Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
RFQ__637456464647.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_RFQ__63745646464_94dd9d68755d61cc97c9e42d0ec1b28c5989ec6_083b13b0_1b958159\Report.wer
|
Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7284.tmp.dmp
|
Mini DuMP crash report, 15 streams, Tue May 24 02:00:21 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER78ED.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7A56.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\chrome.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\RFQ__637456464647.exe
|
"C:\Users\user\Desktop\RFQ__637456464647.exe"
|
||
C:\Users\user\Desktop\RFQ__637456464647.exe
|
C:\Users\user\Desktop\RFQ__637456464647.exe
|
||
C:\Users\user\AppData\Local\Temp\chrome.exe
|
"C:\Users\user\AppData\Local\Temp\chrome.exe"
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 6312 -s 1296
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://checkip.dyndns.org/
|
132.226.8.169
|
||
https://dsssdsa.fa)Uri
|
unknown
|
||
https://crashpad.chromium.org/
|
unknown
|
||
https://api.telegram.org/bot
|
unknown
|
||
https://crashpad.chromium.org/bug/new
|
unknown
|
||
http://checkip.dyndns.org/q
|
unknown
|
||
http://sawebservice.red-gate.com/
|
unknown
|
||
http://www.smartassembly.com/webservices/Reporting/UploadReport2
|
unknown
|
||
https://dsssdsa.fa
|
unknown
|
||
http://checkip.dyndns.org
|
unknown
|
||
http://www.smartassembly.com/webservices/Reporting/
|
unknown
|
||
http://checkip.dyndns.com
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://crashpad.chromium.org/https://crashpad.chromium.org/bug/new
|
unknown
|
||
http://www.smartassembly.com/webservices/UploadReportLogin/
|
unknown
|
||
http://www.smartassembly.com/webservices/UploadReportLogin/GetServerURL
|
unknown
|
||
http://checkip.dyndns.org4Jk
|
unknown
|
There are 7 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
checkip.dyndns.com
|
132.226.8.169
|
||
checkip.dyndns.org
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
132.226.8.169
|
checkip.dyndns.com
|
United States
|
||
192.168.2.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ__637456464647_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ__637456464647_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ__637456464647_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ__637456464647_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ__637456464647_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ__637456464647_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ__637456464647_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ__637456464647_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ__637456464647_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ__637456464647_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ__637456464647_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ__637456464647_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ__637456464647_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ__637456464647_RASMANCS
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
|
AmiHivePermissionsCorrect
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
|
AmiHiveOwnerCorrect
|
||
\REGISTRY\A\{8db74139-9b4a-e3e1-0313-53ba814e9f14}\Root\InventoryApplicationFile\rfq__63745646464|983115d
|
ProgramId
|
||
\REGISTRY\A\{8db74139-9b4a-e3e1-0313-53ba814e9f14}\Root\InventoryApplicationFile\rfq__63745646464|983115d
|
FileId
|
||
\REGISTRY\A\{8db74139-9b4a-e3e1-0313-53ba814e9f14}\Root\InventoryApplicationFile\rfq__63745646464|983115d
|
LowerCaseLongPath
|
||
\REGISTRY\A\{8db74139-9b4a-e3e1-0313-53ba814e9f14}\Root\InventoryApplicationFile\rfq__63745646464|983115d
|
LongPathHash
|
||
\REGISTRY\A\{8db74139-9b4a-e3e1-0313-53ba814e9f14}\Root\InventoryApplicationFile\rfq__63745646464|983115d
|
Name
|
||
\REGISTRY\A\{8db74139-9b4a-e3e1-0313-53ba814e9f14}\Root\InventoryApplicationFile\rfq__63745646464|983115d
|
Publisher
|
||
\REGISTRY\A\{8db74139-9b4a-e3e1-0313-53ba814e9f14}\Root\InventoryApplicationFile\rfq__63745646464|983115d
|
Version
|
||
\REGISTRY\A\{8db74139-9b4a-e3e1-0313-53ba814e9f14}\Root\InventoryApplicationFile\rfq__63745646464|983115d
|
BinFileVersion
|
||
\REGISTRY\A\{8db74139-9b4a-e3e1-0313-53ba814e9f14}\Root\InventoryApplicationFile\rfq__63745646464|983115d
|
BinaryType
|
||
\REGISTRY\A\{8db74139-9b4a-e3e1-0313-53ba814e9f14}\Root\InventoryApplicationFile\rfq__63745646464|983115d
|
ProductName
|
||
\REGISTRY\A\{8db74139-9b4a-e3e1-0313-53ba814e9f14}\Root\InventoryApplicationFile\rfq__63745646464|983115d
|
ProductVersion
|
||
\REGISTRY\A\{8db74139-9b4a-e3e1-0313-53ba814e9f14}\Root\InventoryApplicationFile\rfq__63745646464|983115d
|
LinkDate
|
||
\REGISTRY\A\{8db74139-9b4a-e3e1-0313-53ba814e9f14}\Root\InventoryApplicationFile\rfq__63745646464|983115d
|
BinProductVersion
|
||
\REGISTRY\A\{8db74139-9b4a-e3e1-0313-53ba814e9f14}\Root\InventoryApplicationFile\rfq__63745646464|983115d
|
Size
|
||
\REGISTRY\A\{8db74139-9b4a-e3e1-0313-53ba814e9f14}\Root\InventoryApplicationFile\rfq__63745646464|983115d
|
Language
|
||
\REGISTRY\A\{8db74139-9b4a-e3e1-0313-53ba814e9f14}\Root\InventoryApplicationFile\rfq__63745646464|983115d
|
IsPeFile
|
||
\REGISTRY\A\{8db74139-9b4a-e3e1-0313-53ba814e9f14}\Root\InventoryApplicationFile\rfq__63745646464|983115d
|
IsOsComponent
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
|
ExceptionRecord
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceTicket
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceId
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
ApplicationFlags
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
|
0018800453F4626F
|
There are 29 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
402000
|
remote allocation
|
page execute and read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
47A4000
|
trusted library allocation
|
page read and write
|
||
47A4000
|
trusted library allocation
|
page read and write
|
||
42C9000
|
trusted library allocation
|
page read and write
|
||
4504000
|
trusted library allocation
|
page read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
42C9000
|
trusted library allocation
|
page read and write
|
||
4504000
|
trusted library allocation
|
page read and write
|
||
47A4000
|
trusted library allocation
|
page read and write
|
||
4504000
|
trusted library allocation
|
page read and write
|
||
42C9000
|
trusted library allocation
|
page read and write
|
||
422000
|
remote allocation
|
page execute and read and write
|
||
9F2CAFA000
|
stack
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
2F30000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
647E000
|
stack
|
page read and write
|
||
1F95C351000
|
trusted library allocation
|
page read and write
|
||
5B11000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
11E4CB30000
|
heap
|
page read and write
|
||
6B3C000
|
stack
|
page read and write
|
||
296DF2A3000
|
heap
|
page read and write
|
||
14EE000
|
stack
|
page read and write
|
||
1573000
|
trusted library allocation
|
page execute and read and write
|
||
10F4000
|
heap
|
page read and write
|
||
1F95BAA9000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
127D000
|
heap
|
page read and write
|
||
53C4000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
5B3F000
|
trusted library allocation
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
257B6F50000
|
heap
|
page read and write
|
||
27B29E67000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
27B29D30000
|
heap
|
page read and write
|
||
32C1000
|
trusted library allocation
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
1F95BB02000
|
heap
|
page read and write
|
||
62DE000
|
stack
|
page read and write
|
||
22A9B400000
|
heap
|
page read and write
|
||
11E4D402000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
1F95C321000
|
trusted library allocation
|
page read and write
|
||
36DD3EA000
|
stack
|
page read and write
|
||
A7A9AFF000
|
stack
|
page read and write
|
||
7FF7A8CAA000
|
unkown
|
page readonly
|
||
11C0000
|
heap
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
296E4940000
|
trusted library allocation
|
page read and write
|
||
19B0000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
8F2000
|
unkown
|
page readonly
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
637E000
|
stack
|
page read and write
|
||
11E4CB20000
|
heap
|
page read and write
|
||
2DA0000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
177C000
|
heap
|
page read and write
|
||
296E4A3C000
|
heap
|
page read and write
|
||
296E4900000
|
trusted library allocation
|
page read and write
|
||
22A9B502000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
296DFB00000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
26CC7713000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
64A0000
|
trusted library allocation
|
page read and write
|
||
17CE000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
17CA000
|
heap
|
page read and write
|
||
1249000
|
heap
|
page read and write
|
||
BCEDBFB000
|
stack
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
F60000
|
remote allocation
|
page read and write
|
||
1CB5A2F0000
|
heap
|
page read and write
|
||
22A9B1A0000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
24DEB813000
|
heap
|
page read and write
|
||
296E4A14000
|
heap
|
page read and write
|
||
665D000
|
stack
|
page read and write
|
||
11E4CC3C000
|
heap
|
page read and write
|
||
26CC7654000
|
heap
|
page read and write
|
||
296E02D0000
|
trusted library section
|
page readonly
|
||
2F30000
|
trusted library allocation
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
27B29E47000
|
heap
|
page read and write
|
||
27B29E4D000
|
heap
|
page read and write
|
||
24DEB85D000
|
heap
|
page read and write
|
||
2F30000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
54E8000
|
trusted library allocation
|
page read and write
|
||
1800000
|
heap
|
page read and write
|
||
1AF0000
|
trusted library allocation
|
page read and write
|
||
19A0000
|
trusted library allocation
|
page read and write
|
||
56D0000
|
trusted library allocation
|
page read and write
|
||
1ABD7E8D000
|
heap
|
page read and write
|
||
1540000
|
heap
|
page read and write
|
||
655E000
|
stack
|
page read and write
|
||
171E000
|
stack
|
page read and write
|
||
422000
|
remote allocation
|
page execute and read and write
|
||
1809000
|
heap
|
page read and write
|
||
A7A997B000
|
stack
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
1800000
|
heap
|
page read and write
|
||
296DF120000
|
heap
|
page read and write
|
||
67DE000
|
stack
|
page read and write
|
||
56D0000
|
trusted library allocation
|
page read and write
|
||
296E4A00000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
64A0000
|
trusted library allocation
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
1AE0000
|
heap
|
page execute and read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
54E0000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
1ABD7E29000
|
heap
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
59AE000
|
stack
|
page read and write
|
||
1996000
|
trusted library allocation
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
21CFD53A000
|
heap
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
1F95BADF000
|
heap
|
page read and write
|
||
57A4000
|
trusted library allocation
|
page read and write
|
||
1F95BA88000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
1285000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
67A807F000
|
stack
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
11F2000
|
heap
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
27B29E49000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
26CC75C0000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
158D000
|
trusted library allocation
|
page execute and read and write
|
||
64C0000
|
trusted library allocation
|
page read and write
|
||
5AF0000
|
trusted library allocation
|
page read and write
|
||
27B29F02000
|
heap
|
page read and write
|
||
152E000
|
stack
|
page read and write
|
||
24DEB5E0000
|
heap
|
page read and write
|
||
1CB5A440000
|
heap
|
page read and write
|
||
1ABD7F02000
|
heap
|
page read and write
|
||
10B0000
|
trusted library allocation
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
1ACE000
|
stack
|
page read and write
|
||
27B29E60000
|
heap
|
page read and write
|
||
36DD6FF000
|
stack
|
page read and write
|
||
296DF213000
|
heap
|
page read and write
|
||
1809000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
5B19000
|
trusted library allocation
|
page read and write
|
||
257B7002000
|
heap
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
219D9B60000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
1ABD7C70000
|
heap
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
1980000
|
trusted library allocation
|
page read and write
|
||
22A9B459000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
181D000
|
heap
|
page read and write
|
||
66F35FB000
|
stack
|
page read and write
|
||
7FF7A8C32000
|
unkown
|
page readonly
|
||
10F4000
|
heap
|
page read and write
|
||
219D9D00000
|
heap
|
page read and write
|
||
1ACE000
|
stack
|
page read and write
|
||
59F0000
|
trusted library allocation
|
page read and write
|
||
59EE000
|
stack
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
56E0000
|
heap
|
page execute and read and write
|
||
126D000
|
heap
|
page read and write
|
||
1ABD7E3F000
|
heap
|
page read and write
|
||
56D0000
|
trusted library allocation
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
21CFCEC2000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
1ABD7E8C000
|
heap
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
11E4CC2A000
|
heap
|
page read and write
|
||
A1B7B7E000
|
stack
|
page read and write
|
||
53B5000
|
trusted library allocation
|
page read and write
|
||
219D9C88000
|
heap
|
page read and write
|
||
19AB000
|
trusted library allocation
|
page read and write
|
||
1F95B880000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
A7A967A000
|
stack
|
page read and write
|
||
F60000
|
remote allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
5390000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
59F0000
|
trusted library allocation
|
page read and write
|
||
2DA0000
|
trusted library allocation
|
page read and write
|
||
17C2000
|
heap
|
page read and write
|
||
1F95BA27000
|
heap
|
page read and write
|
||
56D0000
|
trusted library allocation
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
1F95C302000
|
trusted library allocation
|
page read and write
|
||
1200000
|
unkown
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
2F10000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
174A000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
67A7D7F000
|
stack
|
page read and write
|
||
59F0000
|
trusted library allocation
|
page read and write
|
||
11E4CB90000
|
heap
|
page read and write
|
||
66F3AFB000
|
stack
|
page read and write
|
||
26CC7E02000
|
trusted library allocation
|
page read and write
|
||
BCEDEFE000
|
stack
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
52C8000
|
trusted library allocation
|
page read and write
|
||
651E000
|
stack
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
54F0000
|
heap
|
page read and write
|
||
1F95C34D000
|
trusted library allocation
|
page read and write
|
||
1154000
|
trusted library allocation
|
page read and write
|
||
53AD000
|
trusted library allocation
|
page read and write
|
||
F60000
|
remote allocation
|
page read and write
|
||
7990677000
|
stack
|
page read and write
|
||
11E4CC4C000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
53A7000
|
trusted library allocation
|
page read and write
|
||
296DFA15000
|
heap
|
page read and write
|
||
56CD000
|
stack
|
page read and write
|
||
27B29E7E000
|
heap
|
page read and write
|
||
27B29E7A000
|
heap
|
page read and write
|
||
57B4000
|
trusted library allocation
|
page read and write
|
||
24DEB908000
|
heap
|
page read and write
|
||
A7A977A000
|
stack
|
page read and write
|
||
7FF7A8C32000
|
unkown
|
page readonly
|
||
10F4000
|
heap
|
page read and write
|
||
219D9AD0000
|
heap
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
1574000
|
trusted library allocation
|
page read and write
|
||
57A4000
|
trusted library allocation
|
page read and write
|
||
1F95BAE9000
|
heap
|
page read and write
|
||
152E000
|
stack
|
page read and write
|
||
16D0000
|
trusted library allocation
|
page read and write
|
||
42C5000
|
trusted library allocation
|
page read and write
|
||
1597000
|
trusted library allocation
|
page execute and read and write
|
||
10F4000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
171E000
|
stack
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
1249000
|
heap
|
page read and write
|
||
17CE000
|
heap
|
page read and write
|
||
296E4811000
|
trusted library allocation
|
page read and write
|
||
2F10000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
56D0000
|
trusted library allocation
|
page read and write
|
||
1266000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
296E4820000
|
trusted library allocation
|
page read and write
|
||
1200000
|
unkown
|
page read and write
|
||
5B4B000
|
trusted library allocation
|
page read and write
|
||
1200000
|
heap
|
page read and write
|
||
8F2000
|
unkown
|
page readonly
|
||
11B0000
|
trusted library allocation
|
page execute and read and write
|
||
11F6000
|
heap
|
page read and write
|
||
13E0000
|
trusted library allocation
|
page read and write
|
||
63DE000
|
stack
|
page read and write
|
||
1584000
|
trusted library allocation
|
page read and write
|
||
8F2000
|
unkown
|
page readonly
|
||
17C6000
|
heap
|
page read and write
|
||
5B4B000
|
trusted library allocation
|
page read and write
|
||
2F30000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
27B29E64000
|
heap
|
page read and write
|
||
1AD1000
|
trusted library allocation
|
page read and write
|
||
296E0300000
|
trusted library section
|
page readonly
|
||
1597000
|
trusted library allocation
|
page execute and read and write
|
||
66F3CFF000
|
stack
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
1580000
|
trusted library allocation
|
page read and write
|
||
5B0D000
|
trusted library allocation
|
page read and write
|
||
21CFCE24000
|
heap
|
page read and write
|
||
14EE000
|
stack
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
64A0000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
1ABD7E13000
|
heap
|
page read and write
|
||
13F0000
|
heap
|
page read and write
|
||
11E4CC74000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
F60000
|
remote allocation
|
page read and write
|
||
27B29D90000
|
heap
|
page read and write
|
||
14A0000
|
trusted library allocation
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
5AC0000
|
remote allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
B0857FB000
|
stack
|
page read and write
|
||
2FF4000
|
trusted library allocation
|
page read and write
|
||
27B29E61000
|
heap
|
page read and write
|
||
2F30000
|
trusted library allocation
|
page read and write
|
||
64A0000
|
trusted library allocation
|
page read and write
|
||
1F95BA3C000
|
heap
|
page read and write
|
||
177F000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
B085AFC000
|
stack
|
page read and write
|
||
1ABD7C60000
|
heap
|
page read and write
|
||
651E000
|
stack
|
page read and write
|
||
67A7E7F000
|
stack
|
page read and write
|
||
6490000
|
trusted library allocation
|
page read and write
|
||
26CC7600000
|
heap
|
page read and write
|
||
1740000
|
heap
|
page read and write
|
||
17D2000
|
heap
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
7FF7A8C8E000
|
unkown
|
page write copy
|
||
27B29E45000
|
heap
|
page read and write
|
||
8F2000
|
unkown
|
page readonly
|
||
A1B9F7E000
|
stack
|
page read and write
|
||
2F0D000
|
stack
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
21CFD512000
|
heap
|
page read and write
|
||
1ABD7CD0000
|
heap
|
page read and write
|
||
26CC7649000
|
heap
|
page read and write
|
||
22A9B513000
|
heap
|
page read and write
|
||
A1BA27E000
|
stack
|
page read and write
|
||
57C8000
|
trusted library allocation
|
page read and write
|
||
2F20000
|
trusted library allocation
|
page read and write
|
||
1281000
|
heap
|
page read and write
|
||
24DEC002000
|
trusted library allocation
|
page read and write
|
||
57C5000
|
trusted library allocation
|
page read and write
|
||
1B10000
|
heap
|
page read and write
|
||
197D000
|
stack
|
page read and write
|
||
15AB000
|
trusted library allocation
|
page execute and read and write
|
||
24DEB650000
|
heap
|
page read and write
|
||
32E2000
|
trusted library allocation
|
page read and write
|
||
1187000
|
trusted library allocation
|
page execute and read and write
|
||
171E000
|
stack
|
page read and write
|
||
19C0000
|
heap
|
page read and write
|
||
24DEB86E000
|
heap
|
page read and write
|
||
A7AA07F000
|
stack
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
7FF7A8A71000
|
unkown
|
page execute read
|
||
6B50000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
1CB5A4A0000
|
heap
|
page read and write
|
||
219D9C3C000
|
heap
|
page read and write
|
||
26CC7708000
|
heap
|
page read and write
|
||
181D000
|
heap
|
page read and write
|
||
296DF2A1000
|
heap
|
page read and write
|
||
799097E000
|
stack
|
page read and write
|
||
1F95C100000
|
remote allocation
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
2F30000
|
trusted library allocation
|
page read and write
|
||
2F30000
|
trusted library allocation
|
page read and write
|
||
8F2000
|
unkown
|
page readonly
|
||
3048000
|
trusted library allocation
|
page read and write
|
||
1F95B870000
|
heap
|
page read and write
|
||
56D0000
|
trusted library allocation
|
page read and write
|
||
1990000
|
trusted library allocation
|
page read and write
|
||
16BE000
|
stack
|
page read and write
|
||
27B29E4B000
|
heap
|
page read and write
|
||
1275000
|
heap
|
page read and write
|
||
6480000
|
trusted library allocation
|
page execute and read and write
|
||
303F000
|
trusted library allocation
|
page read and write
|
||
1367000
|
stack
|
page read and write
|
||
1740000
|
heap
|
page read and write
|
||
6490000
|
trusted library allocation
|
page read and write
|
||
219D9AC0000
|
heap
|
page read and write
|
||
5AF5000
|
trusted library allocation
|
page read and write
|
||
629E000
|
stack
|
page read and write
|
||
2DBA000
|
trusted library allocation
|
page read and write
|
||
32E2000
|
trusted library allocation
|
page read and write
|
||
665D000
|
stack
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
16BE000
|
stack
|
page read and write
|
||
1176000
|
trusted library allocation
|
page execute and read and write
|
||
296DFA00000
|
heap
|
page read and write
|
||
2F30000
|
trusted library allocation
|
page read and write
|
||
679D000
|
stack
|
page read and write
|
||
67A7B7E000
|
stack
|
page read and write
|
||
56D0000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
68DE000
|
stack
|
page read and write
|
||
1182000
|
trusted library allocation
|
page read and write
|
||
2F10000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
27B2A602000
|
trusted library allocation
|
page read and write
|
||
296E0100000
|
trusted library allocation
|
page read and write
|
||
15A0000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
16D0000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
17DA000
|
heap
|
page read and write
|
||
26CC764B000
|
heap
|
page read and write
|
||
53AA000
|
trusted library allocation
|
page read and write
|
||
21CFD3A0000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
665D000
|
stack
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
1F95C202000
|
trusted library allocation
|
page read and write
|
||
A1BA1FD000
|
stack
|
page read and write
|
||
296DF313000
|
heap
|
page read and write
|
||
A1B9FFE000
|
stack
|
page read and write
|
||
64A0000
|
trusted library allocation
|
page read and write
|
||
296DF27C000
|
heap
|
page read and write
|
||
68DE000
|
stack
|
page read and write
|
||
219D9C63000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
56D0000
|
trusted library allocation
|
page read and write
|
||
296E4AA0000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
56D0000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
257B7750000
|
remote allocation
|
page read and write
|
||
A7A9B7F000
|
stack
|
page read and write
|
||
2F30000
|
trusted library allocation
|
page read and write
|
||
24DEB87F000
|
heap
|
page read and write
|
||
8F0000
|
unkown
|
page readonly
|
||
5FFE000
|
stack
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
15B0000
|
heap
|
page read and write
|
||
296E4820000
|
trusted library allocation
|
page read and write
|
||
44C2000
|
trusted library allocation
|
page read and write
|
||
D22000
|
unkown
|
page readonly
|
||
42C1000
|
trusted library allocation
|
page read and write
|
||
1CB5A780000
|
heap
|
page read and write
|
||
19BD000
|
trusted library allocation
|
page read and write
|
||
21CFCECA000
|
heap
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
1F95BA13000
|
heap
|
page read and write
|
||
296E4AEE000
|
heap
|
page read and write
|
||
21CFCF13000
|
heap
|
page read and write
|
||
64A0000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
54D0000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
296E02F0000
|
trusted library section
|
page readonly
|
||
6490000
|
trusted library allocation
|
page read and write
|
||
A1B7D7F000
|
stack
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
296DFB18000
|
heap
|
page read and write
|
||
B085C7B000
|
stack
|
page read and write
|
||
493CF7000
|
stack
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
296E4AF5000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
3FAA000
|
trusted library allocation
|
page read and write
|
||
57C5000
|
trusted library allocation
|
page read and write
|
||
1590000
|
trusted library allocation
|
page read and write
|
||
58A0000
|
heap
|
page execute and read and write
|
||
157D000
|
trusted library allocation
|
page execute and read and write
|
||
10F4000
|
heap
|
page read and write
|
||
54D0000
|
trusted library allocation
|
page read and write
|
||
641E000
|
stack
|
page read and write
|
||
4762000
|
trusted library allocation
|
page read and write
|
||
24DEB88A000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
5AF5000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
296E0310000
|
trusted library section
|
page readonly
|
||
67A73BC000
|
stack
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
59F0000
|
trusted library allocation
|
page read and write
|
||
64A0000
|
trusted library allocation
|
page read and write
|
||
219D9C64000
|
heap
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
17D2000
|
heap
|
page read and write
|
||
19B0000
|
trusted library allocation
|
page read and write
|
||
4751000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
22A9B413000
|
heap
|
page read and write
|
||
24DEB851000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
1AE0000
|
heap
|
page execute and read and write
|
||
10F4000
|
heap
|
page read and write
|
||
14A0000
|
trusted library allocation
|
page read and write
|
||
296E47F8000
|
trusted library allocation
|
page read and write
|
||
64A0000
|
trusted library allocation
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
67A817F000
|
stack
|
page read and write
|
||
2DC0000
|
heap
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
10F4000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
257B7058000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
A4587F7000
|
stack
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
2F51000
|
trusted library allocation
|
page read and write
|
||
26CC7681000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
5C2E000
|
stack
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
21CFCE13000
|
heap
|
page read and write
|
||
296E01F0000
|
trusted library allocation
|
page read and write
|
||
22A9B3E0000
|
trusted library allocation
|
page read and write
|
||
42C5000
|
trusted library allocation
|
page read and write
|
||
799027C000
|
stack
|
page read and write
|
||
36DD779000
|
stack
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
5AF5000
|
trusted library allocation
|
page read and write
|
||
36DD7F9000
|
stack
|
page read and write
|
||
2F40000
|
heap
|
page execute and read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
67A7A7E000
|
stack
|
page read and write
|
||
56D0000
|
trusted library allocation
|
page read and write
|
||
1580000
|
trusted library allocation
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
32C1000
|
trusted library allocation
|
page read and write
|
||
44B1000
|
trusted library allocation
|
page read and write
|
||
1ABD7E67000
|
heap
|
page read and write
|
||
6B3C000
|
stack
|
page read and write
|
||
296E47F0000
|
trusted library allocation
|
page read and write
|
||
1F95C300000
|
trusted library allocation
|
page read and write
|
||
24DEB5F0000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
1730000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
296E46D0000
|
trusted library allocation
|
page read and write
|
||
219D9C00000
|
heap
|
page read and write
|
||
124B000
|
heap
|
page read and write
|
||
64A0000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
42C5000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
6490000
|
trusted library allocation
|
page execute and read and write
|
||
2F30000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
7FF7A8C85000
|
unkown
|
page write copy
|
||
10F4000
|
heap
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
A7A9BFF000
|
stack
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
2DA0000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
27B29E77000
|
heap
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
67A797D000
|
stack
|
page read and write
|
||
296DFB59000
|
heap
|
page read and write
|
||
174A000
|
heap
|
page read and write
|
||
1ABD7E8E000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
4762000
|
trusted library allocation
|
page read and write
|
||
5B19000
|
trusted library allocation
|
page read and write
|
||
7FF7A8C3A000
|
unkown
|
page readonly
|
||
296E02E0000
|
trusted library section
|
page readonly
|
||
257B7025000
|
heap
|
page read and write
|
||
9F2CF7F000
|
unkown
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
1160000
|
trusted library allocation
|
page read and write
|
||
1730000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
2FF7000
|
trusted library allocation
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
22A9B1B0000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
1271000
|
heap
|
page read and write
|
||
1F95BAE6000
|
heap
|
page read and write
|
||
26CC7629000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
26CC7650000
|
heap
|
page read and write
|
||
B08607E000
|
stack
|
page read and write
|
||
1F95C380000
|
trusted library allocation
|
page read and write
|
||
177C000
|
heap
|
page read and write
|
||
27B29DC0000
|
trusted library allocation
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
64E0000
|
trusted library allocation
|
page read and write
|
||
27B29E40000
|
heap
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
257B6F60000
|
heap
|
page read and write
|
||
15A7000
|
trusted library allocation
|
page execute and read and write
|
||
D22000
|
unkown
|
page readonly
|
||
66F3DFE000
|
stack
|
page read and write
|
||
8F0000
|
unkown
|
page readonly
|
||
F60000
|
remote allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
257B7802000
|
trusted library allocation
|
page read and write
|
||
19B0000
|
trusted library allocation
|
page read and write
|
||
669E000
|
stack
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
257B703D000
|
heap
|
page read and write
|
||
53A4000
|
trusted library allocation
|
page read and write
|
||
2DA0000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
57A4000
|
trusted library allocation
|
page read and write
|
||
56D0000
|
trusted library allocation
|
page read and write
|
||
1560000
|
trusted library allocation
|
page read and write
|
||
7FF7A8C4A000
|
unkown
|
page readonly
|
||
13C0000
|
trusted library allocation
|
page read and write
|
||
69F0000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
1F95C100000
|
remote allocation
|
page read and write
|
||
8F2000
|
unkown
|
page readonly
|
||
8F2000
|
unkown
|
page readonly
|
||
24DEB89D000
|
heap
|
page read and write
|
||
F60000
|
remote allocation
|
page read and write
|
||
66F38FE000
|
stack
|
page read and write
|
||
26CC7590000
|
heap
|
page read and write
|
||
26CC764C000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
17C6000
|
heap
|
page read and write
|
||
1B00000
|
trusted library allocation
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
57C5000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
5C60000
|
trusted library allocation
|
page read and write
|
||
58A0000
|
heap
|
page execute and read and write
|
||
56D0000
|
trusted library allocation
|
page read and write
|
||
193E000
|
stack
|
page read and write
|
||
296E0320000
|
trusted library section
|
page readonly
|
||
67A7C7D000
|
stack
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
D20000
|
unkown
|
page readonly
|
||
2F10000
|
trusted library allocation
|
page read and write
|
||
1980000
|
trusted library allocation
|
page read and write
|
||
296DF295000
|
heap
|
page read and write
|
||
296DF272000
|
heap
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
545E000
|
stack
|
page read and write
|
||
1ABD7E00000
|
heap
|
page read and write
|
||
19A0000
|
trusted library allocation
|
page read and write
|
||
B085BFC000
|
stack
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
1590000
|
trusted library allocation
|
page read and write
|
||
19C0000
|
heap
|
page read and write
|
||
296DF9E0000
|
trusted library allocation
|
page read and write
|
||
199F000
|
trusted library allocation
|
page read and write
|
||
296DF23E000
|
heap
|
page read and write
|
||
54E0000
|
trusted library allocation
|
page read and write
|
||
22A9BA02000
|
trusted library allocation
|
page read and write
|
||
5C2E000
|
stack
|
page read and write
|
||
8F0000
|
unkown
|
page readonly
|
||
219D9C68000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
59AE000
|
stack
|
page read and write
|
||
21CFCE6F000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
B085D7C000
|
stack
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
19B0000
|
trusted library allocation
|
page read and write
|
||
53D1000
|
heap
|
page read and write
|
||
14A0000
|
trusted library allocation
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
257B7013000
|
heap
|
page read and write
|
||
3038000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
296E4A49000
|
heap
|
page read and write
|
||
64A0000
|
trusted library allocation
|
page read and write
|
||
1F95C100000
|
remote allocation
|
page read and write
|
||
9F2C87E000
|
stack
|
page read and write
|
||
64A0000
|
trusted library allocation
|
page read and write
|
||
545E000
|
stack
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
56D0000
|
trusted library allocation
|
page read and write
|
||
57D4000
|
trusted library allocation
|
page read and write
|
||
1720000
|
trusted library allocation
|
page execute and read and write
|
||
296DFB02000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
11E4CC00000
|
heap
|
page read and write
|
||
9F2C54B000
|
stack
|
page read and write
|
||
17C2000
|
heap
|
page read and write
|
||
11E4CD13000
|
heap
|
page read and write
|
||
2F30000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
799057B000
|
stack
|
page read and write
|
||
177F000
|
heap
|
page read and write
|
||
BCEDDFB000
|
stack
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
7FF7A8C85000
|
unkown
|
page write copy
|
||
6480000
|
trusted library allocation
|
page read and write
|
||
799037F000
|
stack
|
page read and write
|
||
504E000
|
stack
|
page read and write
|
||
64B0000
|
trusted library allocation
|
page read and write
|
||
296DF130000
|
heap
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
64D0000
|
trusted library allocation
|
page read and write
|
||
24DEB84A000
|
heap
|
page read and write
|
||
2F30000
|
trusted library allocation
|
page read and write
|
||
1AD0000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
A1B797E000
|
stack
|
page read and write
|
||
59F0000
|
trusted library allocation
|
page read and write
|
||
1F95B8E0000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
174A000
|
heap
|
page read and write
|
||
44B1000
|
trusted library allocation
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
A1BA0FE000
|
stack
|
page read and write
|
||
1F95BA29000
|
heap
|
page read and write
|
||
296DF258000
|
heap
|
page read and write
|
||
22A9B469000
|
heap
|
page read and write
|
||
1B10000
|
heap
|
page read and write
|
||
7FF7A8C3A000
|
unkown
|
page readonly
|
||
5B17000
|
trusted library allocation
|
page read and write
|
||
6B50000
|
trusted library allocation
|
page read and write
|
||
193E000
|
stack
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
8F0000
|
unkown
|
page readonly
|
||
2F30000
|
trusted library allocation
|
page read and write
|
||
1F95BA6B000
|
heap
|
page read and write
|
||
545E000
|
stack
|
page read and write
|
||
56D0000
|
trusted library allocation
|
page read and write
|
||
582E000
|
stack
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
21CFD402000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
27B29D20000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
11E4CD08000
|
heap
|
page read and write
|
||
A1B7C7E000
|
stack
|
page read and write
|
||
21CFCBE0000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
219D9C7D000
|
heap
|
page read and write
|
||
655E000
|
stack
|
page read and write
|
||
15AB000
|
trusted library allocation
|
page execute and read and write
|
||
24DEB84F000
|
heap
|
page read and write
|
||
11E4CD00000
|
heap
|
page read and write
|
||
633E000
|
stack
|
page read and write
|
||
11E4CC81000
|
heap
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
27B29E5F000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
27B29E2A000
|
heap
|
page read and write
|
||
B0853BC000
|
stack
|
page read and write
|
||
56D0000
|
trusted library allocation
|
page read and write
|
||
296E4A22000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
6B3C000
|
stack
|
page read and write
|
||
A4586FB000
|
stack
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
A1B78FE000
|
stack
|
page read and write
|
||
11E4CC70000
|
heap
|
page read and write
|
||
5B3F000
|
trusted library allocation
|
page read and write
|
||
54D0000
|
trusted library allocation
|
page read and write
|
||
62DE000
|
stack
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
219D9D02000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
2F30000
|
trusted library allocation
|
page read and write
|
||
2F30000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
27B29E7B000
|
heap
|
page read and write
|
||
67A77FB000
|
stack
|
page read and write
|
||
22A9B210000
|
heap
|
page read and write
|
||
157D000
|
trusted library allocation
|
page execute and read and write
|
||
493BFB000
|
stack
|
page read and write
|
||
1AD1000
|
trusted library allocation
|
page read and write
|
||
126C000
|
stack
|
page read and write
|
||
422000
|
remote allocation
|
page execute and read and write
|
||
177F000
|
heap
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
125A000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
669E000
|
stack
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
1281000
|
heap
|
page read and write
|
||
A4588FF000
|
stack
|
page read and write
|
||
9F2CBFC000
|
stack
|
page read and write
|
||
1ABD7F13000
|
heap
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
10F0000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
56D0000
|
trusted library allocation
|
page read and write
|
||
69F0000
|
trusted library allocation
|
page read and write
|
||
24DEB829000
|
heap
|
page read and write
|
||
1CB5A785000
|
heap
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
54D0000
|
trusted library allocation
|
page execute and read and write
|
||
66F3BF7000
|
stack
|
page read and write
|
||
15B0000
|
heap
|
page read and write
|
||
62DE000
|
stack
|
page read and write
|
||
21CFCF02000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
5AF0000
|
trusted library allocation
|
page read and write
|
||
27B29E44000
|
heap
|
page read and write
|
||
296DF302000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
296DF229000
|
heap
|
page read and write
|
||
6A3E000
|
stack
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
1AF0000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
57B4000
|
trusted library allocation
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
19AB000
|
trusted library allocation
|
page read and write
|
||
588E000
|
stack
|
page read and write
|
||
197D000
|
stack
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
27B29E84000
|
heap
|
page read and write
|
||
1273000
|
heap
|
page read and write
|
||
5B17000
|
trusted library allocation
|
page read and write
|
||
219D9C54000
|
heap
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
3F51000
|
trusted library allocation
|
page read and write
|
||
296DFB58000
|
heap
|
page read and write
|
||
64A0000
|
trusted library allocation
|
page read and write
|
||
1153000
|
trusted library allocation
|
page execute and read and write
|
||
153E000
|
stack
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
126C000
|
stack
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
22A9B47B000
|
heap
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
296DF9F0000
|
trusted library allocation
|
page read and write
|
||
27B29E00000
|
heap
|
page read and write
|
||
296DF28C000
|
heap
|
page read and write
|
||
422000
|
remote allocation
|
page execute and read and write
|
||
193E000
|
stack
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
6B50000
|
trusted library allocation
|
page read and write
|
||
1ABD7E8E000
|
heap
|
page read and write
|
||
296E4814000
|
trusted library allocation
|
page read and write
|
||
493DFF000
|
stack
|
page read and write
|
||
5C60000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
15AB000
|
trusted library allocation
|
page execute and read and write
|
||
10F4000
|
heap
|
page read and write
|
||
1980000
|
trusted library allocation
|
page read and write
|
||
A1BA47D000
|
stack
|
page read and write
|
||
5AC0000
|
remote allocation
|
page read and write
|
||
15A7000
|
trusted library allocation
|
page execute and read and write
|
||
2DA0000
|
trusted library allocation
|
page read and write
|
||
1ABD7E8C000
|
heap
|
page read and write
|
||
124B000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
5AF0000
|
trusted library allocation
|
page read and write
|
||
157D000
|
trusted library allocation
|
page execute and read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
8F0000
|
unkown
|
page readonly
|
||
257B7750000
|
remote allocation
|
page read and write
|
||
2DA0000
|
trusted library allocation
|
page read and write
|
||
19B0000
|
trusted library allocation
|
page read and write
|
||
36DD67F000
|
stack
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
296DF9E3000
|
trusted library allocation
|
page read and write
|
||
52C8000
|
trusted library allocation
|
page read and write
|
||
296DF2B5000
|
heap
|
page read and write
|
||
59F0000
|
trusted library allocation
|
page read and write
|
||
49373E000
|
stack
|
page read and write
|
||
17D6000
|
heap
|
page read and write
|
||
117A000
|
trusted library allocation
|
page execute and read and write
|
||
10F4000
|
heap
|
page read and write
|
||
63DE000
|
stack
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
24DEB849000
|
heap
|
page read and write
|
||
629E000
|
stack
|
page read and write
|
||
1F95B9E0000
|
trusted library allocation
|
page read and write
|
||
1ABD7E71000
|
heap
|
page read and write
|
||
7FF7A8A71000
|
unkown
|
page execute read
|
||
5B11000
|
trusted library allocation
|
page read and write
|
||
D22000
|
unkown
|
page readonly
|
||
3027000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
5B11000
|
trusted library allocation
|
page read and write
|
||
1F95BAF7000
|
heap
|
page read and write
|
||
15B0000
|
heap
|
page read and write
|
||
67A7F7E000
|
stack
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
26CC7613000
|
heap
|
page read and write
|
||
11E4CC53000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
27B29E62000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
A7A9C7F000
|
stack
|
page read and write
|
||
24DEB84C000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
A4584FE000
|
stack
|
page read and write
|
||
296E0670000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
1281000
|
heap
|
page read and write
|
||
24DEB800000
|
heap
|
page read and write
|
||
296E4A63000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
27B29E3A000
|
heap
|
page read and write
|
||
56D0000
|
trusted library allocation
|
page read and write
|
||
44C2000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
58A0000
|
heap
|
page execute and read and write
|
||
10F4000
|
heap
|
page read and write
|
||
A7A917B000
|
stack
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
24DEB750000
|
trusted library allocation
|
page read and write
|
||
7FF7A8C98000
|
unkown
|
page readonly
|
||
2F30000
|
trusted library allocation
|
page read and write
|
||
6A3E000
|
stack
|
page read and write
|
||
11CA000
|
heap
|
page read and write
|
||
1990000
|
trusted library allocation
|
page read and write
|
||
32E2000
|
trusted library allocation
|
page read and write
|
||
68DE000
|
stack
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
56D0000
|
trusted library allocation
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
59AE000
|
stack
|
page read and write
|
||
8F2000
|
unkown
|
page readonly
|
||
21CFCC40000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
57EE000
|
stack
|
page read and write
|
||
27B29E48000
|
heap
|
page read and write
|
||
26CC7702000
|
heap
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
16BE000
|
stack
|
page read and write
|
||
296E46E0000
|
trusted library allocation
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
219DA402000
|
trusted library allocation
|
page read and write
|
||
11E4CBC0000
|
trusted library allocation
|
page read and write
|
||
A7A9A7B000
|
stack
|
page read and write
|
||
2F30000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
257B7029000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
1AD0000
|
trusted library allocation
|
page read and write
|
||
36DD8FC000
|
stack
|
page read and write
|
||
4751000
|
trusted library allocation
|
page read and write
|
||
1ABD7E6D000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
8F0000
|
unkown
|
page readonly
|
||
19B0000
|
trusted library allocation
|
page read and write
|
||
6490000
|
trusted library allocation
|
page read and write
|
||
588E000
|
stack
|
page read and write
|
||
22A9B441000
|
heap
|
page read and write
|
||
27B29E69000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
21CFCBD0000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
D20000
|
unkown
|
page readonly
|
||
24DEB902000
|
heap
|
page read and write
|
||
1367000
|
stack
|
page read and write
|
||
296E4930000
|
trusted library allocation
|
page read and write
|
||
296E4AE9000
|
heap
|
page read and write
|
||
296E4950000
|
trusted library allocation
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
158D000
|
trusted library allocation
|
page execute and read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
27B29E6B000
|
heap
|
page read and write
|
||
57B4000
|
trusted library allocation
|
page read and write
|
||
7FF7A8A70000
|
unkown
|
page readonly
|
||
64A0000
|
trusted library allocation
|
page read and write
|
||
296DF28F000
|
heap
|
page read and write
|
||
1740000
|
heap
|
page read and write
|
||
9F2C97C000
|
stack
|
page read and write
|
||
D20000
|
unkown
|
page readonly
|
||
A7A987E000
|
stack
|
page read and write
|
||
B08597F000
|
stack
|
page read and write
|
||
1996000
|
trusted library allocation
|
page read and write
|
||
655E000
|
stack
|
page read and write
|
||
1ACE000
|
stack
|
page read and write
|
||
1ABD7E02000
|
heap
|
page read and write
|
||
4751000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
296DF2FE000
|
heap
|
page read and write
|
||
26CC7520000
|
heap
|
page read and write
|
||
17D6000
|
heap
|
page read and write
|
||
64A0000
|
trusted library allocation
|
page read and write
|
||
42C1000
|
trusted library allocation
|
page read and write
|
||
15A0000
|
trusted library allocation
|
page read and write
|
||
1824000
|
heap
|
page read and write
|
||
799077D000
|
stack
|
page read and write
|
||
5B4B000
|
trusted library allocation
|
page read and write
|
||
493EFF000
|
stack
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
1140000
|
trusted library allocation
|
page read and write
|
||
53A2000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
1ABD7E88000
|
heap
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
64D0000
|
trusted library allocation
|
page read and write
|
||
1824000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
A1BA37D000
|
stack
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
17C2000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
219D9B30000
|
heap
|
page read and write
|
||
2DA0000
|
trusted library allocation
|
page read and write
|
||
56D0000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
15A0000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
1F95BAAB000
|
heap
|
page read and write
|
||
57D4000
|
trusted library allocation
|
page read and write
|
||
11E4CC13000
|
heap
|
page read and write
|
||
7FF7A8C98000
|
unkown
|
page readonly
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
26CC7700000
|
heap
|
page read and write
|
||
9F2CCF7000
|
stack
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
26CC763C000
|
heap
|
page read and write
|
||
152E000
|
stack
|
page read and write
|
||
126C000
|
stack
|
page read and write
|
||
1270000
|
heap
|
page read and write
|
||
2F30000
|
trusted library allocation
|
page read and write
|
||
19B0000
|
trusted library allocation
|
page read and write
|
||
296E4B00000
|
heap
|
page read and write
|
||
67DE000
|
stack
|
page read and write
|
||
59F0000
|
trusted library allocation
|
page read and write
|
||
B085F7D000
|
stack
|
page read and write
|
||
641E000
|
stack
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
2F30000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
27B29E46000
|
heap
|
page read and write
|
||
296E4B03000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
11E4CC48000
|
heap
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
296E4A2E000
|
heap
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
26CC766A000
|
heap
|
page read and write
|
||
1ABD7DD0000
|
trusted library allocation
|
page read and write
|
||
21CFD500000
|
heap
|
page read and write
|
||
11E4CC4E000
|
heap
|
page read and write
|
||
296DFB18000
|
heap
|
page read and write
|
||
9F2C9FE000
|
stack
|
page read and write
|
||
21CFCE43000
|
heap
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
11E7000
|
heap
|
page read and write
|
||
1CB5A4D1000
|
heap
|
page read and write
|
||
27B29E3D000
|
heap
|
page read and write
|
||
8F0000
|
unkown
|
page readonly
|
||
296DF1C0000
|
trusted library allocation
|
page read and write
|
||
14EE000
|
stack
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
27B29E6D000
|
heap
|
page read and write
|
||
BCEDCFE000
|
stack
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
27B29E13000
|
heap
|
page read and write
|
||
1584000
|
trusted library allocation
|
page read and write
|
||
1996000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
19B0000
|
trusted library allocation
|
page read and write
|
||
8F0000
|
unkown
|
page readonly
|
||
10F4000
|
heap
|
page read and write
|
||
1170000
|
trusted library allocation
|
page read and write
|
||
64B0000
|
trusted library allocation
|
page read and write
|
||
22A9B464000
|
heap
|
page read and write
|
||
199F000
|
trusted library allocation
|
page read and write
|
||
7FF7A8C8E000
|
unkown
|
page write copy
|
||
11E4CD02000
|
heap
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
57D4000
|
trusted library allocation
|
page read and write
|
||
302C000
|
trusted library allocation
|
page read and write
|
||
57C8000
|
trusted library allocation
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
17CA000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
296E4834000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
1F95BAE9000
|
heap
|
page read and write
|
||
7FF7A8C4A000
|
unkown
|
page readonly
|
||
257B7102000
|
heap
|
page read and write
|
||
219D9C90000
|
heap
|
page read and write
|
||
56D0000
|
trusted library allocation
|
page read and write
|
||
1CB5A420000
|
heap
|
page read and write
|
||
1824000
|
heap
|
page read and write
|
||
219D9C5E000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
2F30000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
63DE000
|
stack
|
page read and write
|
||
219D9C29000
|
heap
|
page read and write
|
||
57C8000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
21CFCE00000
|
heap
|
page read and write
|
||
1F95C317000
|
trusted library allocation
|
page read and write
|
||
A7A9D7F000
|
stack
|
page read and write
|
||
6490000
|
trusted library allocation
|
page read and write
|
||
1990000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
799087F000
|
stack
|
page read and write
|
||
61FE000
|
stack
|
page read and write
|
||
F60000
|
remote allocation
|
page read and write
|
||
1273000
|
heap
|
page read and write
|
||
A4589FF000
|
stack
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
2F30000
|
trusted library allocation
|
page read and write
|
||
296E4910000
|
trusted library allocation
|
page read and write
|
||
54D0000
|
trusted library allocation
|
page read and write
|
||
8F2000
|
unkown
|
page readonly
|
||
5C2E000
|
stack
|
page read and write
|
||
54EE000
|
trusted library allocation
|
page read and write
|
||
1720000
|
trusted library allocation
|
page execute and read and write
|
||
257B7750000
|
remote allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
296DF291000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
1573000
|
trusted library allocation
|
page execute and read and write
|
||
11E4CC67000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
8F2000
|
unkown
|
page readonly
|
||
6490000
|
trusted library allocation
|
page read and write
|
||
118B000
|
trusted library allocation
|
page execute and read and write
|
||
2DBC000
|
trusted library allocation
|
page read and write
|
||
56D0000
|
trusted library allocation
|
page read and write
|
||
79902FE000
|
stack
|
page read and write
|
||
2F10000
|
trusted library allocation
|
page read and write
|
||
5C60000
|
heap
|
page read and write
|
||
BCED6FC000
|
stack
|
page read and write
|
||
13D0000
|
trusted library allocation
|
page read and write
|
||
64A0000
|
trusted library allocation
|
page read and write
|
||
5B0D000
|
trusted library allocation
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
159A000
|
trusted library allocation
|
page execute and read and write
|
||
6490000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
67DE000
|
stack
|
page read and write
|
||
296DF1D0000
|
trusted library section
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
296DFB13000
|
heap
|
page read and write
|
||
296DF9C1000
|
trusted library allocation
|
page read and write
|
||
16D0000
|
trusted library allocation
|
page read and write
|
||
17D2000
|
heap
|
page read and write
|
||
116D000
|
trusted library allocation
|
page execute and read and write
|
||
A7A9E7A000
|
stack
|
page read and write
|
||
679D000
|
stack
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
8F0000
|
unkown
|
page readonly
|
||
296E4AFB000
|
heap
|
page read and write
|
||
5B0D000
|
trusted library allocation
|
page read and write
|
||
24DEB900000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
59F0000
|
trusted library allocation
|
page read and write
|
||
9F2CDFE000
|
stack
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
1720000
|
trusted library allocation
|
page execute and read and write
|
||
17D6000
|
heap
|
page read and write
|
||
296DF190000
|
heap
|
page read and write
|
||
177C000
|
heap
|
page read and write
|
||
4762000
|
trusted library allocation
|
page read and write
|
||
296E4950000
|
remote allocation
|
page read and write
|
||
641E000
|
stack
|
page read and write
|
||
115D000
|
trusted library allocation
|
page execute and read and write
|
||
10F4000
|
heap
|
page read and write
|
||
D22000
|
unkown
|
page readonly
|
||
52C8000
|
trusted library allocation
|
page read and write
|
||
32C1000
|
trusted library allocation
|
page read and write
|
||
296E47FE000
|
trusted library allocation
|
page read and write
|
||
9F2CEFF000
|
stack
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
3045000
|
trusted library allocation
|
page read and write
|
||
24DEB83C000
|
heap
|
page read and write
|
||
296DF200000
|
heap
|
page read and write
|
||
8F0000
|
unkown
|
page readonly
|
||
10F4000
|
heap
|
page read and write
|
||
219D9D13000
|
heap
|
page read and write
|
||
36DD87F000
|
stack
|
page read and write
|
||
296E4950000
|
remote allocation
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
4937BE000
|
stack
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
296E4830000
|
trusted library allocation
|
page read and write
|
||
219D9C13000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
1ABD7E5A000
|
heap
|
page read and write
|
||
27B29E41000
|
heap
|
page read and write
|
||
1367000
|
stack
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
15A7000
|
trusted library allocation
|
page execute and read and write
|
||
1180000
|
trusted library allocation
|
page read and write
|
||
7FF7A8CAA000
|
unkown
|
page readonly
|
||
669E000
|
stack
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
42C1000
|
trusted library allocation
|
page read and write
|
||
2F30000
|
trusted library allocation
|
page read and write
|
||
11E4CC67000
|
heap
|
page read and write
|
||
1ABD8602000
|
trusted library allocation
|
page read and write
|
||
296E4810000
|
trusted library allocation
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
2F30000
|
trusted library allocation
|
page read and write
|
||
27B29E63000
|
heap
|
page read and write
|
||
1573000
|
trusted library allocation
|
page execute and read and write
|
||
A1B9E7E000
|
stack
|
page read and write
|
||
17CE000
|
heap
|
page read and write
|
||
5B3F000
|
trusted library allocation
|
page read and write
|
||
1809000
|
heap
|
page read and write
|
||
2F10000
|
trusted library allocation
|
page read and write
|
||
1F95BAB3000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
623E000
|
stack
|
page read and write
|
||
257B7000000
|
heap
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
158D000
|
trusted library allocation
|
page execute and read and write
|
||
2D90000
|
trusted library allocation
|
page read and write
|
||
1584000
|
trusted library allocation
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
1F95BAC5000
|
heap
|
page read and write
|
||
296DF278000
|
heap
|
page read and write
|
||
22A9B500000
|
heap
|
page read and write
|
||
22A9B428000
|
heap
|
page read and write
|
||
6A3E000
|
stack
|
page read and write
|
||
2DB6000
|
trusted library allocation
|
page read and write
|
||
2F30000
|
trusted library allocation
|
page read and write
|
||
1274000
|
heap
|
page read and write
|
||
69F0000
|
trusted library allocation
|
page read and write
|
||
60FE000
|
stack
|
page read and write
|
||
2DBF000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
2F30000
|
trusted library allocation
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
A7A9CFF000
|
stack
|
page read and write
|
||
2ECE000
|
stack
|
page read and write
|
||
26CC7530000
|
heap
|
page read and write
|
||
257B6FC0000
|
heap
|
page read and write
|
||
66F39FC000
|
stack
|
page read and write
|
||
1ABD7E8E000
|
heap
|
page read and write
|
||
A45847E000
|
stack
|
page read and write
|
||
F37000
|
stack
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
22A9B402000
|
heap
|
page read and write
|
||
A7A9577000
|
stack
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
296E47F0000
|
trusted library allocation
|
page read and write
|
||
53C1000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
1560000
|
trusted library allocation
|
page read and write
|
||
5B19000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
27B29E2F000
|
heap
|
page read and write
|
||
E3B000
|
stack
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
1AD1000
|
trusted library allocation
|
page read and write
|
||
19AB000
|
trusted library allocation
|
page read and write
|
||
53B0000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
296DFA02000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
A1B9A9C000
|
stack
|
page read and write
|
||
629E000
|
stack
|
page read and write
|
||
26CC7648000
|
heap
|
page read and write
|
||
1590000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
17DA000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
54E0000
|
trusted library allocation
|
page read and write
|
||
1F95BA00000
|
heap
|
page read and write
|
||
1574000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
296E4920000
|
trusted library allocation
|
page read and write
|
||
B085A7E000
|
stack
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
26CC7677000
|
heap
|
page read and write
|
||
199F000
|
trusted library allocation
|
page read and write
|
||
24DEB913000
|
heap
|
page read and write
|
||
3021000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
197D000
|
stack
|
page read and write
|
||
651E000
|
stack
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
592F000
|
stack
|
page read and write
|
||
2F30000
|
trusted library allocation
|
page read and write
|
||
53BC000
|
trusted library allocation
|
page read and write
|
||
3F79000
|
trusted library allocation
|
page read and write
|
||
596E000
|
stack
|
page read and write
|
||
54D0000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
D20000
|
unkown
|
page readonly
|
||
296E4950000
|
remote allocation
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
64B0000
|
trusted library allocation
|
page read and write
|
||
1F95BB13000
|
heap
|
page read and write
|
||
64A0000
|
trusted library allocation
|
page read and write
|
||
27B29E38000
|
heap
|
page read and write
|
||
1574000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
11A0000
|
trusted library allocation
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
4936BB000
|
stack
|
page read and write
|
||
7FF7A8A70000
|
unkown
|
page readonly
|
||
1597000
|
trusted library allocation
|
page execute and read and write
|
||
A4581AC000
|
stack
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
6490000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
1730000
|
heap
|
page read and write
|
||
159A000
|
trusted library allocation
|
page execute and read and write
|
||
F60000
|
remote allocation
|
page read and write
|
||
159A000
|
trusted library allocation
|
page execute and read and write
|
||
10F4000
|
heap
|
page read and write
|
||
5B17000
|
trusted library allocation
|
page read and write
|
||
44B1000
|
trusted library allocation
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
53D1000
|
heap
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
24DEB85C000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
17DA000
|
heap
|
page read and write
|
||
19C0000
|
heap
|
page read and write
|
||
59F0000
|
trusted library allocation
|
page read and write
|
||
1B10000
|
heap
|
page read and write
|
||
54EF000
|
trusted library allocation
|
page read and write
|
||
296E48C0000
|
trusted library allocation
|
page read and write
|
||
1F95BABF000
|
heap
|
page read and write
|
||
1580000
|
trusted library allocation
|
page read and write
|
||
2DA0000
|
trusted library allocation
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
1560000
|
trusted library allocation
|
page read and write
|
||
A1B787B000
|
stack
|
page read and write
|
||
257B6FF0000
|
trusted library allocation
|
page read and write
|
||
B085E7E000
|
stack
|
page read and write
|
||
44C2000
|
trusted library allocation
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
53D0000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
296E4AAC000
|
heap
|
page read and write
|
||
21CFCEB9000
|
heap
|
page read and write
|
||
1AE0000
|
heap
|
page execute and read and write
|
||
679D000
|
stack
|
page read and write
|
||
9F2C5CE000
|
stack
|
page read and write
|
||
27B29E42000
|
heap
|
page read and write
|
||
1800000
|
heap
|
page read and write
|
||
539B000
|
trusted library allocation
|
page read and write
|
||
19A0000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
219D9D08000
|
heap
|
page read and write
|
||
17C6000
|
heap
|
page read and write
|
||
181D000
|
heap
|
page read and write
|
||
27B29E4E000
|
heap
|
page read and write
|
||
66F387E000
|
stack
|
page read and write
|
||
17CA000
|
heap
|
page read and write
|
There are 1399 hidden memdumps, click here to show them.