9178000
|
heap
|
page read and write
|
||
659E000
|
heap
|
page read and write
|
||
C660000
|
heap
|
page read and write
|
||
65B1000
|
heap
|
page read and write
|
||
4D20000
|
heap
|
page read and write
|
||
509E000
|
trusted library allocation
|
page read and write
|
||
658F000
|
heap
|
page read and write
|
||
6597000
|
heap
|
page read and write
|
||
4F90000
|
heap
|
page read and write
|
||
65A4000
|
heap
|
page read and write
|
||
6597000
|
heap
|
page read and write
|
||
6580000
|
heap
|
page read and write
|
||
6492000
|
heap
|
page read and write
|
||
884E000
|
trusted library allocation
|
page read and write
|
||
90B3000
|
trusted library allocation
|
page read and write
|
||
90B3000
|
trusted library allocation
|
page read and write
|
||
90B3000
|
trusted library allocation
|
page read and write
|
||
7F421000
|
trusted library allocation
|
page execute read
|
||
8E80000
|
heap
|
page read and write
|
||
659E000
|
heap
|
page read and write
|
||
6543000
|
heap
|
page read and write
|
||
6578000
|
heap
|
page read and write
|
||
6580000
|
heap
|
page read and write
|
||
C5E0000
|
trusted library allocation
|
page read and write
|
||
614E000
|
stack
|
page read and write
|
||
90D9000
|
trusted library allocation
|
page read and write
|
||
6585000
|
heap
|
page read and write
|
||
658F000
|
heap
|
page read and write
|
||
657F000
|
heap
|
page read and write
|
||
4FBE000
|
trusted library allocation
|
page read and write
|
||
657C000
|
heap
|
page read and write
|
||
90B3000
|
trusted library allocation
|
page read and write
|
||
65A9000
|
heap
|
page read and write
|
||
6575000
|
heap
|
page read and write
|
||
6576000
|
heap
|
page read and write
|
||
8FCE000
|
trusted library allocation
|
page read and write
|
||
8798000
|
trusted library allocation
|
page read and write
|
||
5016000
|
trusted library allocation
|
page read and write
|
||
91B0000
|
heap
|
page read and write
|
||
990C000
|
trusted library allocation
|
page read and write
|
||
90B3000
|
trusted library allocation
|
page read and write
|
||
31D4000
|
trusted library allocation
|
page read and write
|
||
98E0000
|
trusted library allocation
|
page read and write
|
||
658F000
|
heap
|
page read and write
|
||
65A1000
|
heap
|
page read and write
|
||
91DF000
|
heap
|
page read and write
|
||
5088000
|
trusted library allocation
|
page read and write
|
||
657F000
|
heap
|
page read and write
|
||
8785000
|
trusted library allocation
|
page read and write
|
||
2CF7000
|
stack
|
page read and write
|
||
879B000
|
trusted library allocation
|
page read and write
|
||
6582000
|
heap
|
page read and write
|
||
65A1000
|
heap
|
page read and write
|
||
4FF4000
|
trusted library allocation
|
page read and write
|
||
508A000
|
trusted library allocation
|
page read and write
|
||
6416000
|
heap
|
page read and write
|
||
6467000
|
heap
|
page read and write
|
||
6597000
|
heap
|
page read and write
|
||
951C000
|
trusted library allocation
|
page read and write
|
||
65A1000
|
heap
|
page read and write
|
||
509A000
|
trusted library allocation
|
page read and write
|
||
65A1000
|
heap
|
page read and write
|
||
657D000
|
heap
|
page read and write
|
||
4DA0000
|
heap
|
page read and write
|
||
545B000
|
stack
|
page read and write
|
||
5009000
|
trusted library allocation
|
page read and write
|
||
90B3000
|
trusted library allocation
|
page read and write
|
||
5020000
|
trusted library allocation
|
page read and write
|
||
C625000
|
trusted library allocation
|
page read and write
|
||
8CDF000
|
stack
|
page read and write
|
||
65A1000
|
heap
|
page read and write
|
||
B12F000
|
stack
|
page read and write
|
||
879B000
|
trusted library allocation
|
page read and write
|
||
884E000
|
trusted library allocation
|
page read and write
|
||
8FCB000
|
trusted library allocation
|
page read and write
|
||
6555000
|
heap
|
page read and write
|
||
6580000
|
heap
|
page read and write
|
||
98E8000
|
trusted library allocation
|
page read and write
|
||
6588000
|
heap
|
page read and write
|
||
8FBB000
|
trusted library allocation
|
page read and write
|
||
6597000
|
heap
|
page read and write
|
||
659E000
|
heap
|
page read and write
|
||
5088000
|
trusted library allocation
|
page read and write
|
||
8791000
|
trusted library allocation
|
page read and write
|
||
657D000
|
heap
|
page read and write
|
||
6580000
|
heap
|
page read and write
|
||
90A6000
|
trusted library allocation
|
page read and write
|
||
4F0D000
|
stack
|
page read and write
|
||
6558000
|
heap
|
page read and write
|
||
90C7000
|
trusted library allocation
|
page read and write
|
||
658E000
|
heap
|
page read and write
|
||
51DB000
|
stack
|
page read and write
|
||
8FE0000
|
heap
|
page read and write
|
||
640B000
|
heap
|
page read and write
|
||
659E000
|
heap
|
page read and write
|
||
509E000
|
trusted library allocation
|
page read and write
|
||
90B3000
|
trusted library allocation
|
page read and write
|
||
658F000
|
heap
|
page read and write
|
||
657F000
|
heap
|
page read and write
|
||
63FC000
|
heap
|
page read and write
|
||
6592000
|
heap
|
page read and write
|
||
657D000
|
heap
|
page read and write
|
||
6597000
|
heap
|
page read and write
|
||
6575000
|
heap
|
page read and write
|
||
6570000
|
heap
|
page read and write
|
||
AC2F000
|
stack
|
page read and write
|
||
657F000
|
heap
|
page read and write
|
||
6452000
|
heap
|
page read and write
|
||
658F000
|
heap
|
page read and write
|
||
6510000
|
heap
|
page read and write
|
||
8FC5000
|
trusted library allocation
|
page read and write
|
||
658E000
|
heap
|
page read and write
|
||
658F000
|
heap
|
page read and write
|
||
6576000
|
heap
|
page read and write
|
||
657D000
|
heap
|
page read and write
|
||
659E000
|
heap
|
page read and write
|
||
6492000
|
heap
|
page read and write
|
||
658F000
|
heap
|
page read and write
|
||
2DB2000
|
heap
|
page read and write
|
||
65A1000
|
heap
|
page read and write
|
||
6492000
|
heap
|
page read and write
|
||
64AA000
|
heap
|
page read and write
|
||
6576000
|
heap
|
page read and write
|
||
658F000
|
heap
|
page read and write
|
||
509E000
|
trusted library allocation
|
page read and write
|
||
65A1000
|
heap
|
page read and write
|
||
879A000
|
trusted library allocation
|
page read and write
|
||
6576000
|
heap
|
page read and write
|
||
6594000
|
heap
|
page read and write
|
||
6492000
|
heap
|
page read and write
|
||
658A000
|
heap
|
page read and write
|
||
B2AE000
|
stack
|
page read and write
|
||
98E7000
|
trusted library allocation
|
page read and write
|
||
645C000
|
heap
|
page read and write
|
||
658F000
|
heap
|
page read and write
|
||
9909000
|
trusted library allocation
|
page read and write
|
||
65A1000
|
heap
|
page read and write
|
||
658F000
|
heap
|
page read and write
|
||
8FB8000
|
trusted library allocation
|
page read and write
|
||
645C000
|
heap
|
page read and write
|
||
659E000
|
heap
|
page read and write
|
||
658E000
|
heap
|
page read and write
|
||
63FA000
|
heap
|
page read and write
|
||
6591000
|
heap
|
page read and write
|
||
640B000
|
heap
|
page read and write
|
||
658F000
|
heap
|
page read and write
|
||
90B3000
|
trusted library allocation
|
page read and write
|
||
98E9000
|
trusted library allocation
|
page read and write
|
||
659E000
|
heap
|
page read and write
|
||
6580000
|
heap
|
page read and write
|
||
6580000
|
heap
|
page read and write
|
||
90E8000
|
heap
|
page read and write
|
||
6597000
|
heap
|
page read and write
|
||
4FC8000
|
trusted library allocation
|
page read and write
|
||
90B3000
|
trusted library allocation
|
page read and write
|
||
504C000
|
trusted library allocation
|
page read and write
|
||
879B000
|
trusted library allocation
|
page read and write
|
||
90C4000
|
trusted library allocation
|
page read and write
|
||
90B3000
|
trusted library allocation
|
page read and write
|
||
6591000
|
heap
|
page read and write
|
||
90B4000
|
trusted library allocation
|
page read and write
|
||
6578000
|
heap
|
page read and write
|
||
90AC000
|
trusted library allocation
|
page read and write
|
||
8780000
|
trusted library allocation
|
page read and write
|
||
AEAF000
|
stack
|
page read and write
|
||
C5B5000
|
trusted library allocation
|
page read and write
|
||
6594000
|
heap
|
page read and write
|
||
658F000
|
heap
|
page read and write
|
||
6537000
|
heap
|
page read and write
|
||
9247000
|
heap
|
page read and write
|
||
658F000
|
heap
|
page read and write
|
||
8847000
|
trusted library allocation
|
page read and write
|
||
65A1000
|
heap
|
page read and write
|
||
883B000
|
trusted library allocation
|
page read and write
|
||
91F5000
|
heap
|
page read and write
|
||
65A1000
|
heap
|
page read and write
|
||
6597000
|
heap
|
page read and write
|
||
4DC0000
|
heap
|
page read and write
|
||
4FD8000
|
trusted library allocation
|
page read and write
|
||
4F5F000
|
stack
|
page read and write
|
||
2DBF000
|
heap
|
page read and write
|
||
C5B2000
|
trusted library allocation
|
page read and write
|
||
2E45000
|
heap
|
page read and write
|
||
4DDF000
|
heap
|
page read and write
|
||
531B000
|
stack
|
page read and write
|
||
8FCA000
|
trusted library allocation
|
page read and write
|
||
52DD000
|
stack
|
page read and write
|
||
509A000
|
trusted library allocation
|
page read and write
|
||
657D000
|
heap
|
page read and write
|
||
C3C3000
|
trusted library allocation
|
page read and write
|
||
56DC000
|
stack
|
page read and write
|
||
65A1000
|
heap
|
page read and write
|
||
6580000
|
heap
|
page read and write
|
||
645C000
|
heap
|
page read and write
|
||
2E0B000
|
heap
|
page read and write
|
||
8847000
|
trusted library allocation
|
page read and write
|
||
659E000
|
heap
|
page read and write
|
||
90A3000
|
trusted library allocation
|
page read and write
|
||
657D000
|
heap
|
page read and write
|
||
90FA000
|
heap
|
page read and write
|
||
4DE1000
|
heap
|
page read and write
|
||
65A1000
|
heap
|
page read and write
|
||
90B3000
|
trusted library allocation
|
page read and write
|
||
659E000
|
heap
|
page read and write
|
||
6451000
|
heap
|
page read and write
|
||
8FBA000
|
trusted library allocation
|
page read and write
|
||
8783000
|
trusted library allocation
|
page read and write
|
||
6597000
|
heap
|
page read and write
|
||
6551000
|
heap
|
page read and write
|
||
90B3000
|
trusted library allocation
|
page read and write
|
||
6576000
|
heap
|
page read and write
|
||
B02E000
|
stack
|
page read and write
|
||
4FF8000
|
trusted library allocation
|
page read and write
|
||
508C000
|
trusted library allocation
|
page read and write
|
||
4DD0000
|
heap
|
page read and write
|
||
884E000
|
trusted library allocation
|
page read and write
|
||
9234000
|
heap
|
page read and write
|
||
6597000
|
heap
|
page read and write
|
||
B26F000
|
stack
|
page read and write
|
||
AC6E000
|
stack
|
page read and write
|
||
6576000
|
heap
|
page read and write
|
||
8798000
|
trusted library allocation
|
page read and write
|
||
659E000
|
heap
|
page read and write
|
||
65A1000
|
heap
|
page read and write
|
||
65A1000
|
heap
|
page read and write
|
||
9900000
|
trusted library allocation
|
page read and write
|
||
879B000
|
trusted library allocation
|
page read and write
|
||
65A1000
|
heap
|
page read and write
|
||
65A1000
|
heap
|
page read and write
|
||
658F000
|
heap
|
page read and write
|
||
AFEF000
|
stack
|
page read and write
|
||
659E000
|
heap
|
page read and write
|
||
5010000
|
trusted library allocation
|
page read and write
|
||
C5B0000
|
trusted library allocation
|
page read and write
|
||
8FC9000
|
trusted library allocation
|
page read and write
|
||
6597000
|
heap
|
page read and write
|
||
6451000
|
heap
|
page read and write
|
||
6576000
|
heap
|
page read and write
|
||
C3C1000
|
trusted library allocation
|
page read and write
|
||
659E000
|
heap
|
page read and write
|
||
8798000
|
trusted library allocation
|
page read and write
|
||
509A000
|
trusted library allocation
|
page read and write
|
||
65A1000
|
heap
|
page read and write
|
||
6555000
|
heap
|
page read and write
|
||
6597000
|
heap
|
page read and write
|
||
867E000
|
stack
|
page read and write
|
||
31F0000
|
trusted library allocation
|
page read and write
|
||
879E000
|
trusted library allocation
|
page read and write
|
||
659E000
|
heap
|
page read and write
|
||
90A0000
|
trusted library allocation
|
page read and write
|
||
5030000
|
trusted library allocation
|
page read and write
|
||
657F000
|
heap
|
page read and write
|
||
645C000
|
heap
|
page read and write
|
||
91B3000
|
heap
|
page read and write
|
||
91DF000
|
heap
|
page read and write
|
||
658F000
|
heap
|
page read and write
|
||
90D3000
|
trusted library allocation
|
page read and write
|
||
6597000
|
heap
|
page read and write
|
||
8845000
|
trusted library allocation
|
page read and write
|
||
C4A0000
|
trusted library allocation
|
page read and write
|
||
8845000
|
trusted library allocation
|
page read and write
|
||
2E49000
|
heap
|
page read and write
|
||
6522000
|
heap
|
page read and write
|
||
65A1000
|
heap
|
page read and write
|
||
5057000
|
trusted library allocation
|
page read and write
|
||
6580000
|
heap
|
page read and write
|
||
6558000
|
heap
|
page read and write
|
||
65AC000
|
heap
|
page read and write
|
||
657C000
|
heap
|
page read and write
|
||
659E000
|
heap
|
page read and write
|
||
91B0000
|
heap
|
page read and write
|
||
6580000
|
heap
|
page read and write
|
||
659E000
|
heap
|
page read and write
|
||
8FC6000
|
trusted library allocation
|
page read and write
|
||
90FD000
|
heap
|
page read and write
|
||
6556000
|
heap
|
page read and write
|
||
C640000
|
trusted library allocation
|
page execute
|
||
6596000
|
heap
|
page read and write
|
||
6580000
|
heap
|
page read and write
|
||
8FCF000
|
trusted library allocation
|
page read and write
|
||
569C000
|
stack
|
page read and write
|
||
658D000
|
heap
|
page read and write
|
||
63FA000
|
heap
|
page read and write
|
||
6576000
|
heap
|
page read and write
|
||
541F000
|
stack
|
page read and write
|
||
65A1000
|
heap
|
page read and write
|
||
658E000
|
heap
|
page read and write
|
||
5006000
|
trusted library allocation
|
page read and write
|
||
657D000
|
heap
|
page read and write
|
||
659E000
|
heap
|
page read and write
|
||
B3B0000
|
trusted library allocation
|
page read and write
|
||
917E000
|
heap
|
page read and write
|
||
2D40000
|
heap
|
page read and write
|
||
65A1000
|
heap
|
page read and write
|
||
AB2E000
|
stack
|
page read and write
|
||
8FB0000
|
trusted library allocation
|
page read and write
|
||
65A1000
|
heap
|
page read and write
|
||
657D000
|
heap
|
page read and write
|
||
658F000
|
heap
|
page read and write
|
||
509A000
|
trusted library allocation
|
page read and write
|
||
879E000
|
trusted library allocation
|
page read and write
|
||
658F000
|
heap
|
page read and write
|
||
884E000
|
trusted library allocation
|
page read and write
|
||
3216000
|
heap
|
page read and write
|
||
C600000
|
trusted library allocation
|
page read and write
|
||
9187000
|
heap
|
page read and write
|
||
65A1000
|
heap
|
page read and write
|
||
90B3000
|
trusted library allocation
|
page read and write
|
||
5014000
|
trusted library allocation
|
page read and write
|
||
CA60000
|
trusted library allocation
|
page read and write
|
||
8845000
|
trusted library allocation
|
page read and write
|
||
4DE6000
|
heap
|
page read and write
|
||
6576000
|
heap
|
page read and write
|
||
6588000
|
heap
|
page read and write
|
||
6590000
|
heap
|
page read and write
|
||
6492000
|
heap
|
page read and write
|
||
C5F0000
|
trusted library allocation
|
page read and write
|
||
31D4000
|
trusted library allocation
|
page read and write
|
||
65A4000
|
heap
|
page read and write
|
||
6580000
|
heap
|
page read and write
|
||
6459000
|
heap
|
page read and write
|
||
91CA000
|
heap
|
page read and write
|
||
65A1000
|
heap
|
page read and write
|
||
9249000
|
heap
|
page read and write
|
||
B3AF000
|
stack
|
page read and write
|
||
658F000
|
heap
|
page read and write
|
||
659E000
|
heap
|
page read and write
|
||
659E000
|
heap
|
page read and write
|
||
5064000
|
trusted library allocation
|
page read and write
|
||
2E55000
|
heap
|
page read and write
|
||
6594000
|
heap
|
page read and write
|
||
6578000
|
heap
|
page read and write
|
||
6597000
|
heap
|
page read and write
|
||
658F000
|
heap
|
page read and write
|
||
658F000
|
heap
|
page read and write
|
||
654D000
|
heap
|
page read and write
|
||
CA60000
|
heap
|
page read and write
|
||
659E000
|
heap
|
page read and write
|
||
658F000
|
heap
|
page read and write
|
||
657E000
|
heap
|
page read and write
|
||
6582000
|
heap
|
page read and write
|
||
8F90000
|
trusted library allocation
|
page read and write
|
||
91D0000
|
heap
|
page read and write
|
||
C5B5000
|
trusted library allocation
|
page read and write
|
||
65A1000
|
heap
|
page read and write
|
||
C609000
|
trusted library allocation
|
page read and write
|
||
6492000
|
heap
|
page read and write
|
||
659E000
|
heap
|
page read and write
|
||
8FA9000
|
trusted library allocation
|
page read and write
|
||
C3C1000
|
trusted library allocation
|
page read and write
|
||
659E000
|
heap
|
page read and write
|
||
509E000
|
trusted library allocation
|
page read and write
|
||
90B3000
|
trusted library allocation
|
page read and write
|
||
65A1000
|
heap
|
page read and write
|
||
657D000
|
heap
|
page read and write
|
||
898E000
|
stack
|
page read and write
|
||
6576000
|
heap
|
page read and write
|
||
6576000
|
heap
|
page read and write
|
||
9247000
|
heap
|
page read and write
|
||
C600000
|
trusted library allocation
|
page read and write
|
||
65A1000
|
heap
|
page read and write
|
||
63AD000
|
stack
|
page read and write
|
||
57DC000
|
stack
|
page read and write
|
||
C4DA000
|
trusted library allocation
|
page read and write
|
||
659E000
|
heap
|
page read and write
|
||
879B000
|
trusted library allocation
|
page read and write
|
||
509E000
|
trusted library allocation
|
page read and write
|
||
2E3E000
|
heap
|
page read and write
|
||
90B3000
|
trusted library allocation
|
page read and write
|
||
4D94000
|
heap
|
page read and write
|
||
6597000
|
heap
|
page read and write
|
||
2E43000
|
heap
|
page read and write
|
||
658F000
|
heap
|
page read and write
|
||
6476000
|
heap
|
page read and write
|
||
2DA7000
|
heap
|
page read and write
|
||
6594000
|
heap
|
page read and write
|
||
90A8000
|
trusted library allocation
|
page read and write
|
||
65A1000
|
heap
|
page read and write
|
||
6575000
|
heap
|
page read and write
|
||
65A1000
|
heap
|
page read and write
|
||
2E0E000
|
heap
|
page read and write
|
||
B534000
|
trusted library allocation
|
page read and write
|
||
98EB000
|
trusted library allocation
|
page read and write
|
||
6597000
|
heap
|
page read and write
|
||
65A1000
|
heap
|
page read and write
|
||
657D000
|
heap
|
page read and write
|
||
6576000
|
heap
|
page read and write
|
||
6597000
|
heap
|
page read and write
|
||
658F000
|
heap
|
page read and write
|
||
A9EE000
|
stack
|
page read and write
|
||
8799000
|
trusted library allocation
|
page read and write
|
||
7F441000
|
trusted library allocation
|
page execute read
|
||
5052000
|
trusted library allocation
|
page read and write
|
||
B552000
|
trusted library allocation
|
page read and write
|
||
6576000
|
heap
|
page read and write
|
||
90E1000
|
heap
|
page read and write
|
||
8FB7000
|
trusted library allocation
|
page read and write
|
||
888E000
|
stack
|
page read and write
|
||
659E000
|
heap
|
page read and write
|
||
90AA000
|
trusted library allocation
|
page read and write
|
||
658F000
|
heap
|
page read and write
|
||
5024000
|
trusted library allocation
|
page read and write
|
||
658F000
|
heap
|
page read and write
|
||
90B3000
|
trusted library allocation
|
page read and write
|
||
90A7000
|
trusted library allocation
|
page read and write
|
||
2E3A000
|
heap
|
page read and write
|
||
658F000
|
heap
|
page read and write
|
||
658F000
|
heap
|
page read and write
|
||
C5E0000
|
trusted library allocation
|
page read and write
|
||
8798000
|
trusted library allocation
|
page read and write
|
||
90AB000
|
trusted library allocation
|
page read and write
|
||
6578000
|
heap
|
page read and write
|
||
6597000
|
heap
|
page read and write
|
||
4FC4000
|
trusted library allocation
|
page read and write
|
||
645E000
|
heap
|
page read and write
|
||
C5B2000
|
trusted library allocation
|
page read and write
|
||
559C000
|
stack
|
page read and write
|
||
659E000
|
heap
|
page read and write
|
||
6586000
|
heap
|
page read and write
|
||
6558000
|
heap
|
page read and write
|
||
6476000
|
heap
|
page read and write
|
||
9206000
|
heap
|
page read and write
|
||
8FC8000
|
trusted library allocation
|
page read and write
|
||
4DD4000
|
heap
|
page read and write
|
||
659E000
|
heap
|
page read and write
|
||
8FBF000
|
trusted library allocation
|
page read and write
|
||
8798000
|
trusted library allocation
|
page read and write
|
||
509E000
|
trusted library allocation
|
page read and write
|
||
6576000
|
heap
|
page read and write
|
||
659E000
|
heap
|
page read and write
|
||
879B000
|
trusted library allocation
|
page read and write
|
||
6597000
|
heap
|
page read and write
|
||
919D000
|
heap
|
page read and write
|
There are 706 hidden memdumps, click here to show them.