Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
yX8787W7de.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Program Files (x86)\WindowsPowerShell\Configuration\Schema\conhost.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\Internet Explorer\en-US\SwjJGfgwqbpLdPqvPFcqLsY.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Recovery\SwjJGfgwqbpLdPqvPFcqLsY.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Recovery\SystemSettings.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\i0e0ny4g\i0e0ny4g.cmdline
|
Unicode text, UTF-8 (with BOM) text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\s4Al4mMfKa.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\wNNbKC3aho.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\Desktop\iJCvyQAH.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\wNZUMzpS.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\System32\SecurityHealthSystray.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\fontrefcrt\JfSdr.vbe
|
data
|
dropped
|
||
C:\fontrefcrt\MsintoRefcommonsvc.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\fontrefcrt\WmiPrvSE.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\WindowsPowerShell\Configuration\Schema\088424020bedd6
|
ASCII text, with very long lines (620), with no line terminators
|
dropped
|
||
C:\Program Files\Internet Explorer\en-US\31d454e2f3d20a
|
ASCII text, with very long lines (636), with no line terminators
|
dropped
|
||
C:\Recovery\31d454e2f3d20a
|
ASCII text, with very long lines (378), with no line terminators
|
dropped
|
||
C:\Recovery\9e60a5f7a3bd80
|
ASCII text, with very long lines (396), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\MsintoRefcommonsvc.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\SwjJGfgwqbpLdPqvPFcqLsY.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\conhost.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\0nIhZ6KLH4
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RES4FAE.tmp
|
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x6e0, 10 symbols, created Fri Apr 26 04:35:19 2024,
1st section name ".debug$S"
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\i0e0ny4g\i0e0ny4g.0.cs
|
C++ source, Unicode text, UTF-8 (with BOM) text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\i0e0ny4g\i0e0ny4g.out
|
Unicode text, UTF-8 (with BOM) text, with very long lines (320), with CRLF, CR line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\qtONc3XZ0o
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\System32\CSCE4B7E694399A43119EA8A93F1E7760F4.TMP
|
MSVC .res
|
dropped
|
||
C:\fontrefcrt\18c91701d3e601
|
ASCII text, with very long lines (996), with no line terminators
|
dropped
|
||
C:\fontrefcrt\24dbde2999530e
|
ASCII text, with no line terminators
|
dropped
|
||
C:\fontrefcrt\YPm3Ri0zuGSw0d5cA9MOsCVgRsbtCEjXWkwqUVDQU6Ex.bat
|
ASCII text, with CRLF line terminators
|
dropped
|
||
\Device\Null
|
ASCII text
|
dropped
|
There are 21 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\yX8787W7de.exe
|
"C:\Users\user\Desktop\yX8787W7de.exe"
|
||
C:\Windows\SysWOW64\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\fontrefcrt\JfSdr.vbe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\fontrefcrt\MsintoRefcommonsvc.exe
|
"C:\fontrefcrt/MsintoRefcommonsvc.exe"
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "SystemSettingsS" /sc MINUTE /mo 6 /tr "'C:\Recovery\SystemSettings.exe'" /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "SystemSettings" /sc ONLOGON /tr "'C:\Recovery\SystemSettings.exe'" /rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "SystemSettingsS" /sc MINUTE /mo 14 /tr "'C:\Recovery\SystemSettings.exe'" /rl HIGHEST /f
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
|
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\i0e0ny4g\i0e0ny4g.cmdline"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "SwjJGfgwqbpLdPqvPFcqLsYS" /sc MINUTE /mo 9 /tr "'C:\Program Files\Internet Explorer\en-US\SwjJGfgwqbpLdPqvPFcqLsY.exe'"
/f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "SwjJGfgwqbpLdPqvPFcqLsY" /sc ONLOGON /tr "'C:\Program Files\Internet Explorer\en-US\SwjJGfgwqbpLdPqvPFcqLsY.exe'"
/rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "SwjJGfgwqbpLdPqvPFcqLsYS" /sc MINUTE /mo 7 /tr "'C:\Program Files\Internet Explorer\en-US\SwjJGfgwqbpLdPqvPFcqLsY.exe'"
/rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\windowspowershell\Configuration\Schema\conhost.exe'"
/f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Program Files (x86)\windowspowershell\Configuration\Schema\conhost.exe'"
/rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\windowspowershell\Configuration\Schema\conhost.exe'"
/rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 14 /tr "'C:\fontrefcrt\WmiPrvSE.exe'" /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\fontrefcrt\WmiPrvSE.exe'" /rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 5 /tr "'C:\fontrefcrt\WmiPrvSE.exe'" /rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "SwjJGfgwqbpLdPqvPFcqLsYS" /sc MINUTE /mo 10 /tr "'C:\Recovery\SwjJGfgwqbpLdPqvPFcqLsY.exe'" /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "SwjJGfgwqbpLdPqvPFcqLsY" /sc ONLOGON /tr "'C:\Recovery\SwjJGfgwqbpLdPqvPFcqLsY.exe'" /rl HIGHEST
/f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "SwjJGfgwqbpLdPqvPFcqLsYS" /sc MINUTE /mo 8 /tr "'C:\Recovery\SwjJGfgwqbpLdPqvPFcqLsY.exe'" /rl HIGHEST
/f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "MsintoRefcommonsvcM" /sc MINUTE /mo 11 /tr "'C:\fontrefcrt\MsintoRefcommonsvc.exe'" /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "MsintoRefcommonsvc" /sc ONLOGON /tr "'C:\fontrefcrt\MsintoRefcommonsvc.exe'" /rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "MsintoRefcommonsvcM" /sc MINUTE /mo 14 /tr "'C:\fontrefcrt\MsintoRefcommonsvc.exe'" /rl HIGHEST
/f
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\wNNbKC3aho.bat"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\PING.EXE
|
ping -n 10 localhost
|
||
C:\Program Files (x86)\WindowsPowerShell\Configuration\Schema\conhost.exe
|
"C:\Program Files (x86)\windowspowershell\Configuration\Schema\conhost.exe"
|
||
C:\Program Files (x86)\WindowsPowerShell\Configuration\Schema\conhost.exe
|
"C:\Program Files (x86)\windowspowershell\Configuration\Schema\conhost.exe"
|
||
C:\fontrefcrt\MsintoRefcommonsvc.exe
|
C:\fontrefcrt\MsintoRefcommonsvc.exe
|
||
C:\fontrefcrt\MsintoRefcommonsvc.exe
|
C:\fontrefcrt\MsintoRefcommonsvc.exe
|
||
C:\Recovery\SwjJGfgwqbpLdPqvPFcqLsY.exe
|
C:\Recovery\SwjJGfgwqbpLdPqvPFcqLsY.exe
|
||
C:\Recovery\SwjJGfgwqbpLdPqvPFcqLsY.exe
|
C:\Recovery\SwjJGfgwqbpLdPqvPFcqLsY.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\s4Al4mMfKa.bat"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /c ""C:\fontrefcrt\YPm3Ri0zuGSw0d5cA9MOsCVgRsbtCEjXWkwqUVDQU6Ex.bat" "
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
|
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES4FAE.tmp"
"c:\Windows\System32\CSCE4B7E694399A43119EA8A93F1E7760F4.TMP"
|
||
C:\Windows\System32\chcp.com
|
chcp 65001
|
||
C:\Windows\System32\chcp.com
|
chcp 65001
|
||
C:\Windows\System32\w32tm.exe
|
w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 33 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://taketa.top/JavascriptPollMultigeneratordatalife.php
|
104.21.16.102
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://taketa.top
|
unknown
|
||
http://taketa.top/
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
taketa.top
|
104.21.16.102
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.21.16.102
|
taketa.top
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
SystemSettings
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
SwjJGfgwqbpLdPqvPFcqLsY
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
conhost
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
conhost
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
WmiPrvSE
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
WmiPrvSE
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
MsintoRefcommonsvc
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
MsintoRefcommonsvc
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Shell
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Shell
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Shell
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Shell
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
SwjJGfgwqbpLdPqvPFcqLsY
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
SwjJGfgwqbpLdPqvPFcqLsY
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Shell
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Shell
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
LangID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\WScript.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\WScript.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER\SOFTWARE\fb6bec7a7120fef0467f6866389df026abe6e7dd
|
1fbc9c409552d3f5ae4dc820fc90757381ee7130
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\cmd.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\cmd.exe.ApplicationCompany
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\conhost_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\conhost_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\conhost_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\conhost_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\conhost_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\conhost_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\conhost_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\conhost_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\conhost_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\conhost_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\conhost_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\conhost_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\conhost_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\conhost_RASMANCS
|
FileDirectory
|
There are 26 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
6B27000
|
heap
|
page read and write
|
||
9B2000
|
unkown
|
page readonly
|
||
6213000
|
heap
|
page read and write
|
||
130A1000
|
trusted library allocation
|
page read and write
|
||
6B25000
|
heap
|
page read and write
|
||
161F000
|
stack
|
page read and write
|
||
1BC73000
|
heap
|
page execute and read and write
|
||
10DB000
|
heap
|
page read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BA36000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBE0000
|
trusted library allocation
|
page execute and read and write
|
||
2750000
|
heap
|
page read and write
|
||
7FFD9B9BD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page read and write
|
||
1E1ABDA4000
|
heap
|
page read and write
|
||
1F7A7E98000
|
heap
|
page read and write
|
||
2E78000
|
trusted library allocation
|
page read and write
|
||
1C0AA000
|
heap
|
page read and write
|
||
1F7A7E50000
|
heap
|
page read and write
|
||
16A0000
|
heap
|
page read and write
|
||
2D7F000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A8000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA56000
|
trusted library allocation
|
page read and write
|
||
31C0000
|
heap
|
page read and write
|
||
4A30000
|
heap
|
page read and write
|
||
9DBCEFB000
|
stack
|
page read and write
|
||
267E000
|
stack
|
page read and write
|
||
1B6AF000
|
stack
|
page read and write
|
||
5568000
|
heap
|
page read and write
|
||
7FFD9BBD4000
|
trusted library allocation
|
page read and write
|
||
38E3000
|
trusted library allocation
|
page read and write
|
||
15E000
|
unkown
|
page read and write
|
||
BD94DFE000
|
stack
|
page read and write
|
||
1C125000
|
heap
|
page read and write
|
||
1BA0E000
|
stack
|
page read and write
|
||
38D0000
|
trusted library allocation
|
page read and write
|
||
38C5000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE70000
|
trusted library allocation
|
page execute and read and write
|
||
1F7A97F0000
|
direct allocation
|
page read and write
|
||
2749000
|
heap
|
page read and write
|
||
27AE000
|
stack
|
page read and write
|
||
38E1000
|
trusted library allocation
|
page read and write
|
||
38D7000
|
trusted library allocation
|
page read and write
|
||
E3F000
|
stack
|
page read and write
|
||
3999000
|
trusted library allocation
|
page read and write
|
||
2ED2000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA4C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BB53000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE20000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB40000
|
trusted library allocation
|
page read and write
|
||
12D11000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
1B28D000
|
stack
|
page read and write
|
||
2E72000
|
trusted library allocation
|
page read and write
|
||
1C0DC000
|
heap
|
page read and write
|
||
27D3000
|
heap
|
page read and write
|
||
7FFD9BA46000
|
trusted library allocation
|
page read and write
|
||
2EBF000
|
trusted library allocation
|
page read and write
|
||
1B8F6000
|
heap
|
page read and write
|
||
1F7A7EE9000
|
heap
|
page read and write
|
||
3181000
|
trusted library allocation
|
page read and write
|
||
393B000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBE0000
|
trusted library allocation
|
page read and write
|
||
28C5EF82000
|
heap
|
page read and write
|
||
3965000
|
trusted library allocation
|
page read and write
|
||
2C71000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9FC000
|
trusted library allocation
|
page execute and read and write
|
||
16B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB40000
|
trusted library allocation
|
page read and write
|
||
20FC00C5000
|
heap
|
page read and write
|
||
7FFD9BA66000
|
trusted library allocation
|
page execute and read and write
|
||
1C48E000
|
stack
|
page read and write
|
||
7FFD9BBC2000
|
trusted library allocation
|
page read and write
|
||
2476000
|
stack
|
page read and write
|
||
2DB2000
|
heap
|
page read and write
|
||
9DBD0FE000
|
stack
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
12EB1000
|
trusted library allocation
|
page read and write
|
||
2DB0000
|
heap
|
page execute and read and write
|
||
1E1ABBE1000
|
heap
|
page read and write
|
||
1365000
|
heap
|
page read and write
|
||
134A1000
|
trusted library allocation
|
page read and write
|
||
554F000
|
stack
|
page read and write
|
||
2E4E000
|
trusted library allocation
|
page read and write
|
||
2BB35F60000
|
heap
|
page read and write
|
||
1E1ABBE2000
|
heap
|
page read and write
|
||
12EEE000
|
trusted library allocation
|
page read and write
|
||
4A40000
|
trusted library allocation
|
page read and write
|
||
1497000
|
heap
|
page read and write
|
||
2D5F000
|
heap
|
page read and write
|
||
31D0000
|
heap
|
page read and write
|
||
7FFD9BA96000
|
trusted library allocation
|
page execute and read and write
|
||
12F31000
|
trusted library allocation
|
page read and write
|
||
1C142000
|
heap
|
page read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page execute and read and write
|
||
1F7A7E20000
|
heap
|
page read and write
|
||
7FFD9BA46000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page read and write
|
||
2751000
|
heap
|
page read and write
|
||
1BD4F000
|
stack
|
page read and write
|
||
29F2A820000
|
heap
|
page read and write
|
||
145C000
|
heap
|
page read and write
|
||
7FFD9BA86000
|
trusted library allocation
|
page execute and read and write
|
||
2955000
|
heap
|
page read and write
|
||
7FFD9B98D000
|
trusted library allocation
|
page execute and read and write
|
||
183000
|
unkown
|
page write copy
|
||
2C66000
|
trusted library allocation
|
page read and write
|
||
1000000
|
heap
|
page read and write
|
||
2B45000
|
trusted library allocation
|
page read and write
|
||
135C8000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page execute and read and write
|
||
1B620000
|
heap
|
page execute and read and write
|
||
2E74000
|
trusted library allocation
|
page read and write
|
||
1B8E7000
|
heap
|
page read and write
|
||
10F0000
|
heap
|
page read and write
|
||
9F6000
|
unkown
|
page readonly
|
||
3967000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A3000
|
trusted library allocation
|
page execute and read and write
|
||
516F000
|
stack
|
page read and write
|
||
15E000
|
unkown
|
page write copy
|
||
2BB35F67000
|
heap
|
page read and write
|
||
2EE7000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B8000
|
trusted library allocation
|
page read and write
|
||
2D40000
|
heap
|
page read and write
|
||
7FFD9BB39000
|
trusted library allocation
|
page read and write
|
||
38F0000
|
trusted library allocation
|
page read and write
|
||
530D000
|
stack
|
page read and write
|
||
7FFD9B9B4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9EC000
|
trusted library allocation
|
page execute and read and write
|
||
1BB5F000
|
stack
|
page read and write
|
||
1C52B000
|
stack
|
page read and write
|
||
7FFD9BCD4000
|
trusted library allocation
|
page read and write
|
||
2747000
|
heap
|
page read and write
|
||
1E1ABBE2000
|
heap
|
page read and write
|
||
7FFD9BB97000
|
trusted library allocation
|
page read and write
|
||
E3D000
|
heap
|
page read and write
|
||
7FFD9B9AD000
|
trusted library allocation
|
page execute and read and write
|
||
B99000
|
heap
|
page read and write
|
||
29F2A47B000
|
heap
|
page read and write
|
||
2D5F000
|
stack
|
page read and write
|
||
1F7A7DE0000
|
heap
|
page read and write
|
||
7FFD9BB60000
|
trusted library allocation
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
2C2F000
|
trusted library allocation
|
page read and write
|
||
1C185000
|
heap
|
page read and write
|
||
7FFD9BA6C000
|
trusted library allocation
|
page execute and read and write
|
||
2D5E000
|
heap
|
page read and write
|
||
38E1000
|
trusted library allocation
|
page read and write
|
||
2B64000
|
trusted library allocation
|
page read and write
|
||
2D1A8B30000
|
heap
|
page read and write
|
||
1045000
|
heap
|
page read and write
|
||
28C5F150000
|
heap
|
page read and write
|
||
12AF7000
|
trusted library allocation
|
page read and write
|
||
150E000
|
stack
|
page read and write
|
||
312F000
|
stack
|
page read and write
|
||
7FFD9BBD0000
|
trusted library allocation
|
page read and write
|
||
2C2D000
|
trusted library allocation
|
page read and write
|
||
183000
|
unkown
|
page readonly
|
||
DFC000
|
heap
|
page read and write
|
||
57FE000
|
stack
|
page read and write
|
||
1415000
|
heap
|
page read and write
|
||
7FFD9BB48000
|
trusted library allocation
|
page read and write
|
||
2ED4000
|
trusted library allocation
|
page read and write
|
||
28C5EF50000
|
heap
|
page read and write
|
||
16E0000
|
heap
|
page read and write
|
||
1BE2B000
|
stack
|
page read and write
|
||
1B650000
|
heap
|
page read and write
|
||
1C690000
|
heap
|
page read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB70000
|
trusted library allocation
|
page read and write
|
||
1B772000
|
heap
|
page read and write
|
||
2E43000
|
trusted library allocation
|
page read and write
|
||
29E0000
|
heap
|
page read and write
|
||
4F90000
|
heap
|
page read and write
|
||
1F7A9810000
|
direct allocation
|
page read and write
|
||
1493000
|
heap
|
page read and write
|
||
151E000
|
stack
|
page read and write
|
||
27DB000
|
heap
|
page read and write
|
||
305B000
|
trusted library allocation
|
page read and write
|
||
1E1ABBE4000
|
heap
|
page read and write
|
||
1F7A97D0000
|
direct allocation
|
page read and write
|
||
7FFD9BC00000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B9AD000
|
trusted library allocation
|
page execute and read and write
|
||
2D8F000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB70000
|
trusted library allocation
|
page read and write
|
||
2DA6000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB6C000
|
trusted library allocation
|
page read and write
|
||
2EFA000
|
trusted library allocation
|
page read and write
|
||
2D71000
|
heap
|
page read and write
|
||
3931000
|
trusted library allocation
|
page read and write
|
||
6E3C000
|
stack
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
12D07000
|
trusted library allocation
|
page read and write
|
||
2D63000
|
heap
|
page read and write
|
||
1B67B000
|
heap
|
page read and write
|
||
1C32E000
|
stack
|
page read and write
|
||
7FFD9B9BD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page read and write
|
||
31B6000
|
trusted library allocation
|
page read and write
|
||
395B000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC10000
|
trusted library allocation
|
page read and write
|
||
3064000
|
trusted library allocation
|
page read and write
|
||
3183000
|
trusted library allocation
|
page read and write
|
||
1B92D000
|
heap
|
page read and write
|
||
1B8B6000
|
heap
|
page read and write
|
||
6210000
|
heap
|
page read and write
|
||
7FFD9B983000
|
trusted library allocation
|
page execute and read and write
|
||
BD94CFE000
|
stack
|
page read and write
|
||
1550000
|
heap
|
page read and write
|
||
7FFD9BB50000
|
trusted library allocation
|
page read and write
|
||
274A000
|
heap
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page read and write
|
||
D41000
|
stack
|
page read and write
|
||
2B31000
|
trusted library allocation
|
page read and write
|
||
1B932000
|
heap
|
page read and write
|
||
1F7A7E9A000
|
heap
|
page read and write
|
||
30DC000
|
trusted library allocation
|
page read and write
|
||
1400000
|
heap
|
page read and write
|
||
1C05E000
|
heap
|
page read and write
|
||
2E68000
|
trusted library allocation
|
page read and write
|
||
133C1000
|
trusted library allocation
|
page read and write
|
||
3091000
|
trusted library allocation
|
page read and write
|
||
48D1000
|
trusted library allocation
|
page read and write
|
||
1F7A7EDB000
|
heap
|
page read and write
|
||
C27000
|
heap
|
page read and write
|
||
B20000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCD2000
|
trusted library allocation
|
page read and write
|
||
27D2000
|
heap
|
page read and write
|
||
1450000
|
heap
|
page read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page execute and read and write
|
||
2B4F000
|
trusted library allocation
|
page read and write
|
||
13121000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB70000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB70000
|
trusted library allocation
|
page read and write
|
||
1C68D000
|
stack
|
page read and write
|
||
3185000
|
trusted library allocation
|
page read and write
|
||
2D69000
|
heap
|
page read and write
|
||
1B850000
|
heap
|
page read and write
|
||
34C4000
|
trusted library allocation
|
page read and write
|
||
31F1000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
2DAB000
|
heap
|
page read and write
|
||
2D90000
|
trusted library allocation
|
page read and write
|
||
1050000
|
heap
|
page read and write
|
||
3971000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBA4000
|
trusted library allocation
|
page read and write
|
||
39C3000
|
trusted library allocation
|
page read and write
|
||
2AE0000
|
heap
|
page read and write
|
||
2778000
|
heap
|
page read and write
|
||
2777000
|
heap
|
page read and write
|
||
7FFD9BBF0000
|
trusted library allocation
|
page read and write
|
||
1F7A986F000
|
direct allocation
|
page read and write
|
||
2D54000
|
trusted library allocation
|
page read and write
|
||
1F7A9790000
|
direct allocation
|
page read and write
|
||
7FFD9BB5C000
|
trusted library allocation
|
page read and write
|
||
389F000
|
trusted library allocation
|
page read and write
|
||
1C095000
|
heap
|
page read and write
|
||
7FFD9B9C4000
|
trusted library allocation
|
page read and write
|
||
12AA000
|
heap
|
page read and write
|
||
2DAB000
|
heap
|
page read and write
|
||
7FFD9BB7D000
|
trusted library allocation
|
page read and write
|
||
2C64000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBD2000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB5C000
|
trusted library allocation
|
page read and write
|
||
2717000
|
heap
|
page read and write
|
||
38B3000
|
trusted library allocation
|
page read and write
|
||
2565000
|
stack
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
28C5EF94000
|
heap
|
page read and write
|
||
2CFB000
|
stack
|
page read and write
|
||
D35000
|
heap
|
page read and write
|
||
2750000
|
heap
|
page read and write
|
||
1C0F3000
|
heap
|
page read and write
|
||
128B000
|
heap
|
page read and write
|
||
33EC000
|
trusted library allocation
|
page read and write
|
||
2D62000
|
heap
|
page read and write
|
||
1C07D000
|
heap
|
page read and write
|
||
1B919000
|
heap
|
page read and write
|
||
1F7A98D3000
|
direct allocation
|
page read and write
|
||
2BB35E50000
|
heap
|
page read and write
|
||
5A3C000
|
stack
|
page read and write
|
||
7FFD9BB60000
|
trusted library allocation
|
page execute and read and write
|
||
DD0000
|
heap
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B993000
|
trusted library allocation
|
page read and write
|
||
25E0000
|
heap
|
page read and write
|
||
7FFD9BB56000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAD1000
|
trusted library allocation
|
page execute and read and write
|
||
2B62000
|
trusted library allocation
|
page read and write
|
||
6A20000
|
heap
|
page read and write
|
||
7FFD9BB4C000
|
trusted library allocation
|
page read and write
|
||
2737000
|
heap
|
page read and write
|
||
7FFD9BE3C000
|
trusted library allocation
|
page read and write
|
||
2D1A8730000
|
heap
|
page read and write
|
||
E70000
|
heap
|
page read and write
|
||
7FFD9B993000
|
trusted library allocation
|
page execute and read and write
|
||
39AD000
|
trusted library allocation
|
page read and write
|
||
28C5EF7F000
|
heap
|
page read and write
|
||
7FFD9BB8C000
|
trusted library allocation
|
page read and write
|
||
9DBCFFF000
|
unkown
|
page read and write
|
||
3133000
|
trusted library allocation
|
page read and write
|
||
3041000
|
trusted library allocation
|
page read and write
|
||
2E90000
|
heap
|
page read and write
|
||
12B01000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B4000
|
trusted library allocation
|
page read and write
|
||
1F7A7E9D000
|
heap
|
page read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page read and write
|
||
30CF000
|
trusted library allocation
|
page read and write
|
||
7FFD9B994000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAE1000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BBCD000
|
trusted library allocation
|
page read and write
|
||
E10000
|
heap
|
page read and write
|
||
7FFD9BBB4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B4000
|
trusted library allocation
|
page read and write
|
||
16D0000
|
trusted library allocation
|
page read and write
|
||
2ED7000
|
trusted library allocation
|
page read and write
|
||
2D77000
|
heap
|
page read and write
|
||
148E000
|
heap
|
page read and write
|
||
398D000
|
trusted library allocation
|
page read and write
|
||
33C8000
|
trusted library allocation
|
page read and write
|
||
7FFD9B99C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A3000
|
trusted library allocation
|
page execute and read and write
|
||
1F7A7EC8000
|
heap
|
page read and write
|
||
7FFD9B9A8000
|
trusted library allocation
|
page read and write
|
||
2B33000
|
trusted library allocation
|
page read and write
|
||
38DB000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9D4000
|
trusted library allocation
|
page read and write
|
||
BD949AC000
|
stack
|
page read and write
|
||
1515000
|
heap
|
page read and write
|
||
1B480000
|
heap
|
page execute and read and write
|
||
9E5000
|
unkown
|
page readonly
|
||
1404000
|
heap
|
page read and write
|
||
1F7A7EB9000
|
heap
|
page read and write
|
||
1F7A7E74000
|
heap
|
page read and write
|
||
7FFD9B9FC000
|
trusted library allocation
|
page execute and read and write
|
||
2EB0000
|
heap
|
page execute and read and write
|
||
1B80F000
|
stack
|
page read and write
|
||
2A00000
|
trusted library allocation
|
page read and write
|
||
2DB2000
|
heap
|
page read and write
|
||
28C5F154000
|
heap
|
page read and write
|
||
1322E000
|
trusted library allocation
|
page read and write
|
||
2B42000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9DD000
|
trusted library allocation
|
page execute and read and write
|
||
13571000
|
trusted library allocation
|
page read and write
|
||
90BD4B000
|
stack
|
page read and write
|
||
F00000
|
heap
|
page read and write
|
||
1F7A7EEA000
|
heap
|
page read and write
|
||
34C0BFE000
|
stack
|
page read and write
|
||
1B510000
|
heap
|
page read and write
|
||
1BD50000
|
heap
|
page read and write
|
||
2734000
|
heap
|
page read and write
|
||
7FFD9BB6C000
|
trusted library allocation
|
page read and write
|
||
2D6C000
|
heap
|
page read and write
|
||
7FFD9BB67000
|
trusted library allocation
|
page read and write
|
||
58FF000
|
stack
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
396F000
|
trusted library allocation
|
page read and write
|
||
1020000
|
heap
|
page read and write
|
||
27DB000
|
heap
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
2EF8000
|
trusted library allocation
|
page read and write
|
||
7FFD9B998000
|
trusted library allocation
|
page read and write
|
||
2DD3000
|
trusted library allocation
|
page read and write
|
||
120000
|
unkown
|
page readonly
|
||
7FFD9BAC0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BB58000
|
trusted library allocation
|
page read and write
|
||
B97000
|
heap
|
page read and write
|
||
1E1ABBE2000
|
heap
|
page read and write
|
||
1C044000
|
heap
|
page read and write
|
||
4EDB000
|
stack
|
page read and write
|
||
28C5EF82000
|
heap
|
page read and write
|
||
1B750000
|
heap
|
page execute and read and write
|
||
2DAB000
|
heap
|
page read and write
|
||
2766000
|
heap
|
page read and write
|
||
28C5EF5B000
|
heap
|
page read and write
|
||
2D80000
|
heap
|
page read and write
|
||
2ED1000
|
trusted library allocation
|
page read and write
|
||
27D4000
|
heap
|
page read and write
|
||
2960000
|
heap
|
page read and write
|
||
1F7A7EE1000
|
heap
|
page read and write
|
||
7FFD9B998000
|
trusted library allocation
|
page read and write
|
||
1F7A7E7D000
|
heap
|
page read and write
|
||
1B912000
|
heap
|
page read and write
|
||
2EC1000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB94000
|
trusted library allocation
|
page read and write
|
||
147A000
|
heap
|
page read and write
|
||
3190000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page read and write
|
||
1B8A0000
|
heap
|
page read and write
|
||
7FFD9BB9C000
|
trusted library allocation
|
page read and write
|
||
2EF4000
|
trusted library allocation
|
page read and write
|
||
2E76000
|
trusted library allocation
|
page read and write
|
||
1C036000
|
heap
|
page read and write
|
||
129F7000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE50000
|
trusted library allocation
|
page read and write
|
||
304B000
|
trusted library allocation
|
page read and write
|
||
3010000
|
heap
|
page execute and read and write
|
||
30BF000
|
trusted library allocation
|
page read and write
|
||
1F7A9777000
|
direct allocation
|
page read and write
|
||
1BB0F000
|
stack
|
page read and write
|
||
39A3000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page read and write
|
||
2572000
|
stack
|
page read and write
|
||
121000
|
unkown
|
page execute read
|
||
2EC0000
|
trusted library allocation
|
page read and write
|
||
2C44000
|
trusted library allocation
|
page read and write
|
||
27AC000
|
heap
|
page read and write
|
||
32CB000
|
trusted library allocation
|
page read and write
|
||
2840000
|
heap
|
page read and write
|
||
27D1000
|
heap
|
page read and write
|
||
27DB000
|
heap
|
page read and write
|
||
1F7A985D000
|
direct allocation
|
page read and write
|
||
12E61000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page read and write
|
||
1C88B000
|
stack
|
page read and write
|
||
391B000
|
trusted library allocation
|
page read and write
|
||
1250000
|
heap
|
page read and write
|
||
7FFD9BA76000
|
trusted library allocation
|
page execute and read and write
|
||
1B500000
|
heap
|
page read and write
|
||
48EA000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB50000
|
trusted library allocation
|
page read and write
|
||
1BD0F000
|
stack
|
page read and write
|
||
1E1ABD20000
|
heap
|
page read and write
|
||
F87E17F000
|
stack
|
page read and write
|
||
B39000
|
heap
|
page read and write
|
||
2D0B000
|
trusted library allocation
|
page read and write
|
||
3320000
|
heap
|
page execute and read and write
|
||
7FFD9B9DB000
|
trusted library allocation
|
page execute and read and write
|
||
1F7A98D5000
|
direct allocation
|
page read and write
|
||
2D72000
|
heap
|
page read and write
|
||
3099000
|
trusted library allocation
|
page read and write
|
||
621C000
|
heap
|
page read and write
|
||
7FFD9B993000
|
trusted library allocation
|
page read and write
|
||
12A01000
|
trusted library allocation
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
395D000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9DC000
|
trusted library allocation
|
page execute and read and write
|
||
2C42000
|
trusted library allocation
|
page read and write
|
||
2E65000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page read and write
|
||
2D6B000
|
heap
|
page read and write
|
||
28C5EF94000
|
heap
|
page read and write
|
||
2BB36060000
|
heap
|
page read and write
|
||
1F7A7E8D000
|
heap
|
page read and write
|
||
1B670000
|
heap
|
page read and write
|
||
31CB000
|
trusted library allocation
|
page read and write
|
||
1F7A9950000
|
heap
|
page read and write
|
||
7FFD9BB63000
|
trusted library allocation
|
page read and write
|
||
2D1A88F7000
|
heap
|
page read and write
|
||
7FFD9BC30000
|
trusted library allocation
|
page execute and read and write
|
||
10D8000
|
heap
|
page read and write
|
||
274A000
|
heap
|
page read and write
|
||
7FFD9B9CD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page execute and read and write
|
||
2B54000
|
heap
|
page read and write
|
||
6B20000
|
heap
|
page read and write
|
||
2EE3000
|
trusted library allocation
|
page read and write
|
||
3929000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A3000
|
trusted library allocation
|
page read and write
|
||
33C1000
|
trusted library allocation
|
page read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
2D1A8810000
|
heap
|
page read and write
|
||
1B94A000
|
heap
|
page read and write
|
||
2DA9000
|
trusted library allocation
|
page read and write
|
||
1555000
|
heap
|
page read and write
|
||
2C55000
|
trusted library allocation
|
page read and write
|
||
1E1ABD30000
|
heap
|
page read and write
|
||
1509000
|
heap
|
page read and write
|
||
2750000
|
heap
|
page read and write
|
||
2690000
|
heap
|
page read and write
|
||
1C051000
|
heap
|
page read and write
|
||
318E000
|
trusted library allocation
|
page read and write
|
||
98D0FF5000
|
stack
|
page read and write
|
||
7FFD9B992000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB74000
|
trusted library allocation
|
page read and write
|
||
1BC70000
|
heap
|
page execute and read and write
|
||
7FFD9B984000
|
trusted library allocation
|
page read and write
|
||
1B660000
|
heap
|
page read and write
|
||
1C072000
|
heap
|
page read and write
|
||
1B788000
|
heap
|
page read and write
|
||
34C0B7F000
|
stack
|
page read and write
|
||
2EC3000
|
trusted library allocation
|
page read and write
|
||
38FD000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
28C5F050000
|
heap
|
page read and write
|
||
2BB36214000
|
heap
|
page read and write
|
||
1050000
|
trusted library allocation
|
page read and write
|
||
7FFD9B99D000
|
trusted library allocation
|
page execute and read and write
|
||
153000
|
unkown
|
page readonly
|
||
7FFD9BB60000
|
trusted library allocation
|
page execute and read and write
|
||
D70000
|
heap
|
page read and write
|
||
3050000
|
trusted library allocation
|
page read and write
|
||
1B942000
|
heap
|
page read and write
|
||
7FFD9B9A4000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB60000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAA0000
|
trusted library allocation
|
page execute and read and write
|
||
3047000
|
trusted library allocation
|
page read and write
|
||
2ED0000
|
trusted library allocation
|
page read and write
|
||
12D01000
|
trusted library allocation
|
page read and write
|
||
3094000
|
trusted library allocation
|
page read and write
|
||
2D73000
|
heap
|
page read and write
|
||
1C38E000
|
stack
|
page read and write
|
||
118F000
|
stack
|
page read and write
|
||
7FFD9BB95000
|
trusted library allocation
|
page read and write
|
||
12D0000
|
heap
|
page read and write
|
||
38CD000
|
trusted library allocation
|
page read and write
|
||
30E6000
|
trusted library allocation
|
page read and write
|
||
1274000
|
heap
|
page read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page execute and read and write
|
||
1F7A7E9F000
|
heap
|
page read and write
|
||
391F000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBD0000
|
trusted library allocation
|
page execute and read and write
|
||
1F7A7ED2000
|
heap
|
page read and write
|
||
7FFD9B98D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BB84000
|
trusted library allocation
|
page read and write
|
||
7FF4B4FB0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BE40000
|
trusted library allocation
|
page execute and read and write
|
||
2C68000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9AC000
|
trusted library allocation
|
page read and write
|
||
1E1ABBE1000
|
heap
|
page read and write
|
||
1BD2F000
|
stack
|
page read and write
|
||
1C057000
|
heap
|
page read and write
|
||
12CF1000
|
trusted library allocation
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
14BD000
|
heap
|
page read and write
|
||
1C122000
|
heap
|
page read and write
|
||
1B677000
|
heap
|
page read and write
|
||
28C5EF7F000
|
heap
|
page read and write
|
||
7FFD9BB70000
|
trusted library allocation
|
page execute and read and write
|
||
2D82000
|
heap
|
page read and write
|
||
1B3AE000
|
stack
|
page read and write
|
||
1BC0F000
|
stack
|
page read and write
|
||
20FBFD70000
|
heap
|
page read and write
|
||
1F7A7E89000
|
heap
|
page read and write
|
||
2BB1000
|
trusted library allocation
|
page read and write
|
||
146F000
|
stack
|
page read and write
|
||
1B531000
|
heap
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page execute and read and write
|
||
1C02C000
|
stack
|
page read and write
|
||
7FFD9B994000
|
trusted library allocation
|
page read and write
|
||
1F7A7EE7000
|
heap
|
page read and write
|
||
1097000
|
heap
|
page read and write
|
||
1B8A4000
|
heap
|
page read and write
|
||
DF8B54C000
|
stack
|
page read and write
|
||
DF8B5CF000
|
stack
|
page read and write
|
||
1500000
|
heap
|
page read and write
|
||
1270000
|
heap
|
page read and write
|
||
2EC5000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB94000
|
trusted library allocation
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
2E22000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page read and write
|
||
318E000
|
stack
|
page read and write
|
||
7FFD9BA76000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BB4A000
|
trusted library allocation
|
page read and write
|
||
273B000
|
heap
|
page read and write
|
||
9C0000
|
heap
|
page read and write
|
||
28C5F160000
|
heap
|
page read and write
|
||
146E000
|
stack
|
page read and write
|
||
7FFD9B9A4000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBBD000
|
trusted library allocation
|
page read and write
|
||
13F0000
|
unkown
|
page readonly
|
||
F05000
|
heap
|
page read and write
|
||
3987000
|
trusted library allocation
|
page read and write
|
||
18EE000
|
stack
|
page read and write
|
||
13F2000
|
unkown
|
page readonly
|
||
7FFD9BBA4000
|
trusted library allocation
|
page read and write
|
||
279E000
|
heap
|
page read and write
|
||
7FFD9BB7C000
|
trusted library allocation
|
page read and write
|
||
1B0C0000
|
trusted library allocation
|
page read and write
|
||
1B94E000
|
heap
|
page read and write
|
||
3953000
|
trusted library allocation
|
page read and write
|
||
2540000
|
stack
|
page read and write
|
||
7FFD9BE10000
|
trusted library allocation
|
page read and write
|
||
31A5000
|
trusted library allocation
|
page read and write
|
||
2D10000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9AD000
|
trusted library allocation
|
page execute and read and write
|
||
2D51000
|
heap
|
page read and write
|
||
7FFD9BBB5000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBC2000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB9D000
|
trusted library allocation
|
page read and write
|
||
1210000
|
heap
|
page read and write
|
||
1C14E000
|
stack
|
page read and write
|
||
1085000
|
heap
|
page read and write
|
||
2746000
|
heap
|
page read and write
|
||
397B000
|
trusted library allocation
|
page read and write
|
||
2DB2000
|
heap
|
page read and write
|
||
1F7A98B0000
|
direct allocation
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
2E99000
|
heap
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
317F000
|
trusted library allocation
|
page read and write
|
||
1400000
|
heap
|
page read and write
|
||
1685000
|
heap
|
page read and write
|
||
7FFD9BBAC000
|
trusted library allocation
|
page read and write
|
||
1C089000
|
heap
|
page read and write
|
||
27D3000
|
heap
|
page read and write
|
||
6C1E000
|
stack
|
page read and write
|
||
7FFD9BBE0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B983000
|
trusted library allocation
|
page execute and read and write
|
||
2E41000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB3C000
|
trusted library allocation
|
page read and write
|
||
27DB000
|
heap
|
page read and write
|
||
1B70E000
|
stack
|
page read and write
|
||
39AF000
|
trusted library allocation
|
page read and write
|
||
9B0000
|
unkown
|
page readonly
|
||
3933000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9C8000
|
trusted library allocation
|
page read and write
|
||
540E000
|
stack
|
page read and write
|
||
B6C000
|
heap
|
page read and write
|
||
2CB2000
|
trusted library allocation
|
page read and write
|
||
2D07000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB3A000
|
trusted library allocation
|
page read and write
|
||
1F7A97B0000
|
heap
|
page read and write
|
||
1F7A7EE9000
|
heap
|
page read and write
|
||
12D5000
|
heap
|
page read and write
|
||
5170000
|
heap
|
page read and write
|
||
108E000
|
heap
|
page read and write
|
||
1B5CD000
|
stack
|
page read and write
|
||
D2F000
|
stack
|
page read and write
|
||
7FFD9BBC4000
|
trusted library allocation
|
page read and write
|
||
1F7A7E7D000
|
heap
|
page read and write
|
||
1F7A7EBA000
|
heap
|
page read and write
|
||
13047000
|
trusted library allocation
|
page read and write
|
||
13091000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB30000
|
trusted library allocation
|
page read and write
|
||
2680000
|
heap
|
page read and write
|
||
7FFD9BAF1000
|
trusted library allocation
|
page execute and read and write
|
||
1409000
|
heap
|
page read and write
|
||
3049000
|
trusted library allocation
|
page read and write
|
||
29DE000
|
stack
|
page read and write
|
||
12BD1000
|
trusted library allocation
|
page read and write
|
||
31BA000
|
trusted library allocation
|
page read and write
|
||
1078000
|
heap
|
page read and write
|
||
2B6F000
|
trusted library allocation
|
page read and write
|
||
4A1E000
|
stack
|
page read and write
|
||
31DC000
|
heap
|
page read and write
|
||
DF8B87F000
|
stack
|
page read and write
|
||
7FFD9BB38000
|
trusted library allocation
|
page read and write
|
||
12AC000
|
heap
|
page read and write
|
||
7FFD9BAB0000
|
trusted library allocation
|
page execute and read and write
|
||
2C58000
|
trusted library allocation
|
page read and write
|
||
20FBFDE0000
|
heap
|
page read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page read and write
|
||
135AE000
|
trusted library allocation
|
page read and write
|
||
D30000
|
heap
|
page read and write
|
||
1094000
|
heap
|
page read and write
|
||
2B40000
|
trusted library allocation
|
page read and write
|
||
10D6000
|
heap
|
page read and write
|
||
1F7A9730000
|
direct allocation
|
page read and write
|
||
11D0000
|
trusted library allocation
|
page read and write
|
||
1260000
|
trusted library allocation
|
page read and write
|
||
28C5EE40000
|
heap
|
page read and write
|
||
7FFD9BAB0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B9CD000
|
trusted library allocation
|
page execute and read and write
|
||
2D8D000
|
heap
|
page read and write
|
||
26EE000
|
stack
|
page read and write
|
||
2FEE000
|
stack
|
page read and write
|
||
31F9000
|
trusted library allocation
|
page read and write
|
||
2558000
|
stack
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page execute and read and write
|
||
6220000
|
trusted library allocation
|
page read and write
|
||
11F0000
|
trusted library allocation
|
page read and write
|
||
2D50000
|
heap
|
page read and write
|
||
273F000
|
heap
|
page read and write
|
||
16A5000
|
heap
|
page read and write
|
||
1070000
|
heap
|
page read and write
|
||
1B938000
|
heap
|
page read and write
|
||
2D81000
|
trusted library allocation
|
page read and write
|
||
2B2F000
|
trusted library allocation
|
page read and write
|
||
10EB000
|
heap
|
page read and write
|
||
7FFD9B9BC000
|
trusted library allocation
|
page read and write
|
||
2D7B000
|
heap
|
page read and write
|
||
7FFD9BB5C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B99C000
|
trusted library allocation
|
page read and write
|
||
F87E0FE000
|
stack
|
page read and write
|
||
273E000
|
heap
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B8000
|
trusted library allocation
|
page read and write
|
||
2E3D000
|
trusted library allocation
|
page read and write
|
||
2B3C000
|
trusted library allocation
|
page read and write
|
||
30E9000
|
trusted library allocation
|
page read and write
|
||
2D09000
|
trusted library allocation
|
page read and write
|
||
17EE000
|
stack
|
page read and write
|
||
2B60000
|
heap
|
page read and write
|
||
1295000
|
heap
|
page read and write
|
||
2EAD000
|
heap
|
page read and write
|
||
7FFD9BB9E000
|
trusted library allocation
|
page read and write
|
||
13C0000
|
heap
|
page read and write
|
||
1BB6E000
|
stack
|
page read and write
|
||
7FFD9BCA2000
|
trusted library allocation
|
page read and write
|
||
1C164000
|
heap
|
page read and write
|
||
12CE000
|
stack
|
page read and write
|
||
FF5000
|
heap
|
page read and write
|
||
2EF6000
|
trusted library allocation
|
page read and write
|
||
29C0000
|
heap
|
page execute and read and write
|
||
1F7A7E24000
|
heap
|
page read and write
|
||
2E7A000
|
trusted library allocation
|
page read and write
|
||
28C5EF82000
|
heap
|
page read and write
|
||
7FFD9BCE0000
|
trusted library allocation
|
page read and write
|
||
2D7E000
|
heap
|
page read and write
|
||
1B86E000
|
stack
|
page read and write
|
||
2D79000
|
heap
|
page read and write
|
||
3983000
|
trusted library allocation
|
page read and write
|
||
2ACF000
|
stack
|
page read and write
|
||
1F7A7E89000
|
heap
|
page read and write
|
||
2D70000
|
heap
|
page read and write
|
||
C2E000
|
heap
|
page read and write
|
||
29F2A477000
|
heap
|
page read and write
|
||
EDE000
|
stack
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
1B3F0000
|
trusted library allocation
|
page read and write
|
||
2AF1000
|
trusted library allocation
|
page read and write
|
||
3943000
|
trusted library allocation
|
page read and write
|
||
12CA1000
|
trusted library allocation
|
page read and write
|
||
36FF000
|
trusted library allocation
|
page read and write
|
||
1F7A7E88000
|
heap
|
page read and write
|
||
4A4B000
|
heap
|
page read and write
|
||
1F7A9850000
|
direct allocation
|
page read and write
|
||
1BC2E000
|
stack
|
page read and write
|
||
7FFD9B9A4000
|
trusted library allocation
|
page read and write
|
||
1B760000
|
heap
|
page read and write
|
||
12BA1000
|
trusted library allocation
|
page read and write
|
||
2DAE000
|
stack
|
page read and write
|
||
31B0000
|
heap
|
page read and write
|
||
1F7A9773000
|
direct allocation
|
page read and write
|
||
1F7A7EE0000
|
heap
|
page read and write
|
||
7FFD9BB50000
|
trusted library allocation
|
page read and write
|
||
302E000
|
stack
|
page read and write
|
||
7FFD9BBD0000
|
trusted library allocation
|
page read and write
|
||
256B000
|
stack
|
page read and write
|
||
11C4000
|
heap
|
page read and write
|
||
2B2D000
|
trusted library allocation
|
page read and write
|
||
2D7C000
|
heap
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page read and write
|
||
1B901000
|
heap
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BB94000
|
trusted library allocation
|
page read and write
|
||
98D13FE000
|
stack
|
page read and write
|
||
29F2A824000
|
heap
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
14C2000
|
heap
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
1F7A7EDB000
|
heap
|
page read and write
|
||
397D000
|
trusted library allocation
|
page read and write
|
||
2D28000
|
heap
|
page read and write
|
||
2D87000
|
heap
|
page read and write
|
||
3927000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBF0000
|
trusted library allocation
|
page execute and read and write
|
||
2C3E000
|
trusted library allocation
|
page read and write
|
||
6D3F000
|
stack
|
page read and write
|
||
3201000
|
trusted library allocation
|
page read and write
|
||
291B000
|
stack
|
page read and write
|
||
137E000
|
stack
|
page read and write
|
||
2EE5000
|
trusted library allocation
|
page read and write
|
||
1B90E000
|
stack
|
page read and write
|
||
7FFD9BB5A000
|
trusted library allocation
|
page read and write
|
||
1240000
|
trusted library allocation
|
page read and write
|
||
1B691000
|
heap
|
page read and write
|
||
7FFD9BBB4000
|
trusted library allocation
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
182000
|
unkown
|
page read and write
|
||
1640000
|
heap
|
page read and write
|
||
28C5EF93000
|
heap
|
page read and write
|
||
110A000
|
heap
|
page read and write
|
||
27DB000
|
heap
|
page read and write
|
||
129F1000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBB7000
|
trusted library allocation
|
page read and write
|
||
1F7A7E96000
|
heap
|
page read and write
|
||
1BD99000
|
heap
|
page read and write
|
||
B4B000
|
heap
|
page read and write
|
||
1F7A7E9F000
|
heap
|
page read and write
|
||
7FFD9BB36000
|
trusted library allocation
|
page read and write
|
||
317D000
|
trusted library allocation
|
page read and write
|
||
10E1000
|
stack
|
page read and write
|
||
1135000
|
heap
|
page read and write
|
||
7FFD9B9B3000
|
trusted library allocation
|
page read and write
|
||
29DE000
|
stack
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
28C5EF20000
|
heap
|
page read and write
|
||
98D11FE000
|
stack
|
page read and write
|
||
7FFD9BB47000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB70000
|
trusted library allocation
|
page execute and read and write
|
||
1E1ABBE2000
|
heap
|
page read and write
|
||
90C0FF000
|
unkown
|
page read and write
|
||
399B000
|
trusted library allocation
|
page read and write
|
||
11DE000
|
stack
|
page read and write
|
||
184000
|
unkown
|
page readonly
|
||
2749000
|
heap
|
page read and write
|
||
7FFD9BEF0000
|
trusted library allocation
|
page execute and read and write
|
||
1E1ABBE2000
|
heap
|
page read and write
|
||
2BB36210000
|
heap
|
page read and write
|
||
2D62000
|
heap
|
page read and write
|
||
7FFD9BB67000
|
trusted library allocation
|
page read and write
|
||
2D87000
|
heap
|
page read and write
|
||
7FFD9B9DC000
|
trusted library allocation
|
page execute and read and write
|
||
1F7A7E8F000
|
heap
|
page read and write
|
||
1F7A978B000
|
direct allocation
|
page read and write
|
||
1F7A98D0000
|
direct allocation
|
page read and write
|
||
2D78000
|
heap
|
page read and write
|
||
7FFD9BEC0000
|
trusted library allocation
|
page read and write
|
||
131F1000
|
trusted library allocation
|
page read and write
|
||
1456000
|
heap
|
page read and write
|
||
2EBD000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBA5000
|
trusted library allocation
|
page read and write
|
||
2C35000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF01000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9CB000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B9A3000
|
trusted library allocation
|
page read and write
|
||
12BDE000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB43000
|
trusted library allocation
|
page read and write
|
||
393F000
|
trusted library allocation
|
page read and write
|
||
1C030000
|
heap
|
page read and write
|
||
34C0AFC000
|
stack
|
page read and write
|
||
2C4F000
|
trusted library allocation
|
page read and write
|
||
2BB35F6A000
|
heap
|
page read and write
|
||
1BE20000
|
heap
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
20FBFD90000
|
heap
|
page read and write
|
||
D51000
|
stack
|
page read and write
|
||
2B66000
|
trusted library allocation
|
page read and write
|
||
27D3000
|
heap
|
page read and write
|
||
3013000
|
heap
|
page execute and read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page read and write
|
||
1E1ABBE2000
|
heap
|
page read and write
|
||
7FFD9B9BC000
|
trusted library allocation
|
page read and write
|
||
1B96E000
|
stack
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
1B8BE000
|
heap
|
page read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page read and write
|
||
2D47000
|
heap
|
page read and write
|
||
7FFD9BB8D000
|
trusted library allocation
|
page read and write
|
||
544E000
|
stack
|
page read and write
|
||
2BB35F30000
|
heap
|
page read and write
|
||
B6E000
|
heap
|
page read and write
|
||
7FFD9BB57000
|
trusted library allocation
|
page read and write
|
||
20FC00C0000
|
heap
|
page read and write
|
||
2D82000
|
heap
|
page read and write
|
||
1E1ABB60000
|
heap
|
page read and write
|
||
2685000
|
heap
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page execute and read and write
|
||
1E1ABBD2000
|
heap
|
page read and write
|
||
1040000
|
trusted library allocation
|
page read and write
|
||
1278000
|
heap
|
page read and write
|
||
2749000
|
heap
|
page read and write
|
||
7FFD9B984000
|
trusted library allocation
|
page read and write
|
||
2D67000
|
heap
|
page read and write
|
||
3212000
|
trusted library allocation
|
page read and write
|
||
1BA5E000
|
stack
|
page read and write
|
||
165000
|
unkown
|
page read and write
|
||
131E000
|
heap
|
page read and write
|
||
7FFD9BBAD000
|
trusted library allocation
|
page read and write
|
||
1E1ABA60000
|
heap
|
page read and write
|
||
2B00000
|
trusted library allocation
|
page read and write
|
||
2E52000
|
trusted library allocation
|
page read and write
|
||
2F40000
|
trusted library allocation
|
page read and write
|
||
135C0000
|
trusted library allocation
|
page read and write
|
||
2D74000
|
heap
|
page read and write
|
||
2D8E000
|
heap
|
page read and write
|
||
1080000
|
heap
|
page read and write
|
||
1F7A9954000
|
heap
|
page read and write
|
||
39B7000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page read and write
|
||
1475000
|
heap
|
page read and write
|
||
1660000
|
heap
|
page read and write
|
||
1BA6E000
|
stack
|
page read and write
|
||
16E5000
|
heap
|
page read and write
|
||
7FFD9BCB0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA36000
|
trusted library allocation
|
page read and write
|
||
2D88000
|
heap
|
page read and write
|
||
7FFD9BA56000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9BD000
|
trusted library allocation
|
page execute and read and write
|
||
31B2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B99D000
|
trusted library allocation
|
page execute and read and write
|
||
1270000
|
heap
|
page read and write
|
||
7FFD9B9B3000
|
trusted library allocation
|
page execute and read and write
|
||
1620000
|
heap
|
page read and write
|
||
38CB000
|
trusted library allocation
|
page read and write
|
||
2D65000
|
heap
|
page read and write
|
||
2D6F000
|
heap
|
page read and write
|
||
39A5000
|
trusted library allocation
|
page read and write
|
||
1B1B0000
|
heap
|
page read and write
|
||
7FFD9B99D000
|
trusted library allocation
|
page execute and read and write
|
||
1F7A9830000
|
direct allocation
|
page read and write
|
||
10F5000
|
heap
|
page read and write
|
||
1F7A985B000
|
direct allocation
|
page read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9C4000
|
trusted library allocation
|
page read and write
|
||
1430000
|
heap
|
page read and write
|
||
2990000
|
heap
|
page read and write
|
||
7FFD9BBA2000
|
trusted library allocation
|
page read and write
|
||
2C6A000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page execute and read and write
|
||
3197000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9EC000
|
trusted library allocation
|
page execute and read and write
|
||
2E57000
|
trusted library allocation
|
page read and write
|
||
1CB8E000
|
stack
|
page read and write
|
||
CE1000
|
stack
|
page read and write
|
||
1B690000
|
heap
|
page read and write
|
||
1F7A7EB8000
|
heap
|
page read and write
|
||
321D000
|
trusted library allocation
|
page read and write
|
||
20FBFDE7000
|
heap
|
page read and write
|
||
7FFD9B9A4000
|
trusted library allocation
|
page read and write
|
||
27D2000
|
heap
|
page read and write
|
||
29E0000
|
heap
|
page execute and read and write
|
||
7FFD9BAB0000
|
trusted library allocation
|
page execute and read and write
|
||
1C132000
|
heap
|
page read and write
|
||
2EDF000
|
trusted library allocation
|
page read and write
|
||
4E1E000
|
stack
|
page read and write
|
||
7FFD9B9C3000
|
trusted library allocation
|
page read and write
|
||
28C5F1D0000
|
heap
|
page read and write
|
||
2D47000
|
heap
|
page read and write
|
||
2950000
|
heap
|
page read and write
|
||
1C1BC000
|
heap
|
page read and write
|
||
1C059000
|
heap
|
page read and write
|
||
2849000
|
heap
|
page read and write
|
||
31FB000
|
trusted library allocation
|
page read and write
|
||
153000
|
unkown
|
page readonly
|
||
110C000
|
heap
|
page read and write
|
||
20FBFC90000
|
heap
|
page read and write
|
||
13051000
|
trusted library allocation
|
page read and write
|
||
506F000
|
stack
|
page read and write
|
||
2B4D000
|
trusted library allocation
|
page read and write
|
||
2DD8000
|
heap
|
page read and write
|
||
1F7A7EA5000
|
heap
|
page read and write
|
||
7FFD9BB70000
|
trusted library allocation
|
page read and write
|
||
1470000
|
heap
|
page read and write
|
||
10AB000
|
heap
|
page read and write
|
||
7FFD9BBE0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB56000
|
trusted library allocation
|
page read and write
|
||
12D87000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAA0000
|
trusted library allocation
|
page execute and read and write
|
||
12DE1000
|
trusted library allocation
|
page read and write
|
||
2D6B000
|
heap
|
page read and write
|
||
1F7A98F0000
|
direct allocation
|
page read and write
|
||
12AD1000
|
trusted library allocation
|
page read and write
|
||
27AC000
|
heap
|
page read and write
|
||
3165000
|
trusted library allocation
|
page read and write
|
||
1B922000
|
heap
|
page read and write
|
||
1B8C6000
|
heap
|
page read and write
|
||
20FBFDEA000
|
heap
|
page read and write
|
||
1E1ABDA0000
|
heap
|
page read and write
|
||
1E1ABB40000
|
heap
|
page read and write
|
||
1360000
|
heap
|
page read and write
|
||
1B30D000
|
stack
|
page read and write
|
||
1C1B6000
|
heap
|
page read and write
|
||
2C50000
|
heap
|
page execute and read and write
|
||
257A000
|
stack
|
page read and write
|
||
4920000
|
heap
|
page read and write
|
||
B58000
|
heap
|
page read and write
|
||
2ADF000
|
stack
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page read and write
|
||
1B07D000
|
stack
|
page read and write
|
||
7FFD9BA3C000
|
trusted library allocation
|
page execute and read and write
|
||
474F000
|
stack
|
page read and write
|
||
1491000
|
heap
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
10D0000
|
heap
|
page read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC00000
|
trusted library allocation
|
page read and write
|
||
1C58E000
|
stack
|
page read and write
|
||
33C9000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA0C000
|
trusted library allocation
|
page execute and read and write
|
||
1B83B000
|
stack
|
page read and write
|
||
1F7A7EBC000
|
heap
|
page read and write
|
||
7FFD9BB44000
|
trusted library allocation
|
page read and write
|
||
B30000
|
heap
|
page read and write
|
||
31EF000
|
trusted library allocation
|
page read and write
|
||
1B50B000
|
stack
|
page read and write
|
||
3192000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page read and write
|
||
2569000
|
stack
|
page read and write
|
||
4E9E000
|
stack
|
page read and write
|
||
7FFD9B9BD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BB84000
|
trusted library allocation
|
page read and write
|
||
2E5F000
|
trusted library allocation
|
page read and write
|
||
2DF3000
|
trusted library allocation
|
page read and write
|
||
28C5EF93000
|
heap
|
page read and write
|
||
12F6E000
|
trusted library allocation
|
page read and write
|
||
29F2A470000
|
heap
|
page read and write
|
||
1060000
|
trusted library allocation
|
page read and write
|
||
1F7A7ED8000
|
heap
|
page read and write
|
||
7FFD9BB60000
|
trusted library allocation
|
page read and write
|
||
2D69000
|
heap
|
page read and write
|
||
B9C000
|
heap
|
page read and write
|
||
3949000
|
trusted library allocation
|
page read and write
|
||
1F7A9770000
|
direct allocation
|
page read and write
|
||
1F7A7EE9000
|
heap
|
page read and write
|
||
7FFD9BBAE000
|
trusted library allocation
|
page read and write
|
||
1060000
|
heap
|
page read and write
|
||
121E000
|
stack
|
page read and write
|
||
2B2B000
|
trusted library allocation
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
1090000
|
heap
|
page read and write
|
||
12CDE000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B3000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9AD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B99D000
|
trusted library allocation
|
page execute and read and write
|
||
E12000
|
heap
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page read and write
|
||
1370000
|
heap
|
page read and write
|
||
593B000
|
stack
|
page read and write
|
||
2D62000
|
heap
|
page read and write
|
||
2749000
|
heap
|
page read and write
|
||
1310000
|
trusted library allocation
|
page read and write
|
||
2C31000
|
trusted library allocation
|
page read and write
|
||
133F000
|
stack
|
page read and write
|
||
3945000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA66000
|
trusted library allocation
|
page read and write
|
||
29F2A410000
|
heap
|
page read and write
|
||
394F000
|
trusted library allocation
|
page read and write
|
||
1C0B5000
|
heap
|
page read and write
|
||
1E1ABBAA000
|
heap
|
page read and write
|
||
1C62E000
|
stack
|
page read and write
|
||
2D01000
|
trusted library allocation
|
page read and write
|
||
10D8000
|
heap
|
page read and write
|
||
1C14A000
|
heap
|
page read and write
|
||
1C890000
|
heap
|
page read and write
|
||
1F7A7E00000
|
heap
|
page read and write
|
||
135BB000
|
trusted library allocation
|
page read and write
|
||
27D2000
|
heap
|
page read and write
|
||
7FFD9BBA7000
|
trusted library allocation
|
page read and write
|
||
104E000
|
heap
|
page read and write
|
||
28C5F1D4000
|
heap
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
1BF2A000
|
stack
|
page read and write
|
||
1E1ABBD1000
|
heap
|
page read and write
|
||
1F7A7ED9000
|
heap
|
page read and write
|
||
7FFD9BE60000
|
trusted library allocation
|
page read and write
|
||
102C000
|
heap
|
page read and write
|
||
2E50000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9AD000
|
trusted library allocation
|
page execute and read and write
|
||
1F7A9870000
|
direct allocation
|
page read and write
|
||
7FFD9BBBE000
|
trusted library allocation
|
page read and write
|
||
2D24000
|
trusted library allocation
|
page read and write
|
||
1BD40000
|
heap
|
page read and write
|
||
12AF1000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A2000
|
trusted library allocation
|
page read and write
|
||
10AD000
|
heap
|
page read and write
|
||
6B21000
|
heap
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB50000
|
trusted library allocation
|
page read and write
|
||
1062000
|
heap
|
page read and write
|
||
1F7A7EAA000
|
heap
|
page read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
27D4000
|
heap
|
page read and write
|
||
2EF2000
|
trusted library allocation
|
page read and write
|
||
29F1000
|
trusted library allocation
|
page read and write
|
||
2D79000
|
heap
|
page read and write
|
||
38EE000
|
trusted library allocation
|
page read and write
|
||
2D89000
|
heap
|
page read and write
|
||
7FFD9B9AC000
|
trusted library allocation
|
page read and write
|
||
2777000
|
heap
|
page read and write
|
||
33B0000
|
heap
|
page execute and read and write
|
||
761000
|
stack
|
page read and write
|
||
F87E07C000
|
stack
|
page read and write
|
||
1F7A7D00000
|
heap
|
page read and write
|
||
2D20000
|
heap
|
page read and write
|
||
303E000
|
stack
|
page read and write
|
||
7FFD9BB46000
|
trusted library allocation
|
page read and write
|
||
2E54000
|
trusted library allocation
|
page read and write
|
||
121000
|
unkown
|
page execute read
|
||
7FFD9BC25000
|
trusted library allocation
|
page read and write
|
||
1510000
|
heap
|
page read and write
|
||
7FFD9BB28000
|
trusted library allocation
|
page read and write
|
||
1F7A7E9F000
|
heap
|
page read and write
|
||
2EC2000
|
trusted library allocation
|
page read and write
|
||
FCE000
|
stack
|
page read and write
|
||
2710000
|
heap
|
page read and write
|
||
2D1B000
|
trusted library allocation
|
page read and write
|
||
1F7A7EAA000
|
heap
|
page read and write
|
||
2F30000
|
heap
|
page execute and read and write
|
||
1F7A7EE9000
|
heap
|
page read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page execute and read and write
|
||
12CEB000
|
trusted library allocation
|
page read and write
|
||
12D81000
|
trusted library allocation
|
page read and write
|
||
E3B000
|
heap
|
page read and write
|
||
7FFD9B993000
|
trusted library allocation
|
page execute and read and write
|
||
254E000
|
stack
|
page read and write
|
||
5550000
|
heap
|
page read and write
|
||
31F3000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB77000
|
trusted library allocation
|
page read and write
|
||
32F0000
|
heap
|
page read and write
|
||
1390000
|
heap
|
page execute and read and write
|
||
1030000
|
trusted library allocation
|
page read and write
|
||
2D1A88E0000
|
heap
|
page read and write
|
||
2C53000
|
trusted library allocation
|
page read and write
|
||
31C9000
|
heap
|
page read and write
|
||
31B4000
|
trusted library allocation
|
page read and write
|
||
1F7A9890000
|
direct allocation
|
page read and write
|
||
1F7A7E9F000
|
heap
|
page read and write
|
||
1E1ABBE2000
|
heap
|
page read and write
|
||
7FFD9BB57000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9CC000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE30000
|
trusted library allocation
|
page read and write
|
||
1BDDF000
|
heap
|
page read and write
|
||
1680000
|
heap
|
page read and write
|
||
4E5E000
|
stack
|
page read and write
|
||
120000
|
unkown
|
page readonly
|
||
1F7A7EE7000
|
heap
|
page read and write
|
||
34FB000
|
trusted library allocation
|
page read and write
|
||
2549000
|
stack
|
page read and write
|
||
7FFD9B9AB000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BE40000
|
trusted library allocation
|
page read and write
|
||
1BDD3000
|
heap
|
page read and write
|
||
1B4AF000
|
stack
|
page read and write
|
||
27DB000
|
heap
|
page read and write
|
||
1F7A9759000
|
direct allocation
|
page read and write
|
||
7FFD9BB20000
|
trusted library allocation
|
page read and write
|
||
1C0CC000
|
heap
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
2D1A8830000
|
heap
|
page read and write
|
||
1F7A7E7D000
|
heap
|
page read and write
|
||
1B910000
|
heap
|
page read and write
|
||
1C42E000
|
stack
|
page read and write
|
||
2DB2000
|
heap
|
page read and write
|
||
90C1FF000
|
stack
|
page read and write
|
||
1C06E000
|
heap
|
page read and write
|
||
29F2A400000
|
heap
|
page read and write
|
||
27D1000
|
heap
|
page read and write
|
||
2D41000
|
heap
|
page read and write
|
||
2E25000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBB2000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA5C000
|
trusted library allocation
|
page execute and read and write
|
||
2D75000
|
heap
|
page read and write
|
||
7FFD9BB65000
|
trusted library allocation
|
page read and write
|
||
2B50000
|
heap
|
page read and write
|
||
1BDE3000
|
heap
|
page read and write
|
||
1AE6D000
|
stack
|
page read and write
|
||
7FFD9BC20000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9BB000
|
trusted library allocation
|
page execute and read and write
|
||
2E3F000
|
trusted library allocation
|
page read and write
|
||
9B0000
|
unkown
|
page readonly
|
||
1BA20000
|
heap
|
page read and write
|
||
28C5EF7E000
|
heap
|
page read and write
|
||
2D6D000
|
heap
|
page read and write
|
||
9F2000
|
unkown
|
page readonly
|
||
DA0000
|
heap
|
page read and write
|
||
1B5AF000
|
stack
|
page read and write
|
||
2DCF000
|
trusted library allocation
|
page read and write
|
||
3194000
|
trusted library allocation
|
page read and write
|
||
2B67000
|
heap
|
page read and write
|
||
1C09C000
|
heap
|
page read and write
|
||
2E45000
|
trusted library allocation
|
page read and write
|
||
1B515000
|
heap
|
page read and write
|
||
EB0000
|
heap
|
page read and write
|
||
1F7A7E89000
|
heap
|
page read and write
|
||
2AE9000
|
heap
|
page read and write
|
||
1F7A7ED0000
|
heap
|
page read and write
|
||
4A30000
|
heap
|
page read and write
|
||
1064000
|
heap
|
page read and write
|
||
2DAB000
|
heap
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page read and write
|
||
2B6B000
|
heap
|
page read and write
|
||
29C0000
|
heap
|
page execute and read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page read and write
|
||
1BD7F000
|
heap
|
page read and write
|
||
1E1ABBD1000
|
heap
|
page read and write
|
||
1B95E000
|
stack
|
page read and write
|
||
7FFD9BBD0000
|
trusted library allocation
|
page read and write
|
||
2C47000
|
trusted library allocation
|
page read and write
|
||
1B1C6000
|
heap
|
page read and write
|
||
7FFD9BB84000
|
trusted library allocation
|
page read and write
|
||
49CE000
|
stack
|
page read and write
|
||
7FFD9BBA2000
|
trusted library allocation
|
page read and write
|
||
2749000
|
heap
|
page read and write
|
||
12D91000
|
trusted library allocation
|
page read and write
|
||
2ECE000
|
trusted library allocation
|
page read and write
|
||
13041000
|
trusted library allocation
|
page read and write
|
||
1F7A7E7A000
|
heap
|
page read and write
|
||
DD6000
|
heap
|
page read and write
|
||
2DCC000
|
trusted library allocation
|
page read and write
|
||
1BE07000
|
heap
|
page read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page execute and read and write
|
||
319F000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBB2000
|
trusted library allocation
|
page read and write
|
||
27D3000
|
heap
|
page read and write
|
||
2D77000
|
heap
|
page read and write
|
||
1B906000
|
heap
|
page read and write
|
||
9B2000
|
unkown
|
page readonly
|
||
2D1A88E9000
|
heap
|
page read and write
|
||
4D1D000
|
stack
|
page read and write
|
||
25F0000
|
heap
|
page readonly
|
||
7FFD9BBD0000
|
trusted library allocation
|
page read and write
|
||
3080000
|
heap
|
page execute and read and write
|
||
1330000
|
trusted library allocation
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
31A7000
|
trusted library allocation
|
page read and write
|
||
263D000
|
stack
|
page read and write
|
||
DDC000
|
heap
|
page read and write
|
||
AD0000
|
heap
|
page read and write
|
||
1BF4E000
|
stack
|
page read and write
|
||
1B93D000
|
heap
|
page read and write
|
||
1E1ABBA0000
|
heap
|
page read and write
|
||
29F2A430000
|
heap
|
page read and write
|
||
1F7A7EC0000
|
heap
|
page read and write
|
||
7FFD9BA66000
|
trusted library allocation
|
page execute and read and write
|
||
2B56000
|
trusted library allocation
|
page read and write
|
||
1C109000
|
heap
|
page read and write
|
||
31B8000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBD0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
1C04E000
|
stack
|
page read and write
|
||
2C33000
|
trusted library allocation
|
page read and write
|
||
12CF4000
|
trusted library allocation
|
page read and write
|
||
3991000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA86000
|
trusted library allocation
|
page execute and read and write
|
||
1BB2E000
|
stack
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
1F7A7E8B000
|
heap
|
page read and write
|
||
28C5EF94000
|
heap
|
page read and write
|
||
31D9000
|
heap
|
page read and write
|
There are 1206 hidden memdumps, click here to show them.