Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
olPUTAxpzu.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_olPUTAxpzu.exe_e22b91f83659b5e64951010ad9cc6d1b32c47_5da1df81_19bd84ad\Report.wer
|
Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6D9B.tmp.dmp
|
Mini DuMP crash report, 14 streams, Wed Apr 20 22:09:27 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER759B.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7732.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\olPUTAxpzu.exe
|
"C:\Users\user\Desktop\olPUTAxpzu.exe"
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 4912 -s 1240
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 4912 -s 1240
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://api.brutalhax.net/
|
unknown
|
||
https://api.brutal-hax.net/notification.txt
|
unknown
|
||
https://api.brutal-hax.net/Online/get_online_users.php?username=
|
unknown
|
||
https://api.brutal-hax.net/loader_authentification_new.php?username=
|
unknown
|
||
https://api.brutal-hax.net/loader_statut_new.php
|
unknown
|
||
https://help.ea.com/en/help/faq/how-to-clean-boot-your-pc/
|
unknown
|
||
http://pki-ocsp.symauth.com0
|
unknown
|
||
https://api.brutal-hax.net/Driver/Driver1.8_x64.sys
|
unknown
|
||
https://discord.gg/brutal-hax
|
unknown
|
||
http://foo/bhicon.png
|
unknown
|
||
http://defaultcontainer/Login.xaml
|
unknown
|
||
https://api.brutal-hax.net/loader_cheat_info_ex.php?index=
|
unknown
|
||
http://pki-crl.symauth.com/offlineca/TheInstituteofElectricalandElectronicsEngineersIncIEEERootCA.cr
|
unknown
|
||
https://api.brutal-hax.net/loader_get_cheats.php?username=
|
unknown
|
||
https://brutal-hax.net/
|
unknown
|
||
http://defaultcontainer/bhicon.png
|
unknown
|
||
http://foo/bar/bhicon.png
|
unknown
|
||
https://api.brutal-hax.net/loader_version.php
|
unknown
|
||
http://foo/bar/login.baml
|
unknown
|
||
https://api.brutal-hax.net/Online/set_online_status.php?username=
|
unknown
|
||
https://api.brutal-hax.net/info/cheat_status.php?hack_id=
|
unknown
|
||
http://foo/Login.xaml
|
unknown
|
||
http://pki-crl.symauth.com/ca_d409a5cb737dc0768fd08ed5256f3633/LatestCRL.crl07
|
unknown
|
There are 13 hidden URLs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
|
AmiHivePermissionsCorrect
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
|
AmiHiveOwnerCorrect
|
||
\REGISTRY\A\{241b8a8c-f1a0-b382-2900-a541fb473845}\Root\InventoryApplicationFile\olputaxpzu.exe|2e9c9b89
|
ProgramId
|
||
\REGISTRY\A\{241b8a8c-f1a0-b382-2900-a541fb473845}\Root\InventoryApplicationFile\olputaxpzu.exe|2e9c9b89
|
FileId
|
||
\REGISTRY\A\{241b8a8c-f1a0-b382-2900-a541fb473845}\Root\InventoryApplicationFile\olputaxpzu.exe|2e9c9b89
|
LowerCaseLongPath
|
||
\REGISTRY\A\{241b8a8c-f1a0-b382-2900-a541fb473845}\Root\InventoryApplicationFile\olputaxpzu.exe|2e9c9b89
|
LongPathHash
|
||
\REGISTRY\A\{241b8a8c-f1a0-b382-2900-a541fb473845}\Root\InventoryApplicationFile\olputaxpzu.exe|2e9c9b89
|
Name
|
||
\REGISTRY\A\{241b8a8c-f1a0-b382-2900-a541fb473845}\Root\InventoryApplicationFile\olputaxpzu.exe|2e9c9b89
|
Publisher
|
||
\REGISTRY\A\{241b8a8c-f1a0-b382-2900-a541fb473845}\Root\InventoryApplicationFile\olputaxpzu.exe|2e9c9b89
|
Version
|
||
\REGISTRY\A\{241b8a8c-f1a0-b382-2900-a541fb473845}\Root\InventoryApplicationFile\olputaxpzu.exe|2e9c9b89
|
BinFileVersion
|
||
\REGISTRY\A\{241b8a8c-f1a0-b382-2900-a541fb473845}\Root\InventoryApplicationFile\olputaxpzu.exe|2e9c9b89
|
BinaryType
|
||
\REGISTRY\A\{241b8a8c-f1a0-b382-2900-a541fb473845}\Root\InventoryApplicationFile\olputaxpzu.exe|2e9c9b89
|
ProductName
|
||
\REGISTRY\A\{241b8a8c-f1a0-b382-2900-a541fb473845}\Root\InventoryApplicationFile\olputaxpzu.exe|2e9c9b89
|
ProductVersion
|
||
\REGISTRY\A\{241b8a8c-f1a0-b382-2900-a541fb473845}\Root\InventoryApplicationFile\olputaxpzu.exe|2e9c9b89
|
LinkDate
|
||
\REGISTRY\A\{241b8a8c-f1a0-b382-2900-a541fb473845}\Root\InventoryApplicationFile\olputaxpzu.exe|2e9c9b89
|
BinProductVersion
|
||
\REGISTRY\A\{241b8a8c-f1a0-b382-2900-a541fb473845}\Root\InventoryApplicationFile\olputaxpzu.exe|2e9c9b89
|
Size
|
||
\REGISTRY\A\{241b8a8c-f1a0-b382-2900-a541fb473845}\Root\InventoryApplicationFile\olputaxpzu.exe|2e9c9b89
|
Language
|
||
\REGISTRY\A\{241b8a8c-f1a0-b382-2900-a541fb473845}\Root\InventoryApplicationFile\olputaxpzu.exe|2e9c9b89
|
IsPeFile
|
||
\REGISTRY\A\{241b8a8c-f1a0-b382-2900-a541fb473845}\Root\InventoryApplicationFile\olputaxpzu.exe|2e9c9b89
|
IsOsComponent
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
|
ExceptionRecord
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceTicket
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceId
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
ApplicationFlags
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
|
00180008F3870B0F
|
There are 14 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
93F000
|
unkown
|
page readonly
|
||
878000
|
unkown
|
page execute and read and write
|
||
1B261070000
|
heap
|
page read and write
|
||
3A10000
|
trusted library allocation
|
page read and write
|
||
29A3D116000
|
heap
|
page read and write
|
||
86A000
|
unkown
|
page execute and read and write
|
||
936A279000
|
stack
|
page read and write
|
||
4B31000
|
trusted library allocation
|
page read and write
|
||
16C0000
|
direct allocation
|
page read and write
|
||
39C0000
|
trusted library allocation
|
page read and write
|
||
17AC000
|
heap
|
page read and write
|
||
1F470123000
|
heap
|
page read and write
|
||
1BED9194000
|
trusted library allocation
|
page read and write
|
||
962000
|
unkown
|
page readonly
|
||
19DC000
|
stack
|
page read and write
|
||
29A3E000000
|
heap
|
page read and write
|
||
32D1000
|
heap
|
page read and write
|
||
5F30000
|
trusted library allocation
|
page read and write
|
||
1B261000000
|
heap
|
page read and write
|
||
1E212E52000
|
heap
|
page read and write
|
||
29A3D067000
|
heap
|
page read and write
|
||
3B0000
|
unkown
|
page readonly
|
||
1BED9190000
|
trusted library allocation
|
page read and write
|
||
3A20000
|
heap
|
page read and write
|
||
772407E000
|
stack
|
page read and write
|
||
19E0000
|
unclassified section
|
page read and write
|
||
1BED3B02000
|
heap
|
page read and write
|
||
1676000
|
heap
|
page read and write
|
||
1BED3A00000
|
heap
|
page read and write
|
||
32D1000
|
heap
|
page read and write
|
||
1E212CC0000
|
heap
|
page read and write
|
||
1E212CD0000
|
heap
|
page read and write
|
||
29A3DB4D000
|
heap
|
page read and write
|
||
17BD000
|
heap
|
page read and write
|
||
16BE000
|
stack
|
page read and write
|
||
21158FA0000
|
trusted library allocation
|
page read and write
|
||
1C6F4966000
|
heap
|
page read and write
|
||
16DA000
|
heap
|
page read and write
|
||
1A10000
|
trusted library allocation
|
page read and write
|
||
1BED4CA0000
|
trusted library section
|
page readonly
|
||
199F000
|
stack
|
page read and write
|
||
1BED3A8B000
|
heap
|
page read and write
|
||
21159A02000
|
trusted library allocation
|
page read and write
|
||
20DDFD00000
|
heap
|
page read and write
|
||
349D000
|
stack
|
page read and write
|
||
3B2000
|
unkown
|
page execute and read and write
|
||
B14000
|
unkown
|
page execute and read and write
|
||
4FECFBE000
|
stack
|
page read and write
|
||
21159071000
|
heap
|
page read and write
|
||
3A20000
|
heap
|
page read and write
|
||
1C6F4972000
|
heap
|
page read and write
|
||
E54DAF8000
|
stack
|
page read and write
|
||
1BED4C80000
|
trusted library section
|
page readonly
|
||
1BED3A70000
|
heap
|
page read and write
|
||
46776FC000
|
stack
|
page read and write
|
||
3A00000
|
trusted library allocation
|
page read and write
|
||
5CF0000
|
trusted library allocation
|
page read and write
|
||
32E0000
|
heap
|
page read and write
|
||
33D0000
|
trusted library allocation
|
page read and write
|
||
33DD000
|
trusted library allocation
|
page execute and read and write
|
||
1BED4513000
|
heap
|
page read and write
|
||
16BE000
|
stack
|
page read and write
|
||
B35000
|
unkown
|
page execute and read and write
|
||
1F470028000
|
heap
|
page read and write
|
||
1B26103C000
|
heap
|
page read and write
|
||
3A00000
|
trusted library allocation
|
page read and write
|
||
1C6F4950000
|
heap
|
page read and write
|
||
1BED9461000
|
heap
|
page read and write
|
||
936A07A000
|
stack
|
page read and write
|
||
1A13000
|
trusted library allocation
|
page execute and read and write
|
||
1E212E00000
|
heap
|
page read and write
|
||
21159050000
|
heap
|
page read and write
|
||
1B261053000
|
heap
|
page read and write
|
||
33E0000
|
trusted library allocation
|
page read and write
|
||
32D1000
|
heap
|
page read and write
|
||
2E2455F5000
|
heap
|
page read and write
|
||
177B000
|
heap
|
page read and write
|
||
1BED9280000
|
trusted library allocation
|
page read and write
|
||
2E245379000
|
heap
|
page read and write
|
||
3A00000
|
trusted library allocation
|
page read and write
|
||
32D1000
|
heap
|
page read and write
|
||
1670000
|
heap
|
page read and write
|
||
1F470202000
|
heap
|
page read and write
|
||
7C5D14E000
|
stack
|
page read and write
|
||
1BED91B4000
|
trusted library allocation
|
page read and write
|
||
E54DEF7000
|
stack
|
page read and write
|
||
E5594FC000
|
stack
|
page read and write
|
||
B54000
|
unkown
|
page execute and read and write
|
||
1F470302000
|
heap
|
page read and write
|
||
1B261002000
|
heap
|
page read and write
|
||
20DDFB20000
|
heap
|
page read and write
|
||
1674000
|
heap
|
page read and write
|
||
2E246410000
|
trusted library allocation
|
page read and write
|
||
4B41000
|
trusted library allocation
|
page read and write
|
||
33E0000
|
trusted library allocation
|
page read and write
|
||
936A0FF000
|
stack
|
page read and write
|
||
33F2000
|
trusted library allocation
|
page read and write
|
||
29A3D04E000
|
heap
|
page read and write
|
||
61B0000
|
trusted library allocation
|
page read and write
|
||
1F470213000
|
heap
|
page read and write
|
||
B31000
|
unkown
|
page execute and read and write
|
||
7723C7A000
|
stack
|
page read and write
|
||
29A3DB9D000
|
heap
|
page read and write
|
||
878000
|
unkown
|
page execute and read and write
|
||
29A3DB85000
|
heap
|
page read and write
|
||
5C2E000
|
stack
|
page read and write
|
||
2E246140000
|
trusted library allocation
|
page read and write
|
||
4FED6FE000
|
stack
|
page read and write
|
||
1650000
|
direct allocation
|
page read and write
|
||
B39000
|
unkown
|
page execute and read and write
|
||
1BED4518000
|
heap
|
page read and write
|
||
29A3DBCA000
|
heap
|
page read and write
|
||
5E20000
|
heap
|
page execute and read and write
|
||
29A3D8E0000
|
remote allocation
|
page read and write
|
||
2E2453BE000
|
heap
|
page read and write
|
||
33DD000
|
trusted library allocation
|
page execute and read and write
|
||
33F0000
|
trusted library allocation
|
page read and write
|
||
1F470000000
|
unkown
|
page read and write
|
||
1BED9502000
|
heap
|
page read and write
|
||
1BED9412000
|
heap
|
page read and write
|
||
29A3E002000
|
heap
|
page read and write
|
||
17A7000
|
heap
|
page read and write
|
||
1670000
|
heap
|
page read and write
|
||
2E2455F9000
|
heap
|
page read and write
|
||
29A3DB62000
|
heap
|
page read and write
|
||
5D10000
|
heap
|
page read and write
|
||
772437F000
|
stack
|
page read and write
|
||
29A3E003000
|
heap
|
page read and write
|
||
33E0000
|
trusted library allocation
|
page read and write
|
||
1A13000
|
trusted library allocation
|
page execute and read and write
|
||
1E212E13000
|
heap
|
page read and write
|
||
29A3DB3D000
|
heap
|
page read and write
|
||
86A000
|
unkown
|
page execute and read and write
|
||
1F46FDC0000
|
trusted library allocation
|
page read and write
|
||
29A3D0C4000
|
heap
|
page read and write
|
||
1A20000
|
heap
|
page read and write
|
||
345E000
|
stack
|
page read and write
|
||
29A3D0B3000
|
heap
|
page read and write
|
||
1740000
|
heap
|
page read and write
|
||
B47000
|
unkown
|
page execute and read and write
|
||
950000
|
unkown
|
page readonly
|
||
4D5DE7B000
|
stack
|
page read and write
|
||
1BED39D0000
|
heap
|
page read and write
|
||
21159083000
|
heap
|
page read and write
|
||
46778F7000
|
stack
|
page read and write
|
||
1790000
|
heap
|
page read and write
|
||
B69000
|
unkown
|
page execute and read and write
|
||
5E23000
|
heap
|
page execute and read and write
|
||
29A3E002000
|
heap
|
page read and write
|
||
29A3DB72000
|
heap
|
page read and write
|
||
5CF0000
|
trusted library allocation
|
page execute and read and write
|
||
1731000
|
heap
|
page read and write
|
||
1F470021000
|
unkown
|
page read and write
|
||
16C0000
|
direct allocation
|
page read and write
|
||
29A3D0B5000
|
heap
|
page read and write
|
||
29A3DB13000
|
heap
|
page read and write
|
||
1650000
|
direct allocation
|
page read and write
|
||
1BED9454000
|
heap
|
page read and write
|
||
1BED9170000
|
trusted library allocation
|
page read and write
|
||
33F2000
|
trusted library allocation
|
page read and write
|
||
E54D9FF000
|
stack
|
page read and write
|
||
4FED7FF000
|
stack
|
page read and write
|
||
1E212E4C000
|
heap
|
page read and write
|
||
1A20000
|
heap
|
page read and write
|
||
1B2E000
|
stack
|
page read and write
|
||
3B2000
|
unkown
|
page execute read
|
||
1BED3A13000
|
heap
|
page read and write
|
||
1788000
|
heap
|
page read and write
|
||
1C6F4890000
|
heap
|
page read and write
|
||
1C6F498C000
|
heap
|
page read and write
|
||
1B261100000
|
heap
|
page read and write
|
||
3B2E000
|
stack
|
page read and write
|
||
16DA000
|
heap
|
page read and write
|
||
1E212E3C000
|
heap
|
page read and write
|
||
20DE03C0000
|
trusted library allocation
|
page read and write
|
||
936A1F9000
|
stack
|
page read and write
|
||
21159100000
|
heap
|
page read and write
|
||
178D000
|
heap
|
page read and write
|
||
942000
|
unkown
|
page readonly
|
||
1E212F08000
|
heap
|
page read and write
|
||
29A3DB95000
|
heap
|
page read and write
|
||
29A3D0AB000
|
heap
|
page read and write
|
||
29A3D083000
|
heap
|
page read and write
|
||
1E212F00000
|
heap
|
page read and write
|
||
6130000
|
trusted library allocation
|
page read and write
|
||
1650000
|
direct allocation
|
page read and write
|
||
861C8FF000
|
stack
|
page read and write
|
||
5D10000
|
heap
|
page read and write
|
||
1711000
|
heap
|
page read and write
|
||
32D1000
|
heap
|
page read and write
|
||
1711000
|
heap
|
page read and write
|
||
95E000
|
unkown
|
page readonly
|
||
4D5D90B000
|
stack
|
page read and write
|
||
21159102000
|
heap
|
page read and write
|
||
861CB7E000
|
stack
|
page read and write
|
||
1BED3ABB000
|
heap
|
page read and write
|
||
2E2463A0000
|
heap
|
page readonly
|
||
1F470102000
|
trusted library allocation
|
page read and write
|
||
1BED943C000
|
heap
|
page read and write
|
||
2E246150000
|
trusted library allocation
|
page read and write
|
||
32D1000
|
heap
|
page read and write
|
||
38FE000
|
stack
|
page read and write
|
||
2115903C000
|
heap
|
page read and write
|
||
163E000
|
stack
|
page read and write
|
||
29A3E002000
|
heap
|
page read and write
|
||
17A7000
|
heap
|
page read and write
|
||
2E246390000
|
trusted library allocation
|
page read and write
|
||
EC0000
|
unkown
|
page execute read
|
||
1750000
|
heap
|
page read and write
|
||
1C6F498C000
|
heap
|
page read and write
|
||
29A3D029000
|
heap
|
page read and write
|
||
1BED92B0000
|
trusted library allocation
|
page read and write
|
||
1E212E47000
|
heap
|
page read and write
|
||
1BED4C60000
|
trusted library section
|
page readonly
|
||
16D0000
|
heap
|
page read and write
|
||
B54000
|
unkown
|
page execute and read and write
|
||
1BED94FC000
|
heap
|
page read and write
|
||
1741000
|
heap
|
page read and write
|
||
29A3DB89000
|
heap
|
page read and write
|
||
29A3DB00000
|
heap
|
page read and write
|
||
1BED94E3000
|
heap
|
page read and write
|
||
1A10000
|
trusted library allocation
|
page read and write
|
||
1E212E4F000
|
heap
|
page read and write
|
||
29A3DB7F000
|
heap
|
page read and write
|
||
39C0000
|
trusted library allocation
|
page read and write
|
||
29A3E002000
|
heap
|
page read and write
|
||
29A3DB89000
|
heap
|
page read and write
|
||
29A3E002000
|
heap
|
page read and write
|
||
29A3DA02000
|
heap
|
page read and write
|
||
1BED92D0000
|
trusted library allocation
|
page read and write
|
||
E559479000
|
stack
|
page read and write
|
||
20DDFC02000
|
heap
|
page read and write
|
||
1A1D000
|
trusted library allocation
|
page execute and read and write
|
||
1E212E88000
|
heap
|
page read and write
|
||
1B261048000
|
heap
|
page read and write
|
||
962000
|
unkown
|
page readonly
|
||
1788000
|
heap
|
page read and write
|
||
3A29000
|
heap
|
page read and write
|
||
4D5D98E000
|
stack
|
page read and write
|
||
1400000
|
trusted library allocation
|
page read and write
|
||
1650000
|
direct allocation
|
page read and write
|
||
32D1000
|
heap
|
page read and write
|
||
20DDFD13000
|
heap
|
page read and write
|
||
61B0000
|
trusted library allocation
|
page read and write
|
||
1BED9170000
|
trusted library allocation
|
page read and write
|
||
29A3CF20000
|
heap
|
page read and write
|
||
21158F10000
|
heap
|
page read and write
|
||
1BED94F8000
|
heap
|
page read and write
|
||
3410000
|
trusted library allocation
|
page read and write
|
||
16C0000
|
direct allocation
|
page read and write
|
||
21158F00000
|
heap
|
page read and write
|
||
1670000
|
heap
|
page read and write
|
||
1BED9240000
|
trusted library allocation
|
page read and write
|
||
146A000
|
stack
|
page read and write
|
||
1B26104E000
|
heap
|
page read and write
|
||
1740000
|
heap
|
page read and write
|
||
E54DBF7000
|
stack
|
page read and write
|
||
33E6000
|
trusted library allocation
|
page execute and read and write
|
||
5D00000
|
trusted library allocation
|
page read and write
|
||
1BED3AFD000
|
heap
|
page read and write
|
||
467733F000
|
stack
|
page read and write
|
||
29A3DB97000
|
heap
|
page read and write
|
||
1B26104B000
|
heap
|
page read and write
|
||
861C4AD000
|
stack
|
page read and write
|
||
19DC000
|
stack
|
page read and write
|
||
4677BFF000
|
stack
|
page read and write
|
||
E5595F9000
|
stack
|
page read and write
|
||
77240FF000
|
stack
|
page read and write
|
||
34B0000
|
heap
|
page read and write
|
||
1740000
|
heap
|
page read and write
|
||
B60000
|
unkown
|
page execute and read and write
|
||
29A3DB97000
|
heap
|
page read and write
|
||
34A0000
|
trusted library allocation
|
page execute and read and write
|
||
32D1000
|
heap
|
page read and write
|
||
5D14000
|
heap
|
page read and write
|
||
1674000
|
heap
|
page read and write
|
||
1B261029000
|
heap
|
page read and write
|
||
1BED92A0000
|
trusted library allocation
|
page read and write
|
||
29A3DB8C000
|
heap
|
page read and write
|
||
B54000
|
unkown
|
page execute and read and write
|
||
29A3D0F4000
|
heap
|
page read and write
|
||
1744000
|
heap
|
page read and write
|
||
7723E7E000
|
stack
|
page read and write
|
||
7723FFF000
|
stack
|
page read and write
|
||
1734000
|
heap
|
page read and write
|
||
1568000
|
stack
|
page read and write
|
||
1BED3A92000
|
heap
|
page read and write
|
||
5DCC000
|
stack
|
page read and write
|
||
1674000
|
heap
|
page read and write
|
||
1BED3A29000
|
heap
|
page read and write
|
||
29A3DB9F000
|
heap
|
page read and write
|
||
345E000
|
stack
|
page read and write
|
||
29A3DB11000
|
heap
|
page read and write
|
||
11F0000
|
heap
|
page read and write
|
||
2E245310000
|
trusted library allocation
|
page read and write
|
||
2115902A000
|
heap
|
page read and write
|
||
5DCC000
|
stack
|
page read and write
|
||
199F000
|
stack
|
page read and write
|
||
1C6F4974000
|
heap
|
page read and write
|
||
1674000
|
heap
|
page read and write
|
||
1BED94AE000
|
heap
|
page read and write
|
||
1740000
|
heap
|
page read and write
|
||
21159078000
|
heap
|
page read and write
|
||
1F470039000
|
heap
|
page read and write
|
||
6130000
|
trusted library allocation
|
page read and write
|
||
11F0000
|
unkown
|
page read and write
|
||
29A3CF80000
|
heap
|
page read and write
|
||
33F2000
|
trusted library allocation
|
page read and write
|
||
5D14000
|
heap
|
page read and write
|
||
7C5D7FB000
|
stack
|
page read and write
|
||
34A0000
|
trusted library allocation
|
page execute and read and write
|
||
861CC79000
|
stack
|
page read and write
|
||
29A3DBB0000
|
heap
|
page read and write
|
||
E54DDFE000
|
stack
|
page read and write
|
||
77242FA000
|
stack
|
page read and write
|
||
1568000
|
stack
|
page read and write
|
||
349D000
|
stack
|
page read and write
|
||
1A10000
|
trusted library allocation
|
page read and write
|
||
1F470100000
|
trusted library allocation
|
page read and write
|
||
16D0000
|
heap
|
page read and write
|
||
1BED9400000
|
heap
|
page read and write
|
||
20DDFC28000
|
heap
|
page read and write
|
||
38FE000
|
stack
|
page read and write
|
||
34B0000
|
heap
|
page read and write
|
||
1782000
|
heap
|
page read and write
|
||
1BED4518000
|
heap
|
page read and write
|
||
29A3D0EE000
|
heap
|
page read and write
|
||
11F0000
|
unkown
|
page read and write
|
||
16BE000
|
stack
|
page read and write
|
||
16C0000
|
direct allocation
|
page read and write
|
||
1C6F498C000
|
heap
|
page read and write
|
||
3A29000
|
heap
|
page read and write
|
||
32D1000
|
heap
|
page read and write
|
||
32D0000
|
heap
|
page read and write
|
||
20DDFC41000
|
heap
|
page read and write
|
||
3B2E000
|
stack
|
page read and write
|
||
16D0000
|
heap
|
page read and write
|
||
1B261013000
|
heap
|
page read and write
|
||
B35000
|
unkown
|
page execute and read and write
|
||
1F470002000
|
unkown
|
page read and write
|
||
21159000000
|
heap
|
page read and write
|
||
29A3DB9B000
|
heap
|
page read and write
|
||
6030000
|
trusted library allocation
|
page read and write
|
||
29A3D070000
|
heap
|
page read and write
|
||
1BED941D000
|
heap
|
page read and write
|
||
177F000
|
heap
|
page read and write
|
||
950000
|
unkown
|
page readonly
|
||
B31000
|
unkown
|
page execute and read and write
|
||
32D1000
|
heap
|
page read and write
|
||
146A000
|
stack
|
page read and write
|
||
163E000
|
stack
|
page read and write
|
||
19DC000
|
stack
|
page read and write
|
||
1B260F60000
|
trusted library allocation
|
page read and write
|
||
1C6F4967000
|
heap
|
page read and write
|
||
4677AFE000
|
stack
|
page read and write
|
||
29A3DB5B000
|
heap
|
page read and write
|
||
1BED9191000
|
trusted library allocation
|
page read and write
|
||
33F0000
|
trusted library allocation
|
page read and write
|
||
29A3DB99000
|
heap
|
page read and write
|
||
B33000
|
unkown
|
page execute and read and write
|
||
1BED9178000
|
trusted library allocation
|
page read and write
|
||
29A3DB8E000
|
heap
|
page read and write
|
||
29A3DBA8000
|
heap
|
page read and write
|
||
46772BB000
|
stack
|
page read and write
|
||
2115908D000
|
heap
|
page read and write
|
||
29A3DB89000
|
heap
|
page read and write
|
||
772467E000
|
stack
|
page read and write
|
||
E5592FE000
|
stack
|
page read and write
|
||
E54D52C000
|
stack
|
page read and write
|
||
3410000
|
trusted library allocation
|
page read and write
|
||
EC0000
|
unkown
|
page execute read
|
||
345E000
|
stack
|
page read and write
|
||
1E212E46000
|
heap
|
page read and write
|
||
1BED4559000
|
heap
|
page read and write
|
||
2115904B000
|
heap
|
page read and write
|
||
21159013000
|
heap
|
page read and write
|
||
1B26108B000
|
heap
|
page read and write
|
||
1BED4C90000
|
trusted library section
|
page readonly
|
||
1E212F02000
|
heap
|
page read and write
|
||
29A3DB9F000
|
heap
|
page read and write
|
||
1A14000
|
trusted library allocation
|
page read and write
|
||
B33000
|
unkown
|
page execute and read and write
|
||
1711000
|
heap
|
page read and write
|
||
20DDFD02000
|
heap
|
page read and write
|
||
B6C000
|
unkown
|
page execute and read and write
|
||
1BED3A75000
|
heap
|
page read and write
|
||
33FB000
|
trusted library allocation
|
page execute and read and write
|
||
5F30000
|
trusted library allocation
|
page read and write
|
||
86A000
|
unkown
|
page execute and read and write
|
||
1F470300000
|
heap
|
page read and write
|
||
E55937E000
|
stack
|
page read and write
|
||
32D1000
|
heap
|
page read and write
|
||
936A17F000
|
stack
|
page read and write
|
||
5F30000
|
trusted library allocation
|
page read and write
|
||
199F000
|
stack
|
page read and write
|
||
1E212E50000
|
heap
|
page read and write
|
||
6130000
|
trusted library allocation
|
page read and write
|
||
39B0000
|
trusted library allocation
|
page read and write
|
||
1400000
|
trusted library allocation
|
page read and write
|
||
32E0000
|
heap
|
page read and write
|
||
146A000
|
stack
|
page read and write
|
||
3B31000
|
trusted library allocation
|
page read and write
|
||
1E213802000
|
trusted library allocation
|
page read and write
|
||
3B2000
|
unkown
|
page execute and read and write
|
||
1BED4402000
|
heap
|
page read and write
|
||
1B261113000
|
heap
|
page read and write
|
||
772417F000
|
stack
|
page read and write
|
||
5D00000
|
trusted library allocation
|
page read and write
|
||
32D1000
|
heap
|
page read and write
|
||
1650000
|
heap
|
page read and write
|
||
1750000
|
heap
|
page read and write
|
||
17A7000
|
heap
|
page read and write
|
||
E559679000
|
stack
|
page read and write
|
||
20DDFAB0000
|
heap
|
page read and write
|
||
1BED4415000
|
heap
|
page read and write
|
||
32D1000
|
heap
|
page read and write
|
||
29A3DBAD000
|
heap
|
page read and write
|
||
6030000
|
trusted library allocation
|
page read and write
|
||
39B0000
|
trusted library allocation
|
page read and write
|
||
29A3DBA4000
|
heap
|
page read and write
|
||
16C0000
|
direct allocation
|
page read and write
|
||
B60000
|
unkown
|
page execute and read and write
|
||
33E6000
|
trusted library allocation
|
page execute and read and write
|
||
3B0000
|
unkown
|
page readonly
|
||
1B260F30000
|
heap
|
page read and write
|
||
29A3D050000
|
heap
|
page read and write
|
||
936A37C000
|
stack
|
page read and write
|
||
1E212F13000
|
heap
|
page read and write
|
||
32D1000
|
heap
|
page read and write
|
||
936A2FF000
|
stack
|
page read and write
|
||
1BED3A9F000
|
heap
|
page read and write
|
||
1F46FDB0000
|
heap
|
page read and write
|
||
1C6F4B40000
|
heap
|
page read and write
|
||
39B0000
|
trusted library allocation
|
page read and write
|
||
1C6F4962000
|
heap
|
page read and write
|
||
5DD0000
|
trusted library allocation
|
page read and write
|
||
1BED4C70000
|
trusted library section
|
page readonly
|
||
1BED4559000
|
heap
|
page read and write
|
||
5E23000
|
heap
|
page execute and read and write
|
||
29A3D04B000
|
heap
|
page read and write
|
||
1E212E4B000
|
heap
|
page read and write
|
||
7C5D8FF000
|
stack
|
page read and write
|
||
3B31000
|
trusted library allocation
|
page read and write
|
||
B35000
|
unkown
|
page execute and read and write
|
||
1F470313000
|
heap
|
page read and write
|
||
7C5D5FB000
|
stack
|
page read and write
|
||
19E0000
|
unclassified section
|
page read and write
|
||
1B260EC0000
|
heap
|
page read and write
|
||
1BED942B000
|
heap
|
page read and write
|
||
E54DCF8000
|
stack
|
page read and write
|
||
1BED4A63000
|
trusted library allocation
|
page read and write
|
||
861CA7F000
|
stack
|
page read and write
|
||
1650000
|
heap
|
page read and write
|
||
962000
|
unkown
|
page readonly
|
||
19E4000
|
direct allocation
|
page read and write
|
||
1A14000
|
trusted library allocation
|
page read and write
|
||
E54DF7F000
|
unkown
|
page read and write
|
||
16C0000
|
direct allocation
|
page read and write
|
||
B14000
|
unkown
|
page execute and read and write
|
||
1A00000
|
trusted library allocation
|
page read and write
|
||
95E000
|
unkown
|
page readonly
|
||
1B2E000
|
stack
|
page read and write
|
||
95E000
|
unkown
|
page readonly
|
||
1BED4A70000
|
trusted library allocation
|
page read and write
|
||
21158F70000
|
heap
|
page read and write
|
||
1650000
|
direct allocation
|
page read and write
|
||
1731000
|
heap
|
page read and write
|
||
1B260ED0000
|
heap
|
page read and write
|
||
1C6F4995000
|
heap
|
page read and write
|
||
29A3DB89000
|
heap
|
page read and write
|
||
1C6F48B0000
|
heap
|
page read and write
|
||
1C6F497F000
|
heap
|
page read and write
|
||
32D1000
|
heap
|
page read and write
|
||
1BED4270000
|
trusted library allocation
|
page read and write
|
||
4D5DD7B000
|
stack
|
page read and write
|
||
97A000
|
unkown
|
page execute and read and write
|
||
29A3DBA0000
|
heap
|
page read and write
|
||
33E2000
|
trusted library allocation
|
page read and write
|
||
20DDFC70000
|
heap
|
page read and write
|
||
1B261102000
|
heap
|
page read and write
|
||
1BED5000000
|
trusted library allocation
|
page read and write
|
||
1C6F498F000
|
heap
|
page read and write
|
||
5DF0000
|
remote allocation
|
page read and write
|
||
1E212D60000
|
trusted library allocation
|
page read and write
|
||
33D8000
|
trusted library allocation
|
page read and write
|
||
34B0000
|
heap
|
page read and write
|
||
2E245300000
|
heap
|
page read and write
|
||
5F40000
|
trusted library allocation
|
page read and write
|
||
39F0000
|
heap
|
page execute and read and write
|
||
20DDFC64000
|
heap
|
page read and write
|
||
1B261081000
|
heap
|
page read and write
|
||
4D5DF77000
|
stack
|
page read and write
|
||
4B31000
|
trusted library allocation
|
page read and write
|
||
39C0000
|
trusted library allocation
|
page read and write
|
||
29A3DB89000
|
heap
|
page read and write
|
||
1BED9500000
|
heap
|
page read and write
|
||
1BED9290000
|
trusted library allocation
|
page read and write
|
||
163E000
|
stack
|
page read and write
|
||
21159108000
|
heap
|
page read and write
|
||
B47000
|
unkown
|
page execute and read and write
|
||
1BED4A80000
|
trusted library allocation
|
page read and write
|
||
32D1000
|
heap
|
page read and write
|
||
29A3DBA0000
|
heap
|
page read and write
|
||
4FED4FF000
|
stack
|
page read and write
|
||
1B26108A000
|
heap
|
page read and write
|
||
29A3D03C000
|
heap
|
page read and write
|
||
2E2453B6000
|
heap
|
page read and write
|
||
7723B77000
|
stack
|
page read and write
|
||
29A3DB85000
|
heap
|
page read and write
|
||
1C6F497F000
|
heap
|
page read and write
|
||
1BED3AAD000
|
heap
|
page read and write
|
||
77237EE000
|
stack
|
page read and write
|
||
1E212E29000
|
heap
|
page read and write
|
||
EC0000
|
unkown
|
page execute read
|
||
1F470115000
|
trusted library allocation
|
page read and write
|
||
33D8000
|
trusted library allocation
|
page read and write
|
||
1C6F4760000
|
heap
|
page read and write
|
||
16C0000
|
direct allocation
|
page read and write
|
||
21159126000
|
heap
|
page read and write
|
||
1BED94A4000
|
heap
|
page read and write
|
||
1BED3960000
|
heap
|
page read and write
|
||
33D0000
|
trusted library allocation
|
page read and write
|
||
3B2000
|
unkown
|
page execute and read and write
|
||
1BED3A3D000
|
heap
|
page read and write
|
||
942000
|
unkown
|
page readonly
|
||
7723F7B000
|
stack
|
page read and write
|
||
34A0000
|
trusted library allocation
|
page execute and read and write
|
||
1E212E78000
|
heap
|
page read and write
|
||
1BED94B8000
|
heap
|
page read and write
|
||
1BED94A1000
|
heap
|
page read and write
|
||
29A3D113000
|
heap
|
page read and write
|
||
17BD000
|
heap
|
page read and write
|
||
1BED94FE000
|
heap
|
page read and write
|
||
7C5D6FC000
|
stack
|
page read and write
|
||
2E2453BE000
|
heap
|
page read and write
|
||
1BED3970000
|
heap
|
page read and write
|
||
1650000
|
direct allocation
|
page read and write
|
||
B39000
|
unkown
|
page execute and read and write
|
||
20DDFC13000
|
heap
|
page read and write
|
||
19E0000
|
direct allocation
|
page read and write
|
||
2E2463B0000
|
trusted library allocation
|
page read and write
|
||
5F2C000
|
stack
|
page read and write
|
||
1750000
|
heap
|
page read and write
|
||
E54D87E000
|
stack
|
page read and write
|
||
1750000
|
heap
|
page read and write
|
||
1A13000
|
trusted library allocation
|
page execute and read and write
|
||
1BED91A0000
|
trusted library allocation
|
page read and write
|
||
32D1000
|
heap
|
page read and write
|
||
93F000
|
unkown
|
page readonly
|
||
1783000
|
heap
|
page read and write
|
||
97A000
|
unkown
|
page execute and read and write
|
||
1BED4400000
|
heap
|
page read and write
|
||
1650000
|
heap
|
page read and write
|
||
32D1000
|
heap
|
page read and write
|
||
1A1D000
|
trusted library allocation
|
page execute and read and write
|
||
EC0000
|
unkown
|
page execute read
|
||
1BED4B80000
|
trusted library allocation
|
page read and write
|
||
878000
|
unkown
|
page execute and read and write
|
||
5E23000
|
heap
|
page execute and read and write
|
||
16C0000
|
direct allocation
|
page read and write
|
||
33FB000
|
trusted library allocation
|
page execute and read and write
|
||
20DDFC64000
|
heap
|
page read and write
|
||
3410000
|
trusted library allocation
|
page read and write
|
||
1E212E70000
|
heap
|
page read and write
|
||
33F7000
|
trusted library allocation
|
page execute and read and write
|
||
32D1000
|
heap
|
page read and write
|
||
33E2000
|
trusted library allocation
|
page read and write
|
||
29A3CFB0000
|
trusted library allocation
|
page read and write
|
||
33D0000
|
trusted library allocation
|
page read and write
|
||
4B41000
|
trusted library allocation
|
page read and write
|
||
349D000
|
stack
|
page read and write
|
||
B6C000
|
unkown
|
page execute and read and write
|
||
3B0000
|
unkown
|
page readonly
|
||
772457C000
|
stack
|
page read and write
|
||
1E212D30000
|
heap
|
page read and write
|
||
5DCC000
|
stack
|
page read and write
|
||
38FE000
|
stack
|
page read and write
|
||
772376C000
|
stack
|
page read and write
|
||
29A3D0A4000
|
heap
|
page read and write
|
||
32E0000
|
heap
|
page read and write
|
||
29A3DBBE000
|
heap
|
page read and write
|
||
29A3D049000
|
heap
|
page read and write
|
||
29A3DB95000
|
heap
|
page read and write
|
||
29A3DB6E000
|
heap
|
page read and write
|
||
1782000
|
heap
|
page read and write
|
||
E55927B000
|
stack
|
page read and write
|
||
39F0000
|
heap
|
page execute and read and write
|
||
29A3E003000
|
heap
|
page read and write
|
||
5DF0000
|
remote allocation
|
page read and write
|
||
1BED9240000
|
remote allocation
|
page read and write
|
||
1BED91A0000
|
trusted library allocation
|
page read and write
|
||
3B0000
|
unkown
|
page readonly
|
||
97A000
|
unkown
|
page execute and read and write
|
||
33FB000
|
trusted library allocation
|
page execute and read and write
|
||
1650000
|
direct allocation
|
page read and write
|
||
1BED3B13000
|
heap
|
page read and write
|
||
4B31000
|
trusted library allocation
|
page read and write
|
||
29A3D088000
|
heap
|
page read and write
|
||
1BED4A60000
|
trusted library allocation
|
page read and write
|
||
3A10000
|
trusted library allocation
|
page read and write
|
||
1BED3A7A000
|
heap
|
page read and write
|
||
4FECF3B000
|
stack
|
page read and write
|
||
B69000
|
unkown
|
page execute and read and write
|
||
1BED9060000
|
trusted library allocation
|
page read and write
|
||
29A3D8E0000
|
remote allocation
|
page read and write
|
||
E55957E000
|
stack
|
page read and write
|
||
29A3D000000
|
heap
|
page read and write
|
||
4FED47B000
|
stack
|
page read and write
|
||
46779FF000
|
stack
|
page read and write
|
||
B14000
|
unkown
|
page execute and read and write
|
||
29A3DBCA000
|
heap
|
page read and write
|
||
29A3D0C8000
|
heap
|
page read and write
|
||
2115908F000
|
heap
|
page read and write
|
||
20DDFAC0000
|
heap
|
page read and write
|
||
33D8000
|
trusted library allocation
|
page read and write
|
||
1C6F497F000
|
heap
|
page read and write
|
||
29A3E002000
|
heap
|
page read and write
|
||
7C5D0CB000
|
stack
|
page read and write
|
||
32D0000
|
heap
|
page read and write
|
||
1C6F4B45000
|
heap
|
page read and write
|
||
4FED27D000
|
stack
|
page read and write
|
||
2E245600000
|
trusted library allocation
|
page read and write
|
||
46773BF000
|
stack
|
page read and write
|
||
29A3DBC3000
|
heap
|
page read and write
|
||
1BED3A78000
|
heap
|
page read and write
|
||
29A3CF10000
|
heap
|
page read and write
|
||
29A3E062000
|
heap
|
page read and write
|
||
33EA000
|
trusted library allocation
|
page execute and read and write
|
||
772447E000
|
stack
|
page read and write
|
||
1788000
|
heap
|
page read and write
|
||
29A3DB89000
|
heap
|
page read and write
|
||
2E245540000
|
heap
|
page read and write
|
||
3B31000
|
trusted library allocation
|
page read and write
|
||
29A3DB9F000
|
heap
|
page read and write
|
||
19F2000
|
direct allocation
|
page read and write
|
||
3B2E000
|
stack
|
page read and write
|
||
29A3D0DB000
|
heap
|
page read and write
|
||
1782000
|
heap
|
page read and write
|
||
33F7000
|
trusted library allocation
|
page execute and read and write
|
||
17BD000
|
heap
|
page read and write
|
||
29A3D8E0000
|
remote allocation
|
page read and write
|
||
942000
|
unkown
|
page readonly
|
||
2E2455E0000
|
trusted library allocation
|
page read and write
|
||
5E20000
|
heap
|
page execute and read and write
|
||
6030000
|
trusted library allocation
|
page read and write
|
||
1568000
|
stack
|
page read and write
|
||
1BED3A0B000
|
heap
|
page read and write
|
||
2E2453BE000
|
heap
|
page read and write
|
||
29A3D102000
|
heap
|
page read and write
|
||
1BED9050000
|
trusted library allocation
|
page read and write
|
||
1F46FE20000
|
heap
|
page read and write
|
||
1BED9240000
|
remote allocation
|
page read and write
|
||
2E245370000
|
heap
|
page read and write
|
||
29A3DB7F000
|
heap
|
page read and write
|
||
1BED4380000
|
trusted library section
|
page read and write
|
||
33EA000
|
trusted library allocation
|
page execute and read and write
|
||
16DA000
|
heap
|
page read and write
|
||
16C0000
|
direct allocation
|
page read and write
|
||
1BED94F4000
|
heap
|
page read and write
|
||
29A3D053000
|
heap
|
page read and write
|
||
1E212E4D000
|
heap
|
page read and write
|
||
1B261108000
|
heap
|
page read and write
|
||
33F7000
|
trusted library allocation
|
page execute and read and write
|
||
20DDFC00000
|
heap
|
page read and write
|
||
1A20000
|
heap
|
page read and write
|
||
32D1000
|
heap
|
page read and write
|
||
950000
|
unkown
|
page readonly
|
||
16C0000
|
direct allocation
|
page read and write
|
||
1A1D000
|
trusted library allocation
|
page execute and read and write
|
||
5D10000
|
heap
|
page read and write
|
||
5DD0000
|
trusted library allocation
|
page read and write
|
||
1A00000
|
trusted library allocation
|
page read and write
|
||
1A14000
|
trusted library allocation
|
page read and write
|
||
1BED4601000
|
trusted library allocation
|
page read and write
|
||
33F5000
|
trusted library allocation
|
page execute and read and write
|
||
33E2000
|
trusted library allocation
|
page read and write
|
||
1650000
|
direct allocation
|
page read and write
|
||
17AC000
|
heap
|
page read and write
|
||
1BED91B0000
|
trusted library allocation
|
page read and write
|
||
1736000
|
heap
|
page read and write
|
||
29A3DB89000
|
heap
|
page read and write
|
||
1BED3A9D000
|
heap
|
page read and write
|
||
29A3DB89000
|
heap
|
page read and write
|
||
1BED9449000
|
heap
|
page read and write
|
||
1F470013000
|
unkown
|
page read and write
|
||
7723A7E000
|
stack
|
page read and write
|
||
32D1000
|
heap
|
page read and write
|
||
33F0000
|
trusted library allocation
|
page read and write
|
||
19E0000
|
unclassified section
|
page read and write
|
||
29A3DB95000
|
heap
|
page read and write
|
||
1674000
|
heap
|
page read and write
|
||
4D5E17F000
|
stack
|
page read and write
|
||
21159113000
|
heap
|
page read and write
|
||
2E2455F0000
|
heap
|
page read and write
|
||
33F5000
|
trusted library allocation
|
page execute and read and write
|
||
29A3D013000
|
heap
|
page read and write
|
||
1BED4CB0000
|
trusted library section
|
page readonly
|
||
1BED92C0000
|
trusted library allocation
|
page read and write
|
||
B60000
|
unkown
|
page execute and read and write
|
||
3A29000
|
heap
|
page read and write
|
||
4FED5F7000
|
stack
|
page read and write
|
||
29A3D067000
|
heap
|
page read and write
|
||
1734000
|
heap
|
page read and write
|
||
1BED94FA000
|
heap
|
page read and write
|
||
970000
|
unkown
|
page readonly
|
||
2E245560000
|
heap
|
page read and write
|
||
17AC000
|
heap
|
page read and write
|
||
33EA000
|
trusted library allocation
|
page execute and read and write
|
||
4D5E07F000
|
stack
|
page read and write
|
||
3A10000
|
trusted library allocation
|
page read and write
|
||
33DD000
|
trusted library allocation
|
page execute and read and write
|
||
29A3D021000
|
heap
|
page read and write
|
||
21159054000
|
heap
|
page read and write
|
||
1BED4500000
|
heap
|
page read and write
|
||
29A3E002000
|
heap
|
page read and write
|
||
B6C000
|
unkown
|
page execute and read and write
|
||
29A3DB95000
|
heap
|
page read and write
|
||
1BED43E1000
|
trusted library allocation
|
page read and write
|
||
5C2E000
|
stack
|
page read and write
|
||
29A3D0E2000
|
heap
|
page read and write
|
||
7723D7D000
|
stack
|
page read and write
|
||
46777FB000
|
stack
|
page read and write
|
||
33E6000
|
trusted library allocation
|
page execute and read and write
|
||
E5593FE000
|
stack
|
page read and write
|
||
32D0000
|
heap
|
page read and write
|
||
1B261A02000
|
trusted library allocation
|
page read and write
|
||
1C6F498E000
|
heap
|
page read and write
|
||
29A3DB8B000
|
heap
|
page read and write
|
||
1E212E7F000
|
heap
|
page read and write
|
||
B69000
|
unkown
|
page execute and read and write
|
||
970000
|
unkown
|
page readonly
|
||
32D1000
|
heap
|
page read and write
|
||
173A000
|
heap
|
page read and write
|
||
95E000
|
unkown
|
page readonly
|
||
29A3DBAD000
|
heap
|
page read and write
|
||
5CF0000
|
trusted library allocation
|
page execute and read and write
|
||
970000
|
unkown
|
page readonly
|
||
29A3DB93000
|
heap
|
page read and write
|
||
5E20000
|
heap
|
page execute and read and write
|
||
1A00000
|
trusted library allocation
|
page read and write
|
||
29A3E002000
|
heap
|
page read and write
|
||
2E2463C0000
|
trusted library allocation
|
page read and write
|
||
20DE0402000
|
trusted library allocation
|
page read and write
|
||
1BED3A56000
|
heap
|
page read and write
|
||
4D5DC7F000
|
stack
|
page read and write
|
||
962000
|
unkown
|
page readonly
|
||
1BED917E000
|
trusted library allocation
|
page read and write
|
||
1C6F4977000
|
heap
|
page read and write
|
||
1C6F4996000
|
heap
|
page read and write
|
||
39F0000
|
heap
|
page execute and read and write
|
||
1400000
|
trusted library allocation
|
page read and write
|
||
1BED4502000
|
heap
|
page read and write
|
||
5D14000
|
heap
|
page read and write
|
||
1B2E000
|
stack
|
page read and write
|
||
177B000
|
heap
|
page read and write
|
||
B31000
|
unkown
|
page execute and read and write
|
||
5F2C000
|
stack
|
page read and write
|
||
5CF0000
|
trusted library allocation
|
page execute and read and write
|
||
5D00000
|
trusted library allocation
|
page read and write
|
||
B33000
|
unkown
|
page execute and read and write
|
||
29A3E021000
|
heap
|
page read and write
|
||
5F40000
|
trusted library allocation
|
page read and write
|
||
3B2000
|
unkown
|
page execute read
|
||
3A20000
|
heap
|
page read and write
|
||
61B0000
|
trusted library allocation
|
page read and write
|
||
29A3D108000
|
heap
|
page read and write
|
||
1BED9240000
|
remote allocation
|
page read and write
|
||
4B41000
|
trusted library allocation
|
page read and write
|
||
970000
|
unkown
|
page readonly
|
||
93F000
|
unkown
|
page readonly
|
||
B47000
|
unkown
|
page execute and read and write
|
||
29A3E01A000
|
heap
|
page read and write
|
||
20DDFC58000
|
heap
|
page read and write
|
||
5C2E000
|
stack
|
page read and write
|
||
1C6F4976000
|
heap
|
page read and write
|
||
33F5000
|
trusted library allocation
|
page execute and read and write
|
||
77241FF000
|
stack
|
page read and write
|
||
E54D5AF000
|
stack
|
page read and write
|
||
2E2455D0000
|
trusted library allocation
|
page read and write
|
||
5F40000
|
trusted library allocation
|
page read and write
|
||
5F2C000
|
stack
|
page read and write
|
||
1C6F495B000
|
heap
|
page read and write
|
||
B39000
|
unkown
|
page execute and read and write
|
||
93E000
|
unkown
|
page readonly
|
There are 774 hidden memdumps, click here to show them.