Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SecuriteInfo.com.Variant.FakeAlert.2.24488.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
initial sample
|
||
C:\ProgramData\Synaptics\RCXCD96.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Synaptics\Synaptics.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RCXDA77.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RCXF979.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\YC9w8Aif.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\uniformerede.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\SecuriteInfo.com.Variant.FakeAlert.2.24488.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Documents\DUUDTUBZFW\~$cache1
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Synaptics.exe_a5c396d0e6d651f539cd1b6dccb863d9c272052_455b7b6e_18c9b0c2\Report.wer
|
Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER89B2.tmp.dmp
|
Mini DuMP crash report, 15 streams, Fri May 27 11:38:39 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA317.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA441.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\76A735AA-7941-42FC-A093-50DC74F5224B
|
XML 1.0 document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\6D6YYf5.ini
|
HTML document, UTF-8 Unicode text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\79Qsp1R.ini
|
HTML document, UTF-8 Unicode text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\9nIC29m.ini
|
HTML document, UTF-8 Unicode text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\A74oXdM.ini
|
HTML document, UTF-8 Unicode text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\AEB8Tw9.ini
|
HTML document, UTF-8 Unicode text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Ap7UmLD.ini
|
HTML document, UTF-8 Unicode text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\CrVbcG3.ini
|
HTML document, UTF-8 Unicode text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Forfrelses5.kni
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Fp5pWOv.ini
|
HTML document, UTF-8 Unicode text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\HEaQKbm.ini
|
HTML document, UTF-8 Unicode text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Hk28YM9.ini
|
HTML document, UTF-8 Unicode text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\JcTixxK.ini
|
HTML document, UTF-8 Unicode text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\KrD7UxG.ini
|
HTML document, UTF-8 Unicode text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\MTLdFLE.ini
|
HTML document, UTF-8 Unicode text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\NDyKofJ.ini
|
HTML document, UTF-8 Unicode text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\OBixP3cz.xlsm
|
Microsoft Excel 2007+
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\QwRBqv2.ini
|
HTML document, UTF-8 Unicode text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\REi9Htc.ini
|
HTML document, UTF-8 Unicode text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Stopes204.lnk
|
MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun
Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\U5UjEkM.ini
|
HTML document, UTF-8 Unicode text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WGLMqHD.ini
|
HTML document, UTF-8 Unicode text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Y1lkYiF.ini
|
HTML document, UTF-8 Unicode text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\YC9w8Aif.ico
|
MS Windows icon resource - 1 icon, 32x32, 32 colors
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_iivijlnh.tvc.psm1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lqiaigga.n0f.ps1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sqjqhruh.5xf.psm1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tfhs1qp5.1e4.ps1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\cacert.pem
|
HTML document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\gDI1ITp.ini
|
HTML document, UTF-8 Unicode text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\hbqA6yu.ini
|
HTML document, UTF-8 Unicode text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is9f5lp.ini
|
HTML document, UTF-8 Unicode text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\kKBEMnN.ini
|
HTML document, UTF-8 Unicode text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nnXaK8k.ini
|
HTML document, UTF-8 Unicode text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsbCCFB.tmp\System.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\olE9oXI.ini
|
HTML document, UTF-8 Unicode text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\open-menu-symbolic.symbolic.png
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
modified
|
||
C:\Users\user\AppData\Local\Temp\p3Ti5MN.ini
|
HTML document, UTF-8 Unicode text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\sGgz8WE.ini
|
HTML document, UTF-8 Unicode text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tARkXYN.ini
|
HTML document, UTF-8 Unicode text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\td7DLxd.ini
|
HTML document, UTF-8 Unicode text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\udfrielser.ini
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\Desktop\._cache_uniformerede.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Users\user\Documents\20220527\PowerShell_transcript.701188.PEGMRVYd.20220527043744.txt
|
UTF-8 Unicode (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\Documents\20220527\PowerShell_transcript.701188.kN_b0V1N.20220527043800.txt
|
UTF-8 Unicode (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\Documents\DUUDTUBZFW\EOWRVPQCCS.xlsm
|
Microsoft Excel 2007+
|
dropped
|
||
C:\Users\user\Documents\DUUDTUBZFW\~$EOWRVPQCCS.xlsx
|
data
|
modified
|
There are 51 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\SecuriteInfo.com.Variant.FakeAlert.2.24488.exe
|
"C:\Users\user\Desktop\SecuriteInfo.com.Variant.FakeAlert.2.24488.exe"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c powershell -Command "Add-MpPreference -ExclusionPath @($env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive)
-Force" & powershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force" & exit
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c start "" "C:\Users\user\AppData\Local\Temp\uniformerede.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
powershell -Command "Add-MpPreference -ExclusionPath @($env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive)
-Force"
|
||
C:\Users\user\AppData\Local\Temp\uniformerede.exe
|
"C:\Users\user\AppData\Local\Temp\uniformerede.exe"
|
||
C:\ProgramData\Synaptics\Synaptics.exe
|
"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
powershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force"
|
||
C:\ProgramData\Synaptics\Synaptics.exe
|
"C:\ProgramData\Synaptics\Synaptics.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Users\user\Desktop\._cache_uniformerede.exe
|
"C:\Users\user\Desktop\._cache_uniformerede.exe"
|
||
C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
|
"C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE" /automation -Embedding
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 6620 -s 2904
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 6620 -s 4052
|
There are 4 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://xred.site50.net/syn/SSLLibrary.dll
|
unknown
|
||
http://2.58.149.33/ominz_QLUnxlrvVz46.bin
|
|||
https://api.diagnosticssdf.office.com
|
unknown
|
||
https://login.microsoftonline.com/
|
unknown
|
||
https://shell.suite.office.com:1443
|
unknown
|
||
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
|
unknown
|
||
https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47/oauth2/authorize
|
unknown
|
||
http://xred.site50.net/syn/SSLLibrary.dlX
|
unknown
|
||
https://autodiscover-s.outlook.com/
|
unknown
|
||
https://roaming.edog.
|
unknown
|
||
https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Flickr
|
unknown
|
||
https://cdn.entity.
|
unknown
|
||
https://api.addins.omex.office.net/appinfo/query
|
unknown
|
||
https://clients.config.office.net/user/v1.0/tenantassociationkey
|
unknown
|
||
https://dev.virtualearth.net/REST/V1/GeospatialEndpoint/
|
unknown
|
||
https://powerlift.acompli.net
|
unknown
|
||
https://rpsticket.partnerservices.getmicrosoftkey.com
|
unknown
|
||
https://lookup.onenote.com/lookup/geolocation/v1
|
unknown
|
||
https://cortana.ai
|
unknown
|
||
https://apc.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
|
unknown
|
||
https://cloudfiles.onenote.com/upload.aspx
|
unknown
|
||
https://syncservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
|
unknown
|
||
https://entitlement.diagnosticssdf.office.com
|
unknown
|
||
https://na01.oscs.protection.outlook.com/api/SafeLinksApi/GetPolicy
|
unknown
|
||
https://api.aadrm.com/
|
unknown
|
||
https://ofcrecsvcapi-int.azurewebsites.net/
|
unknown
|
||
http://xred.site50.net/syn/SUpdate.iniZ
|
unknown
|
||
https://dataservice.protection.outlook.com/PsorWebService/v1/ClientSyncFile/MipPolicies
|
unknown
|
||
http://xred.site50.net/syn/SUpdate.ini
|
unknown
|
||
https://api.microsoftstream.com/api/
|
unknown
|
||
https://insertmedia.bing.office.net/images/hosted?host=office&adlt=strict&hostType=Immersive
|
unknown
|
||
https://cr.office.com
|
unknown
|
||
https://augloop.office.com;https://augloop-int.officeppe.com;https://augloop-dogfood.officeppe.com;h
|
unknown
|
||
https://portal.office.com/account/?ref=ClientMeControl
|
unknown
|
||
https://graph.ppe.windows.net
|
unknown
|
||
https://res.getmicrosoftkey.com/api/redemptionevents
|
unknown
|
||
https://powerlift-frontdesk.acompli.net
|
unknown
|
||
https://tasks.office.com
|
unknown
|
||
https://officeci.azurewebsites.net/api/
|
unknown
|
||
https://sr.outlook.office.net/ws/speech/recognize/assistant/work
|
unknown
|
||
https://store.office.cn/addinstemplate
|
unknown
|
||
https://docs.google.com/dr
|
unknown
|
||
https://api.aadrm.com
|
unknown
|
||
https://outlook.office.com/autosuggest/api/v1/init?cvid=
|
unknown
|
||
https://globaldisco.crm.dynamics.com
|
unknown
|
||
https://messaging.engagement.office.com/
|
unknown
|
||
https://docs.google.com/0
|
unknown
|
||
https://nam.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
|
unknown
|
||
https://dev0-api.acompli.net/autodetect
|
unknown
|
||
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1:
|
unknown
|
||
https://www.odwebp.svc.ms
|
unknown
|
||
http://xred.site50.net/syn/Synaptics.rar
|
unknown
|
||
https://api.diagnosticssdf.office.com/v2/feedback
|
unknown
|
||
https://api.powerbi.com/v1.0/myorg/groups
|
unknown
|
||
https://web.microsoftstream.com/video/
|
unknown
|
||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
||
https://api.addins.store.officeppe.com/addinstemplate
|
unknown
|
||
https://graph.windows.net
|
unknown
|
||
https://dataservice.o365filtering.com/
|
unknown
|
||
https://officesetup.getmicrosoftkey.com
|
unknown
|
||
https://analysis.windows.net/powerbi/api
|
unknown
|
||
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
|
69.42.215.252
|
||
https://prod-global-autodetect.acompli.net/autodetect
|
unknown
|
||
https://outlook.office365.com/autodiscover/autodiscover.json
|
unknown
|
||
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
|
unknown
|
||
https://powerpoint.uservoice.com/forums/288952-powerpoint-for-ipad-iphone-ios
|
unknown
|
||
https://eur.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
|
unknown
|
||
https://pf.directory.live.com/profile/mine/System.ShortCircuitProfile.json
|
unknown
|
||
https://ncus.contentsync.
|
unknown
|
||
https://onedrive.live.com/about/download/?windows10SyncClientInstalled=false
|
unknown
|
||
https://webdir.online.lync.com/autodiscover/autodiscoverservice.svc/root/
|
unknown
|
||
http://weather.service.msn.com/data.aspx
|
unknown
|
||
https://apis.live.net/v5.0/
|
unknown
|
||
https://officemobile.uservoice.com/forums/929800-office-app-ios-and-ipad-asks
|
unknown
|
||
https://word.uservoice.com/forums/304948-word-for-ipad-iphone-ios
|
unknown
|
||
https://autodiscover-s.outlook.com/autodiscover/autodiscover.xml
|
unknown
|
||
https://management.azure.com
|
unknown
|
||
https://outlook.office365.com
|
unknown
|
||
https://wus2.contentsync.
|
unknown
|
||
http://xred.site50.net/syn/Synaptics.rarZ
|
unknown
|
||
https://incidents.diagnostics.office.com
|
unknown
|
||
https://clients.config.office.net/user/v1.0/ios
|
unknown
|
||
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dll
|
unknown
|
||
https://insertmedia.bing.office.net/odc/insertmedia
|
unknown
|
||
https://o365auditrealtimeingestion.manage.office.com
|
unknown
|
||
https://outlook.office365.com/api/v1.0/me/Activities
|
unknown
|
||
https://api.office.net
|
unknown
|
||
https://incidents.diagnosticssdf.office.com
|
unknown
|
||
https://asgsmsproxyapi.azurewebsites.net/
|
unknown
|
||
https://clients.config.office.net/user/v1.0/android/policies
|
unknown
|
||
https://entitlement.diagnostics.office.com
|
unknown
|
||
https://pf.directory.live.com/profile/mine/WLX.Profiles.IC.json
|
unknown
|
||
https://substrate.office.com/search/api/v2/init
|
unknown
|
||
https://outlook.office.com/
|
unknown
|
||
https://storage.live.com/clientlogs/uploadlocation
|
unknown
|
||
https://outlook.office365.com/
|
unknown
|
||
https://webshell.suite.office.com
|
unknown
|
||
https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=OneDrive
|
unknown
|
||
https://substrate.office.com/search/api/v1/SearchHistory
|
unknown
|
||
https://management.azure.com/
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
freedns.afraid.org
|
69.42.215.252
|
||
docs.google.com
|
172.217.168.14
|
||
xred.mooo.com
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
172.217.168.14
|
docs.google.com
|
United States
|
||
69.42.215.252
|
freedns.afraid.org
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
|
Synaptics Pointing Device Driver
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\gaslights\Reed
|
haandhvelseslovene
|
||
HKEY_CURRENT_USER\Software\Intercourse155\Bougainvillea
|
Expand String Value
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Apis233\Underlaying12
|
Expand String Value
|
||
HKEY_CURRENT_USER\Software\sskendejalousi\Ansvarsfuldstes
|
BHUTS
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\URBANITETENS
|
drachen
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Faring
|
Forlovelsesgaven38
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\Resiliency\StartupItems
|
3*=
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\Resiliency\StartupItems
|
4*=
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\IOAV
|
LastBootTime
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache
|
RemoteClearDate
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3
|
Last
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
|
VBAFiles
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\Common\ExdCache\Excel8.0
|
MSForms
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\Common\ExdCache\Excel8.0
|
MSComctlLib
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ReviewCycle
|
ReviewToken
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
|
FilePath
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
|
StartDate
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
|
EndDate
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
|
Properties
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
|
Url
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache
|
LastClean
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\Resiliency\DocumentRecovery\2555A
|
2555A
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
|
DisableWinHttpCertAuth
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
|
DisableIsOwnerRegex
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
|
DisableSessionAwareHttpClose
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
|
DisableADALForExtendedApps
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
|
DisableADALSetSilentAuth
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
|
msoridDisableGuestCredProvider
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
|
msoridDisableOstringReplace
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
|
ProductFiles
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
|
en-US
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
|
en-US
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
|
EXCELFiles
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\IOAV
|
LastBootTime
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\Security\Trusted Documents
|
LastPurgeTime
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
|
AmiHivePermissionsCorrect
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
|
AmiHiveOwnerCorrect
|
||
\REGISTRY\A\{b393fbe2-b257-19b8-f25c-3feb4fb614eb}\Root\InventoryApplicationFile\synaptics.exe|8465fa76
|
ProgramId
|
||
\REGISTRY\A\{b393fbe2-b257-19b8-f25c-3feb4fb614eb}\Root\InventoryApplicationFile\synaptics.exe|8465fa76
|
FileId
|
||
\REGISTRY\A\{b393fbe2-b257-19b8-f25c-3feb4fb614eb}\Root\InventoryApplicationFile\synaptics.exe|8465fa76
|
LowerCaseLongPath
|
||
\REGISTRY\A\{b393fbe2-b257-19b8-f25c-3feb4fb614eb}\Root\InventoryApplicationFile\synaptics.exe|8465fa76
|
LongPathHash
|
||
\REGISTRY\A\{b393fbe2-b257-19b8-f25c-3feb4fb614eb}\Root\InventoryApplicationFile\synaptics.exe|8465fa76
|
Name
|
||
\REGISTRY\A\{b393fbe2-b257-19b8-f25c-3feb4fb614eb}\Root\InventoryApplicationFile\synaptics.exe|8465fa76
|
Publisher
|
||
\REGISTRY\A\{b393fbe2-b257-19b8-f25c-3feb4fb614eb}\Root\InventoryApplicationFile\synaptics.exe|8465fa76
|
Version
|
||
\REGISTRY\A\{b393fbe2-b257-19b8-f25c-3feb4fb614eb}\Root\InventoryApplicationFile\synaptics.exe|8465fa76
|
BinFileVersion
|
||
\REGISTRY\A\{b393fbe2-b257-19b8-f25c-3feb4fb614eb}\Root\InventoryApplicationFile\synaptics.exe|8465fa76
|
BinaryType
|
||
\REGISTRY\A\{b393fbe2-b257-19b8-f25c-3feb4fb614eb}\Root\InventoryApplicationFile\synaptics.exe|8465fa76
|
ProductName
|
||
\REGISTRY\A\{b393fbe2-b257-19b8-f25c-3feb4fb614eb}\Root\InventoryApplicationFile\synaptics.exe|8465fa76
|
ProductVersion
|
||
\REGISTRY\A\{b393fbe2-b257-19b8-f25c-3feb4fb614eb}\Root\InventoryApplicationFile\synaptics.exe|8465fa76
|
LinkDate
|
||
\REGISTRY\A\{b393fbe2-b257-19b8-f25c-3feb4fb614eb}\Root\InventoryApplicationFile\synaptics.exe|8465fa76
|
BinProductVersion
|
||
\REGISTRY\A\{b393fbe2-b257-19b8-f25c-3feb4fb614eb}\Root\InventoryApplicationFile\synaptics.exe|8465fa76
|
Size
|
||
\REGISTRY\A\{b393fbe2-b257-19b8-f25c-3feb4fb614eb}\Root\InventoryApplicationFile\synaptics.exe|8465fa76
|
Language
|
||
\REGISTRY\A\{b393fbe2-b257-19b8-f25c-3feb4fb614eb}\Root\InventoryApplicationFile\synaptics.exe|8465fa76
|
IsPeFile
|
||
\REGISTRY\A\{b393fbe2-b257-19b8-f25c-3feb4fb614eb}\Root\InventoryApplicationFile\synaptics.exe|8465fa76
|
IsOsComponent
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
|
ExceptionRecord
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceTicket
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceId
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
ApplicationFlags
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
|
0018800453F4626F
|
There are 53 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
30C0000
|
direct allocation
|
page execute and read and write
|
||
563237E000
|
stack
|
page read and write
|
||
26081067000
|
heap
|
page read and write
|
||
98000
|
stack
|
page read and write
|
||
17068C7A000
|
heap
|
page read and write
|
||
79A8000
|
trusted library allocation
|
page read and write
|
||
1B95C011000
|
heap
|
page read and write
|
||
5CCD000
|
stack
|
page read and write
|
||
9FDD000
|
stack
|
page read and write
|
||
71AE000
|
stack
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
868E000
|
stack
|
page read and write
|
||
1DE53C28000
|
heap
|
page read and write
|
||
757E000
|
stack
|
page read and write
|
||
30000
|
unkown
|
page read and write
|
||
81CD000
|
stack
|
page read and write
|
||
26C8F229000
|
heap
|
page read and write
|
||
6C8000
|
heap
|
page read and write
|
||
9BDE000
|
stack
|
page read and write
|
||
6DEE000
|
stack
|
page read and write
|
||
1B95C02D000
|
heap
|
page read and write
|
||
8E1E000
|
stack
|
page read and write
|
||
7CCD000
|
stack
|
page read and write
|
||
1EBA9A38000
|
heap
|
page read and write
|
||
A25D000
|
stack
|
page read and write
|
||
720000
|
heap
|
page read and write
|
||
3B2E000
|
stack
|
page read and write
|
||
3AED000
|
stack
|
page read and write
|
||
2453000
|
heap
|
page read and write
|
||
4CED000
|
stack
|
page read and write
|
||
609D000
|
stack
|
page read and write
|
||
796C000
|
trusted library allocation
|
page read and write
|
||
6D0000
|
heap
|
page read and write
|
||
4F2D000
|
stack
|
page read and write
|
||
71ED000
|
stack
|
page read and write
|
||
9A9E000
|
stack
|
page read and write
|
||
1B956C78000
|
heap
|
page read and write
|
||
26C90071000
|
heap
|
page read and write
|
||
91DE000
|
stack
|
page read and write
|
||
217BD35C000
|
heap
|
page read and write
|
||
5F51000
|
stack
|
page read and write
|
||
655D000
|
stack
|
page read and write
|
||
18282A10000
|
heap
|
page read and write
|
||
722000
|
heap
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
7957000
|
trusted library allocation
|
page read and write
|
||
17068C60000
|
heap
|
page read and write
|
||
44EC000
|
stack
|
page read and write
|
||
5DCD000
|
stack
|
page read and write
|
||
530D000
|
stack
|
page read and write
|
||
48BD000
|
stack
|
page read and write
|
||
476D000
|
stack
|
page read and write
|
||
5DCD000
|
stack
|
page read and write
|
||
91DE000
|
stack
|
page read and write
|
||
3C2D000
|
stack
|
page read and write
|
||
945E000
|
stack
|
page read and write
|
||
3C6E000
|
stack
|
page read and write
|
||
5C8E000
|
stack
|
page read and write
|
||
9C1D000
|
stack
|
page read and write
|
||
26080F00000
|
heap
|
page read and write
|
||
858D000
|
stack
|
page read and write
|
||
58CF000
|
stack
|
page read and write
|
||
416D000
|
stack
|
page read and write
|
||
659D000
|
stack
|
page read and write
|
||
5F51000
|
stack
|
page read and write
|
||
692D000
|
stack
|
page read and write
|
||
15B9E7F000
|
stack
|
page read and write
|
||
702000
|
heap
|
page read and write
|
||
66DD000
|
stack
|
page read and write
|
||
70AD000
|
stack
|
page read and write
|
||
645D000
|
stack
|
page read and write
|
||
23B96429000
|
heap
|
page read and write
|
||
26C8F24E000
|
heap
|
page read and write
|
||
6F2D000
|
stack
|
page read and write
|
||
71ED000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
1DE53D13000
|
heap
|
page read and write
|
||
44EC000
|
stack
|
page read and write
|
||
8F5E000
|
stack
|
page read and write
|
||
A85F000
|
stack
|
page read and write
|
||
719000
|
heap
|
page read and write
|
||
743E000
|
stack
|
page read and write
|
||
1B95C300000
|
trusted library allocation
|
page read and write
|
||
416D000
|
stack
|
page read and write
|
||
5535000
|
trusted library allocation
|
page read and write
|
||
26C8F3E0000
|
heap
|
page read and write
|
||
A75E000
|
stack
|
page read and write
|
||
98000
|
stack
|
page read and write
|
||
891E000
|
stack
|
page read and write
|
||
1EBA9B23000
|
heap
|
page read and write
|
||
5F0E000
|
stack
|
page read and write
|
||
21D8000
|
heap
|
page read and write
|
||
79B3000
|
trusted library allocation
|
page read and write
|
||
96DE000
|
stack
|
page read and write
|
||
8BDD000
|
stack
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
67A000
|
heap
|
page read and write
|
||
666000
|
heap
|
page read and write
|
||
217BDB8A000
|
heap
|
page read and write
|
||
5524000
|
trusted library allocation
|
page read and write
|
||
1EBA9A02000
|
unkown
|
page read and write
|
||
9BDE000
|
stack
|
page read and write
|
||
26081013000
|
heap
|
page read and write
|
||
86CD000
|
stack
|
page read and write
|
||
70C000
|
heap
|
page read and write
|
||
1B95C040000
|
heap
|
page read and write
|
||
13F02F50000
|
heap
|
page read and write
|
||
1DE53A40000
|
heap
|
page read and write
|
||
57CE000
|
stack
|
page read and write
|
||
6B6E000
|
stack
|
page read and write
|
||
4C9B000
|
stack
|
page read and write
|
||
17068A70000
|
heap
|
page read and write
|
||
818E000
|
stack
|
page read and write
|
||
26C8F27B000
|
heap
|
page read and write
|
||
79AE000
|
trusted library allocation
|
page read and write
|
||
63A000
|
heap
|
page read and write
|
||
53A000
|
unkown
|
page readonly
|
||
56B0000
|
heap
|
page read and write
|
||
79E4000
|
trusted library allocation
|
page read and write
|
||
551F000
|
trusted library allocation
|
page read and write
|
||
609D000
|
stack
|
page read and write
|
||
FD6EF7F000
|
stack
|
page read and write
|
||
13F02FF0000
|
trusted library allocation
|
page read and write
|
||
630000
|
heap
|
page read and write
|
||
534D000
|
stack
|
page read and write
|
||
668000
|
heap
|
page read and write
|
||
6EA000
|
heap
|
page read and write
|
||
8BF000
|
stack
|
page read and write
|
||
660000
|
heap
|
page read and write
|
||
959E000
|
stack
|
page read and write
|
||
799E000
|
trusted library allocation
|
page read and write
|
||
1B956C73000
|
heap
|
page read and write
|
||
1B95BEE0000
|
trusted library allocation
|
page read and write
|
||
19D000
|
stack
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
54F0000
|
trusted library allocation
|
page read and write
|
||
A39D000
|
stack
|
page read and write
|
||
985D000
|
stack
|
page read and write
|
||
217BD560000
|
heap
|
page read and write
|
||
15BA17A000
|
stack
|
page read and write
|
||
269847F000
|
stack
|
page read and write
|
||
2110000
|
trusted library allocation
|
page read and write
|
||
E31FB7E000
|
stack
|
page read and write
|
||
795B000
|
trusted library allocation
|
page read and write
|
||
68D000
|
heap
|
page read and write
|
||
4A5000
|
unkown
|
page readonly
|
||
A75E000
|
stack
|
page read and write
|
||
4C9E000
|
stack
|
page read and write
|
||
43ED000
|
stack
|
page read and write
|
||
5A5000
|
heap
|
page read and write
|
||
49FA000
|
stack
|
page read and write
|
||
76BE000
|
stack
|
page read and write
|
||
48FD000
|
stack
|
page read and write
|
||
6A6D000
|
stack
|
page read and write
|
||
71ED000
|
stack
|
page read and write
|
||
553A000
|
trusted library allocation
|
page read and write
|
||
5E0D000
|
stack
|
page read and write
|
||
6CAE000
|
stack
|
page read and write
|
||
17068C6D000
|
heap
|
page read and write
|
||
54DA000
|
trusted library allocation
|
page read and write
|
||
67A000
|
heap
|
page read and write
|
||
76FD000
|
stack
|
page read and write
|
||
506D000
|
stack
|
page read and write
|
||
A49E000
|
stack
|
page read and write
|
||
1DE53D00000
|
heap
|
page read and write
|
||
568D000
|
stack
|
page read and write
|
||
551C000
|
trusted library allocation
|
page read and write
|
||
1B957581000
|
trusted library allocation
|
page read and write
|
||
91DE000
|
stack
|
page read and write
|
||
4CED000
|
stack
|
page read and write
|
||
5F0E000
|
stack
|
page read and write
|
||
5BE000
|
stack
|
page read and write
|
||
2120000
|
trusted library allocation
|
page read and write
|
||
412D000
|
stack
|
page read and write
|
||
87CE000
|
stack
|
page read and write
|
||
3D6F000
|
stack
|
page read and write
|
||
4B9D000
|
stack
|
page read and write
|
||
506D000
|
stack
|
page read and write
|
||
96E000
|
stack
|
page read and write
|
||
795B000
|
trusted library allocation
|
page read and write
|
||
A4DD000
|
stack
|
page read and write
|
||
796C000
|
trusted library allocation
|
page read and write
|
||
1EBA9D02000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
79B6000
|
trusted library allocation
|
page read and write
|
||
77FE000
|
stack
|
page read and write
|
||
8D1D000
|
stack
|
page read and write
|
||
62DD000
|
stack
|
page read and write
|
||
75BD000
|
stack
|
page read and write
|
||
79D8000
|
trusted library allocation
|
page read and write
|
||
44EA000
|
stack
|
page read and write
|
||
5F4D000
|
stack
|
page read and write
|
||
5B4D000
|
stack
|
page read and write
|
||
23B96413000
|
heap
|
page read and write
|
||
44EC000
|
stack
|
page read and write
|
||
26C8F313000
|
heap
|
page read and write
|
||
77FE000
|
stack
|
page read and write
|
||
5F51000
|
stack
|
page read and write
|
||
75BD000
|
stack
|
page read and write
|
||
A5DE000
|
stack
|
page read and write
|
||
8F9D000
|
stack
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
217BDB81000
|
heap
|
page read and write
|
||
26C8F2DC000
|
heap
|
page read and write
|
||
733D000
|
stack
|
page read and write
|
||
426E000
|
stack
|
page read and write
|
||
534D000
|
stack
|
page read and write
|
||
1B957B70000
|
trusted library section
|
page readonly
|
||
23A0000
|
trusted library allocation
|
page read and write
|
||
21D0000
|
heap
|
page read and write
|
||
1B95C020000
|
heap
|
page read and write
|
||
17068C63000
|
heap
|
page read and write
|
||
9FF000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
5547000
|
trusted library allocation
|
page read and write
|
||
5693000
|
heap
|
page read and write
|
||
95DD000
|
stack
|
page read and write
|
||
5E99000
|
trusted library allocation
|
page read and write
|
||
5B8E000
|
stack
|
page read and write
|
||
AADF000
|
stack
|
page read and write
|
||
A35E000
|
stack
|
page read and write
|
||
9D1E000
|
stack
|
page read and write
|
||
44EA000
|
stack
|
page read and write
|
||
A89D000
|
stack
|
page read and write
|
||
959E000
|
stack
|
page read and write
|
||
96DE000
|
stack
|
page read and write
|
||
1B956C29000
|
heap
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
F1121FF000
|
stack
|
page read and write
|
||
1B956C13000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
5530000
|
trusted library allocation
|
page read and write
|
||
79D8000
|
trusted library allocation
|
page read and write
|
||
79E2000
|
trusted library allocation
|
page read and write
|
||
26081660000
|
trusted library allocation
|
page read and write
|
||
426E000
|
stack
|
page read and write
|
||
79B6000
|
trusted library allocation
|
page read and write
|
||
402D000
|
stack
|
page read and write
|
||
854E000
|
stack
|
page read and write
|
||
5489000
|
trusted library allocation
|
page read and write
|
||
945E000
|
stack
|
page read and write
|
||
87CE000
|
stack
|
page read and write
|
||
17068C69000
|
heap
|
page read and write
|
||
26C8F2CE000
|
heap
|
page read and write
|
||
77FE000
|
stack
|
page read and write
|
||
550D000
|
trusted library allocation
|
page read and write
|
||
9F9E000
|
stack
|
page read and write
|
||
4270000
|
heap
|
page read and write
|
||
79B6000
|
trusted library allocation
|
page read and write
|
||
6A6D000
|
stack
|
page read and write
|
||
1B956C93000
|
heap
|
page read and write
|
||
462F000
|
stack
|
page read and write
|
||
6A2E000
|
stack
|
page read and write
|
||
71ED000
|
stack
|
page read and write
|
||
82CE000
|
stack
|
page read and write
|
||
4A0000
|
unkown
|
page write copy
|
||
71AE000
|
stack
|
page read and write
|
||
720000
|
heap
|
page read and write
|
||
590D000
|
stack
|
page read and write
|
||
26C8F923000
|
heap
|
page read and write
|
||
619E000
|
stack
|
page read and write
|
||
17068C45000
|
heap
|
page read and write
|
||
796C000
|
trusted library allocation
|
page read and write
|
||
804E000
|
stack
|
page read and write
|
||
79C7000
|
trusted library allocation
|
page read and write
|
||
17068C48000
|
heap
|
page read and write
|
||
86E000
|
stack
|
page read and write
|
||
402D000
|
stack
|
page read and write
|
||
A61D000
|
stack
|
page read and write
|
||
44EC000
|
stack
|
page read and write
|
||
17068C42000
|
heap
|
page read and write
|
||
217BD35A000
|
heap
|
page read and write
|
||
1B957359000
|
heap
|
page read and write
|
||
4B0000
|
heap
|
page read and write
|
||
17068C67000
|
heap
|
page read and write
|
||
7940000
|
trusted library allocation
|
page read and write
|
||
6DEE000
|
stack
|
page read and write
|
||
995E000
|
stack
|
page read and write
|
||
1B957EC0000
|
trusted library allocation
|
page read and write
|
||
4D4E879000
|
stack
|
page read and write
|
||
67E000
|
stack
|
page read and write
|
||
76FD000
|
stack
|
page read and write
|
||
3B2E000
|
stack
|
page read and write
|
||
4F2D000
|
stack
|
page read and write
|
||
5450000
|
trusted library allocation
|
page read and write
|
||
7E0D000
|
stack
|
page read and write
|
||
51D0000
|
remote allocation
|
page read and write
|
||
655E000
|
stack
|
page read and write
|
||
7B7D000
|
stack
|
page read and write
|
||
15B9C7A000
|
stack
|
page read and write
|
||
590D000
|
stack
|
page read and write
|
||
5693000
|
heap
|
page read and write
|
||
2450000
|
heap
|
page read and write
|
||
87D0000
|
remote allocation
|
page read and write
|
||
1DE53C79000
|
heap
|
page read and write
|
||
3EAF000
|
stack
|
page read and write
|
||
427000
|
unkown
|
page read and write
|
||
2350000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
9BDE000
|
stack
|
page read and write
|
||
26C8F802000
|
heap
|
page read and write
|
||
818E000
|
stack
|
page read and write
|
||
6BAD000
|
stack
|
page read and write
|
||
50AD000
|
stack
|
page read and write
|
||
3DA8000
|
trusted library allocation
|
page read and write
|
||
F11188C000
|
stack
|
page read and write
|
||
79A1000
|
trusted library allocation
|
page read and write
|
||
5F4D000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
57E000
|
stack
|
page read and write
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
520D000
|
stack
|
page read and write
|
||
5F4D000
|
stack
|
page read and write
|
||
63A000
|
heap
|
page read and write
|
||
90DD000
|
stack
|
page read and write
|
||
17068C4B000
|
heap
|
page read and write
|
||
795E000
|
trusted library allocation
|
page read and write
|
||
4C9B000
|
stack
|
page read and write
|
||
30000
|
unkown
|
page read and write
|
||
3EEE000
|
stack
|
page read and write
|
||
95DD000
|
stack
|
page read and write
|
||
17068C2E000
|
heap
|
page read and write
|
||
A21E000
|
stack
|
page read and write
|
||
A49E000
|
stack
|
page read and write
|
||
6A6D000
|
stack
|
page read and write
|
||
A35E000
|
stack
|
page read and write
|
||
4D4E67D000
|
stack
|
page read and write
|
||
795E000
|
trusted library allocation
|
page read and write
|
||
462F000
|
stack
|
page read and write
|
||
9C1D000
|
stack
|
page read and write
|
||
51AD000
|
stack
|
page read and write
|
||
5A0D000
|
stack
|
page read and write
|
||
87D0000
|
remote allocation
|
page read and write
|
||
568D000
|
stack
|
page read and write
|
||
921D000
|
stack
|
page read and write
|
||
79E2000
|
trusted library allocation
|
page read and write
|
||
687E6000
|
unkown
|
page readonly
|
||
1EBA9A00000
|
unkown
|
page read and write
|
||
5E0D000
|
stack
|
page read and write
|
||
747D000
|
stack
|
page read and write
|
||
54E1000
|
trusted library allocation
|
page read and write
|
||
26C8F237000
|
heap
|
page read and write
|
||
26C8F2BF000
|
heap
|
page read and write
|
||
217BD2B0000
|
heap
|
page read and write
|
||
6F2E000
|
stack
|
page read and write
|
||
5450000
|
trusted library allocation
|
page read and write
|
||
590D000
|
stack
|
page read and write
|
||
49B000
|
unkown
|
page write copy
|
||
79FE000
|
trusted library allocation
|
page read and write
|
||
49FE000
|
stack
|
page read and write
|
||
26C8F291000
|
heap
|
page read and write
|
||
26C8F200000
|
heap
|
page read and write
|
||
6E4000
|
heap
|
page read and write
|
||
830D000
|
stack
|
page read and write
|
||
A61D000
|
stack
|
page read and write
|
||
412D000
|
stack
|
page read and write
|
||
4E2D000
|
stack
|
page read and write
|
||
50AD000
|
stack
|
page read and write
|
||
51D0000
|
remote allocation
|
page read and write
|
||
2120000
|
direct allocation
|
page execute and read and write
|
||
98000
|
stack
|
page read and write
|
||
402000
|
unkown
|
page readonly
|
||
40A000
|
unkown
|
page read and write
|
||
881D000
|
stack
|
page read and write
|
||
23B964BD000
|
heap
|
page read and write
|
||
5CCD000
|
stack
|
page read and write
|
||
79D8000
|
trusted library allocation
|
page read and write
|
||
7970000
|
trusted library allocation
|
page read and write
|
||
793E000
|
stack
|
page read and write
|
||
43ED000
|
stack
|
page read and write
|
||
F111CFB000
|
stack
|
page read and write
|
||
35FD000
|
stack
|
page read and write
|
||
909E000
|
stack
|
page read and write
|
||
682000
|
heap
|
page read and write
|
||
23B96502000
|
heap
|
page read and write
|
||
520D000
|
stack
|
page read and write
|
||
15B9A7A000
|
stack
|
page read and write
|
||
9F9E000
|
stack
|
page read and write
|
||
17068C49000
|
heap
|
page read and write
|
||
18282B86000
|
heap
|
page read and write
|
||
5527000
|
trusted library allocation
|
page read and write
|
||
717000
|
heap
|
page read and write
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
17068A00000
|
heap
|
page read and write
|
||
5494000
|
trusted library allocation
|
page read and write
|
||
A61D000
|
stack
|
page read and write
|
||
3DAE000
|
stack
|
page read and write
|
||
A35E000
|
stack
|
page read and write
|
||
17068C75000
|
heap
|
page read and write
|
||
79FE000
|
trusted library allocation
|
page read and write
|
||
57CE000
|
stack
|
page read and write
|
||
2150000
|
heap
|
page read and write
|
||
2473000
|
heap
|
page read and write
|
||
46B000
|
unkown
|
page readonly
|
||
671000
|
heap
|
page read and write
|
||
796A000
|
trusted library allocation
|
page read and write
|
||
AAE0000
|
remote allocation
|
page read and write
|
||
1B95BFA0000
|
trusted library allocation
|
page read and write
|
||
4F6D000
|
stack
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
702000
|
heap
|
page read and write
|
||
971D000
|
stack
|
page read and write
|
||
26C8F3B7000
|
heap
|
page read and write
|
||
23B962C0000
|
heap
|
page read and write
|
||
8A5E000
|
stack
|
page read and write
|
||
6CA000
|
heap
|
page read and write
|
||
4F2D000
|
stack
|
page read and write
|
||
67DE000
|
stack
|
page read and write
|
||
1B956A10000
|
heap
|
page read and write
|
||
1DE539D0000
|
heap
|
page read and write
|
||
804E000
|
stack
|
page read and write
|
||
A89D000
|
stack
|
page read and write
|
||
8D1D000
|
stack
|
page read and write
|
||
757E000
|
stack
|
page read and write
|
||
558D000
|
stack
|
page read and write
|
||
4A5000
|
unkown
|
page readonly
|
||
1B957A40000
|
trusted library allocation
|
page read and write
|
||
67DD000
|
stack
|
page read and write
|
||
1B957200000
|
heap
|
page read and write
|
||
49B000
|
unkown
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
77FE000
|
stack
|
page read and write
|
||
1B957202000
|
heap
|
page read and write
|
||
553D000
|
trusted library allocation
|
page read and write
|
||
98000
|
stack
|
page read and write
|
||
795E000
|
trusted library allocation
|
page read and write
|
||
1B95BF70000
|
trusted library allocation
|
page read and write
|
||
26C8F24A000
|
heap
|
page read and write
|
||
54C8000
|
trusted library allocation
|
page read and write
|
||
A11D000
|
stack
|
page read and write
|
||
9F9E000
|
stack
|
page read and write
|
||
7C7E000
|
stack
|
page read and write
|
||
21D8000
|
heap
|
page read and write
|
||
3D6F000
|
stack
|
page read and write
|
||
680000
|
heap
|
page read and write
|
||
752000
|
heap
|
page read and write
|
||
949D000
|
stack
|
page read and write
|
||
26081076000
|
heap
|
page read and write
|
||
36FA000
|
stack
|
page read and write
|
||
70AD000
|
stack
|
page read and write
|
||
4F2D000
|
stack
|
page read and write
|
||
21D8000
|
heap
|
page read and write
|
||
895D000
|
stack
|
page read and write
|
||
21D0000
|
heap
|
page read and write
|
||
7DCE000
|
stack
|
page read and write
|
||
1B95BF80000
|
trusted library allocation
|
page read and write
|
||
6E2D000
|
stack
|
page read and write
|
||
750000
|
heap
|
page read and write
|
||
3FEF000
|
stack
|
page read and write
|
||
8BDD000
|
stack
|
page read and write
|
||
79AA000
|
trusted library allocation
|
page read and write
|
||
1B956D00000
|
heap
|
page read and write
|
||
217BD240000
|
remote allocation
|
page read and write
|
||
3EAF000
|
stack
|
page read and write
|
||
70F000
|
heap
|
page read and write
|
||
722000
|
heap
|
page read and write
|
||
26C8F1D0000
|
trusted library allocation
|
page read and write
|
||
5537000
|
trusted library allocation
|
page read and write
|
||
971D000
|
stack
|
page read and write
|
||
26C90002000
|
heap
|
page read and write
|
||
553A000
|
trusted library allocation
|
page read and write
|
||
715000
|
heap
|
page read and write
|
||
1DE54202000
|
trusted library allocation
|
page read and write
|
||
4270000
|
heap
|
page read and write
|
||
4C9B000
|
stack
|
page read and write
|
||
7F4D000
|
stack
|
page read and write
|
||
550D000
|
trusted library allocation
|
page read and write
|
||
A71E000
|
stack
|
page read and write
|
||
1EBA9A69000
|
heap
|
page read and write
|
||
5B8E000
|
stack
|
page read and write
|
||
9ADD000
|
stack
|
page read and write
|
||
1B956C58000
|
heap
|
page read and write
|
||
4F6D000
|
stack
|
page read and write
|
||
92F000
|
stack
|
page read and write
|
||
551C000
|
trusted library allocation
|
page read and write
|
||
87CE000
|
stack
|
page read and write
|
||
86CD000
|
stack
|
page read and write
|
||
795E000
|
trusted library allocation
|
page read and write
|
||
719000
|
heap
|
page read and write
|
||
9C1D000
|
stack
|
page read and write
|
||
702000
|
heap
|
page read and write
|
||
6A2E000
|
stack
|
page read and write
|
||
90DD000
|
stack
|
page read and write
|
||
17068C77000
|
heap
|
page read and write
|
||
21CE000
|
stack
|
page read and write
|
||
A75E000
|
stack
|
page read and write
|
||
5524000
|
trusted library allocation
|
page read and write
|
||
2608105B000
|
heap
|
page read and write
|
||
4A4D000
|
stack
|
page read and write
|
||
544D000
|
stack
|
page read and write
|
||
A99E000
|
stack
|
page read and write
|
||
23B96400000
|
heap
|
page read and write
|
||
26C8F2B9000
|
heap
|
page read and write
|
||
23B96250000
|
heap
|
page read and write
|
||
63A000
|
heap
|
page read and write
|
||
655E000
|
stack
|
page read and write
|
||
563247E000
|
stack
|
page read and write
|
||
A89D000
|
stack
|
page read and write
|
||
8E1E000
|
stack
|
page read and write
|
||
79E4000
|
trusted library allocation
|
page read and write
|
||
1B95C3D0000
|
remote allocation
|
page read and write
|
||
76FD000
|
stack
|
page read and write
|
||
677000
|
heap
|
page read and write
|
||
7952000
|
trusted library allocation
|
page read and write
|
||
7DCE000
|
stack
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
62E000
|
stack
|
page read and write
|
||
E31F87E000
|
stack
|
page read and write
|
||
1B95C0B0000
|
heap
|
page read and write
|
||
666000
|
heap
|
page read and write
|
||
217BD2EA000
|
heap
|
page read and write
|
||
426E000
|
stack
|
page read and write
|
||
18282B5E000
|
heap
|
page read and write
|
||
7957000
|
trusted library allocation
|
page read and write
|
||
5EE000
|
stack
|
page read and write
|
||
79AE000
|
trusted library allocation
|
page read and write
|
||
5CCD000
|
stack
|
page read and write
|
||
981E000
|
stack
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
65F000
|
heap
|
page read and write
|
||
90DD000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
30000
|
unkown
|
page read and write
|
||
7957000
|
trusted library allocation
|
page read and write
|
||
9C1D000
|
stack
|
page read and write
|
||
793E000
|
stack
|
page read and write
|
||
217BD2B6000
|
heap
|
page read and write
|
||
2150000
|
heap
|
page read and write
|
||
18282CD5000
|
heap
|
page read and write
|
||
9FDD000
|
stack
|
page read and write
|
||
26C8F29D000
|
heap
|
page read and write
|
||
44EA000
|
stack
|
page read and write
|
||
13F02FC0000
|
heap
|
page read and write
|
||
82CE000
|
stack
|
page read and write
|
||
26C8F2C3000
|
heap
|
page read and write
|
||
1DE53D02000
|
heap
|
page read and write
|
||
466D000
|
stack
|
page read and write
|
||
796C000
|
trusted library allocation
|
page read and write
|
||
799E000
|
trusted library allocation
|
page read and write
|
||
5F4D000
|
stack
|
page read and write
|
||
79BC000
|
trusted library allocation
|
page read and write
|
||
7F0E000
|
stack
|
page read and write
|
||
217BD2FE000
|
heap
|
page read and write
|
||
1B95BF70000
|
trusted library allocation
|
page read and write
|
||
5EE000
|
stack
|
page read and write
|
||
79B1000
|
trusted library allocation
|
page read and write
|
||
49FE000
|
stack
|
page read and write
|
||
23B964CE000
|
heap
|
page read and write
|
||
26081029000
|
heap
|
page read and write
|
||
79A5000
|
trusted library allocation
|
page read and write
|
||
9D1E000
|
stack
|
page read and write
|
||
ADDAEFC000
|
stack
|
page read and write
|
||
82F000
|
stack
|
page read and write
|
||
79B3000
|
trusted library allocation
|
page read and write
|
||
552B000
|
trusted library allocation
|
page read and write
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
981E000
|
stack
|
page read and write
|
||
609D000
|
stack
|
page read and write
|
||
F1123FF000
|
stack
|
page read and write
|
||
1DE53C02000
|
heap
|
page read and write
|
||
6CAD000
|
stack
|
page read and write
|
||
435000
|
unkown
|
page read and write
|
||
79B6000
|
trusted library allocation
|
page read and write
|
||
48FD000
|
stack
|
page read and write
|
||
67DE000
|
stack
|
page read and write
|
||
9E5E000
|
stack
|
page read and write
|
||
5549000
|
trusted library allocation
|
page read and write
|
||
23A0000
|
heap
|
page read and write
|
||
79E2000
|
trusted library allocation
|
page read and write
|
||
8F5E000
|
stack
|
page read and write
|
||
217BD2EA000
|
heap
|
page read and write
|
||
2450000
|
heap
|
page read and write
|
||
79A5000
|
trusted library allocation
|
page read and write
|
||
56B0000
|
heap
|
page read and write
|
||
63A000
|
heap
|
page read and write
|
||
6CED000
|
stack
|
page read and write
|
||
530D000
|
stack
|
page read and write
|
||
2470000
|
heap
|
page read and write
|
||
466D000
|
stack
|
page read and write
|
||
462F000
|
stack
|
page read and write
|
||
17068C44000
|
heap
|
page read and write
|
||
590D000
|
stack
|
page read and write
|
||
A9DE000
|
stack
|
page read and write
|
||
79BA000
|
trusted library allocation
|
page read and write
|
||
AADF000
|
stack
|
page read and write
|
||
422000
|
unkown
|
page read and write
|
||
13F0303D000
|
heap
|
page read and write
|
||
21CE000
|
stack
|
page read and write
|
||
945E000
|
stack
|
page read and write
|
||
23B96C02000
|
heap
|
page read and write
|
||
26C8F39D000
|
heap
|
page read and write
|
||
743E000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
808D000
|
stack
|
page read and write
|
||
21EC000
|
direct allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
17068C64000
|
heap
|
page read and write
|
||
E31FBFF000
|
stack
|
page read and write
|
||
4E2D000
|
stack
|
page read and write
|
||
921D000
|
stack
|
page read and write
|
||
426E000
|
stack
|
page read and write
|
||
17068A10000
|
heap
|
page read and write
|
||
2140000
|
direct allocation
|
page read and write
|
||
5549000
|
trusted library allocation
|
page read and write
|
||
26C8F22E000
|
heap
|
page read and write
|
||
217BD565000
|
heap
|
page read and write
|
||
818E000
|
stack
|
page read and write
|
||
79A8000
|
trusted library allocation
|
page read and write
|
||
21E0000
|
direct allocation
|
page read and write
|
||
A99E000
|
stack
|
page read and write
|
||
26C8F2E9000
|
heap
|
page read and write
|
||
7C7E000
|
stack
|
page read and write
|
||
796A000
|
trusted library allocation
|
page read and write
|
||
67DE000
|
stack
|
page read and write
|
||
56B0000
|
heap
|
page read and write
|
||
A61D000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
54BF000
|
trusted library allocation
|
page read and write
|
||
692D000
|
stack
|
page read and write
|
||
FD6EE7C000
|
stack
|
page read and write
|
||
7DCE000
|
stack
|
page read and write
|
||
49B000
|
unkown
|
page read and write
|
||
9BDE000
|
stack
|
page read and write
|
||
544D000
|
stack
|
page read and write
|
||
AAE0000
|
remote allocation
|
page read and write
|
||
7960000
|
trusted library allocation
|
page read and write
|
||
630000
|
heap
|
page read and write
|
||
4D4E97E000
|
stack
|
page read and write
|
||
13F03024000
|
heap
|
page read and write
|
||
5EE000
|
stack
|
page read and write
|
||
999D000
|
stack
|
page read and write
|
||
6C0000
|
heap
|
page read and write
|
||
4DED000
|
stack
|
page read and write
|
||
6F6D000
|
stack
|
page read and write
|
||
A85F000
|
stack
|
page read and write
|
||
5489000
|
trusted library allocation
|
page read and write
|
||
217BD2C2000
|
heap
|
page read and write
|
||
75C000
|
heap
|
page read and write
|
||
7E0D000
|
stack
|
page read and write
|
||
A4DD000
|
stack
|
page read and write
|
||
689000
|
heap
|
page read and write
|
||
706E000
|
stack
|
page read and write
|
||
3FEF000
|
stack
|
page read and write
|
||
1B95C3D0000
|
remote allocation
|
page read and write
|
||
854E000
|
stack
|
page read and write
|
||
895D000
|
stack
|
page read and write
|
||
70AD000
|
stack
|
page read and write
|
||
999D000
|
stack
|
page read and write
|
||
2120000
|
direct allocation
|
page execute and read and write
|
||
82F000
|
stack
|
page read and write
|
||
743E000
|
stack
|
page read and write
|
||
5A0D000
|
stack
|
page read and write
|
||
97D87FE000
|
stack
|
page read and write
|
||
79FE000
|
trusted library allocation
|
page read and write
|
||
719000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
935D000
|
stack
|
page read and write
|
||
21CE000
|
stack
|
page read and write
|
||
3EEE000
|
stack
|
page read and write
|
||
76BE000
|
stack
|
page read and write
|
||
56320FE000
|
stack
|
page read and write
|
||
9FDD000
|
stack
|
page read and write
|
||
217BD2B2000
|
heap
|
page read and write
|
||
26C8EFA0000
|
heap
|
page read and write
|
||
A71E000
|
stack
|
page read and write
|
||
677000
|
heap
|
page read and write
|
||
1B95C0A4000
|
heap
|
page read and write
|
||
43ED000
|
stack
|
page read and write
|
||
A35E000
|
stack
|
page read and write
|
||
13F03002000
|
heap
|
page read and write
|
||
5E21000
|
trusted library allocation
|
page read and write
|
||
1B95C324000
|
trusted library allocation
|
page read and write
|
||
2453000
|
heap
|
page read and write
|
||
98000
|
stack
|
page read and write
|
||
76BE000
|
stack
|
page read and write
|
||
79AA000
|
trusted library allocation
|
page read and write
|
||
9ADD000
|
stack
|
page read and write
|
||
5B4D000
|
stack
|
page read and write
|
||
FD6EB7B000
|
stack
|
page read and write
|
||
56A0000
|
heap
|
page read and write
|
||
E31FAFC000
|
stack
|
page read and write
|
||
7963000
|
trusted library allocation
|
page read and write
|
||
1EBA9910000
|
heap
|
page read and write
|
||
5524000
|
trusted library allocation
|
page read and write
|
||
26081000000
|
heap
|
page read and write
|
||
4B4D000
|
stack
|
page read and write
|
||
FD6E97E000
|
stack
|
page read and write
|
||
631D000
|
stack
|
page read and write
|
||
48FD000
|
stack
|
page read and write
|
||
8E5D000
|
stack
|
page read and write
|
||
3EEE000
|
stack
|
page read and write
|
||
23A0000
|
trusted library allocation
|
page read and write
|
||
783D000
|
stack
|
page read and write
|
||
49B000
|
unkown
|
page read and write
|
||
316F47E000
|
stack
|
page read and write
|
||
26C9011B000
|
heap
|
page read and write
|
||
1B95C0F9000
|
heap
|
page read and write
|
||
713000
|
heap
|
page read and write
|
||
A9DE000
|
stack
|
page read and write
|
||
81CD000
|
stack
|
page read and write
|
||
568D000
|
stack
|
page read and write
|
||
23B963C0000
|
trusted library allocation
|
page read and write
|
||
1B95C308000
|
trusted library allocation
|
page read and write
|
||
FD6E87F000
|
stack
|
page read and write
|
||
7B7D000
|
stack
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
830D000
|
stack
|
page read and write
|
||
E31FA7C000
|
stack
|
page read and write
|
||
ADDB5FE000
|
stack
|
page read and write
|
||
316F87D000
|
stack
|
page read and write
|
||
416D000
|
stack
|
page read and write
|
||
49FA000
|
stack
|
page read and write
|
||
931E000
|
stack
|
page read and write
|
||
452E000
|
stack
|
page read and write
|
||
79A1000
|
trusted library allocation
|
page read and write
|
||
5535000
|
trusted library allocation
|
page read and write
|
||
706E000
|
stack
|
page read and write
|
||
91DE000
|
stack
|
page read and write
|
||
4A4D000
|
stack
|
page read and write
|
||
3FEF000
|
stack
|
page read and write
|
||
1B957B30000
|
trusted library section
|
page readonly
|
||
6A6D000
|
stack
|
page read and write
|
||
17069402000
|
trusted library allocation
|
page read and write
|
||
A49E000
|
stack
|
page read and write
|
||
A0DE000
|
stack
|
page read and write
|
||
23B96D32000
|
heap
|
page read and write
|
||
630000
|
heap
|
page read and write
|
||
79B1000
|
trusted library allocation
|
page read and write
|
||
217BD365000
|
heap
|
page read and write
|
||
7960000
|
trusted library allocation
|
page read and write
|
||
6C0000
|
heap
|
page read and write
|
||
1DE539E0000
|
heap
|
page read and write
|
||
4DED000
|
stack
|
page read and write
|
||
5524000
|
trusted library allocation
|
page read and write
|
||
1B956D13000
|
heap
|
page read and write
|
||
23A3000
|
heap
|
page read and write
|
||
72EE000
|
stack
|
page read and write
|
||
26C90102000
|
heap
|
page read and write
|
||
9BDE000
|
stack
|
page read and write
|
||
62E000
|
stack
|
page read and write
|
||
6C7000
|
heap
|
page read and write
|
||
A0DE000
|
stack
|
page read and write
|
||
217BD2B6000
|
heap
|
page read and write
|
||
7970000
|
trusted library allocation
|
page read and write
|
||
1B957B20000
|
trusted library section
|
page readonly
|
||
568D000
|
stack
|
page read and write
|
||
1B95C30E000
|
trusted library allocation
|
page read and write
|
||
A0DE000
|
stack
|
page read and write
|
||
4D4EB79000
|
stack
|
page read and write
|
||
79C7000
|
trusted library allocation
|
page read and write
|
||
4CED000
|
stack
|
page read and write
|
||
54D1000
|
trusted library allocation
|
page read and write
|
||
17068C3B000
|
heap
|
page read and write
|
||
47BD000
|
stack
|
page read and write
|
||
5B4D000
|
stack
|
page read and write
|
||
49B000
|
unkown
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
1EBA9A11000
|
unkown
|
page read and write
|
||
868E000
|
stack
|
page read and write
|
||
5537000
|
trusted library allocation
|
page read and write
|
||
733D000
|
stack
|
page read and write
|
||
3DAE000
|
stack
|
page read and write
|
||
747D000
|
stack
|
page read and write
|
||
9E5E000
|
stack
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
26C8F213000
|
heap
|
page read and write
|
||
4C9E000
|
stack
|
page read and write
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
316F8FE000
|
stack
|
page read and write
|
||
5522000
|
trusted library allocation
|
page read and write
|
||
6A2E000
|
stack
|
page read and write
|
||
995E000
|
stack
|
page read and write
|
||
5E5000
|
heap
|
page read and write
|
||
551C000
|
trusted library allocation
|
page read and write
|
||
47BD000
|
stack
|
page read and write
|
||
13F03029000
|
heap
|
page read and write
|
||
7963000
|
trusted library allocation
|
page read and write
|
||
44EA000
|
stack
|
page read and write
|
||
1EBA9D17000
|
heap
|
page read and write
|
||
8B9E000
|
stack
|
page read and write
|
||
793E000
|
stack
|
page read and write
|
||
5535000
|
trusted library allocation
|
page read and write
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
A5DE000
|
stack
|
page read and write
|
||
79AE000
|
trusted library allocation
|
page read and write
|
||
56B0000
|
heap
|
page read and write
|
||
79A5000
|
trusted library allocation
|
page read and write
|
||
54E7000
|
trusted library allocation
|
page read and write
|
||
795B000
|
trusted library allocation
|
page read and write
|
||
17068C00000
|
heap
|
page read and write
|
||
79A8000
|
trusted library allocation
|
page read and write
|
||
54BB000
|
trusted library allocation
|
page read and write
|
||
1EBA9D00000
|
heap
|
page read and write
|
||
49B000
|
unkown
|
page read and write
|
||
79A5000
|
trusted library allocation
|
page read and write
|
||
49FE000
|
stack
|
page read and write
|
||
5537000
|
trusted library allocation
|
page read and write
|
||
666000
|
heap
|
page read and write
|
||
7CCD000
|
stack
|
page read and write
|
||
62E000
|
stack
|
page read and write
|
||
844D000
|
stack
|
page read and write
|
||
26081802000
|
trusted library allocation
|
page read and write
|
||
8E5D000
|
stack
|
page read and write
|
||
269867F000
|
stack
|
page read and write
|
||
1B95C0E8000
|
heap
|
page read and write
|
||
9ADD000
|
stack
|
page read and write
|
||
81CD000
|
stack
|
page read and write
|
||
1DE53C3E000
|
heap
|
page read and write
|
||
7F4D000
|
stack
|
page read and write
|
||
1B957313000
|
heap
|
page read and write
|
||
1B95C102000
|
heap
|
page read and write
|
||
4CED000
|
stack
|
page read and write
|
||
A25D000
|
stack
|
page read and write
|
||
26C90100000
|
heap
|
page read and write
|
||
48BD000
|
stack
|
page read and write
|
||
26C9001D000
|
heap
|
page read and write
|
||
26C90000000
|
heap
|
page read and write
|
||
5C8E000
|
stack
|
page read and write
|
||
553D000
|
trusted library allocation
|
page read and write
|
||
26C90002000
|
heap
|
page read and write
|
||
A21E000
|
stack
|
page read and write
|
||
A9DE000
|
stack
|
page read and write
|
||
17068C13000
|
heap
|
page read and write
|
||
21D8000
|
heap
|
page read and write
|
||
553D000
|
trusted library allocation
|
page read and write
|
||
8FE000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
1B95BED0000
|
trusted library allocation
|
page read and write
|
||
7954000
|
trusted library allocation
|
page read and write
|
||
79FE000
|
trusted library allocation
|
page read and write
|
||
26C8F916000
|
heap
|
page read and write
|
||
558D000
|
stack
|
page read and write
|
||
49FA000
|
stack
|
page read and write
|
||
1B957318000
|
heap
|
page read and write
|
||
8D1D000
|
stack
|
page read and write
|
||
5524000
|
trusted library allocation
|
page read and write
|
||
97D8CFA000
|
stack
|
page read and write
|
||
4DED000
|
stack
|
page read and write
|
||
669E000
|
stack
|
page read and write
|
||
1B957B50000
|
trusted library section
|
page readonly
|
||
4E2D000
|
stack
|
page read and write
|
||
82F000
|
stack
|
page read and write
|
||
17068C7B000
|
heap
|
page read and write
|
||
A71E000
|
stack
|
page read and write
|
||
4A5000
|
unkown
|
page readonly
|
||
47BD000
|
stack
|
page read and write
|
||
5A5000
|
heap
|
page read and write
|
||
5B8E000
|
stack
|
page read and write
|
||
5A4D000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
1DE541A0000
|
trusted library allocation
|
page read and write
|
||
316F9FD000
|
stack
|
page read and write
|
||
5DE000
|
stack
|
page read and write
|
||
21CE000
|
stack
|
page read and write
|
||
631D000
|
stack
|
page read and write
|
||
17068C2D000
|
heap
|
page read and write
|
||
79A1000
|
trusted library allocation
|
page read and write
|
||
26C90010000
|
heap
|
page read and write
|
||
619E000
|
stack
|
page read and write
|
||
9F9E000
|
stack
|
page read and write
|
||
1B957300000
|
heap
|
page read and write
|
||
4C9E000
|
stack
|
page read and write
|
||
FD6E9FC000
|
stack
|
page read and write
|
||
79E4000
|
trusted library allocation
|
page read and write
|
||
7940000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
5B4D000
|
stack
|
page read and write
|
||
3C2D000
|
stack
|
page read and write
|
||
A4DD000
|
stack
|
page read and write
|
||
49B000
|
unkown
|
page write copy
|
||
3C2D000
|
stack
|
page read and write
|
||
A11D000
|
stack
|
page read and write
|
||
7963000
|
trusted library allocation
|
page read and write
|
||
9A9E000
|
stack
|
page read and write
|
||
217BD2B2000
|
heap
|
page read and write
|
||
4DED000
|
stack
|
page read and write
|
||
58CF000
|
stack
|
page read and write
|
||
5522000
|
trusted library allocation
|
page read and write
|
||
ADDB4FB000
|
stack
|
page read and write
|
||
666000
|
heap
|
page read and write
|
||
1EBA98B0000
|
trusted library allocation
|
page read and write
|
||
402D000
|
stack
|
page read and write
|
||
17068C5E000
|
heap
|
page read and write
|
||
8A9D000
|
stack
|
page read and write
|
||
6C9000
|
heap
|
page read and write
|
||
79FE000
|
trusted library allocation
|
page read and write
|
||
1B95C052000
|
heap
|
page read and write
|
||
62DE000
|
stack
|
page read and write
|
||
5535000
|
trusted library allocation
|
page read and write
|
||
92F000
|
stack
|
page read and write
|
||
3EEE000
|
stack
|
page read and write
|
||
316F6FE000
|
stack
|
page read and write
|
||
26C8F2EB000
|
heap
|
page read and write
|
||
15B997B000
|
stack
|
page read and write
|
||
15B9DFF000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
18282CD0000
|
heap
|
page read and write
|
||
56A0000
|
heap
|
page read and write
|
||
A9DE000
|
stack
|
page read and write
|
||
2120000
|
direct allocation
|
page execute and read and write
|
||
400000
|
unkown
|
page readonly
|
||
452E000
|
stack
|
page read and write
|
||
3D6F000
|
stack
|
page read and write
|
||
A99E000
|
stack
|
page read and write
|
||
8CDE000
|
stack
|
page read and write
|
||
655E000
|
stack
|
page read and write
|
||
8E1E000
|
stack
|
page read and write
|
||
66DD000
|
stack
|
page read and write
|
||
971D000
|
stack
|
page read and write
|
||
8A9D000
|
stack
|
page read and write
|
||
79E4000
|
trusted library allocation
|
page read and write
|
||
266E000
|
stack
|
page read and write
|
||
5547000
|
trusted library allocation
|
page read and write
|
||
844D000
|
stack
|
page read and write
|
||
77FE000
|
stack
|
page read and write
|
||
81CD000
|
stack
|
page read and write
|
||
49FE000
|
stack
|
page read and write
|
||
506D000
|
stack
|
page read and write
|
||
945E000
|
stack
|
page read and write
|
||
79DB000
|
trusted library allocation
|
page read and write
|
||
61DD000
|
stack
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
630000
|
heap
|
page read and write
|
||
13F02F60000
|
heap
|
page read and write
|
||
23B96D00000
|
heap
|
page read and write
|
||
1DE53C5A000
|
heap
|
page read and write
|
||
5A0D000
|
stack
|
page read and write
|
||
895D000
|
stack
|
page read and write
|
||
666000
|
heap
|
page read and write
|
||
4DED000
|
stack
|
page read and write
|
||
7F0E000
|
stack
|
page read and write
|
||
553A000
|
trusted library allocation
|
page read and write
|
||
26C8F23C000
|
heap
|
page read and write
|
||
840E000
|
stack
|
page read and write
|
||
1EBA9A28000
|
heap
|
page read and write
|
||
3B2E000
|
stack
|
page read and write
|
||
26C8F252000
|
heap
|
page read and write
|
||
79D8000
|
trusted library allocation
|
page read and write
|
||
48BD000
|
stack
|
page read and write
|
||
75BD000
|
stack
|
page read and write
|
||
E31F9FB000
|
stack
|
page read and write
|
||
40CF000
|
stack
|
page read and write
|
||
26C8F243000
|
heap
|
page read and write
|
||
18282B5B000
|
heap
|
page read and write
|
||
631D000
|
stack
|
page read and write
|
||
57CE000
|
stack
|
page read and write
|
||
462F000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
2110000
|
trusted library allocation
|
page read and write
|
||
808D000
|
stack
|
page read and write
|
||
7F0E000
|
stack
|
page read and write
|
||
217BD2C4000
|
heap
|
page read and write
|
||
530D000
|
stack
|
page read and write
|
||
921D000
|
stack
|
page read and write
|
||
1B95BFB4000
|
trusted library allocation
|
page read and write
|
||
2210000
|
direct allocation
|
page read and write
|
||
5E1D000
|
stack
|
page read and write
|
||
13F03750000
|
remote allocation
|
page read and write
|
||
1B956CA6000
|
heap
|
page read and write
|
||
1B9569B0000
|
heap
|
page read and write
|
||
67E000
|
heap
|
page read and write
|
||
79C7000
|
trusted library allocation
|
page read and write
|
||
A99E000
|
stack
|
page read and write
|
||
706E000
|
stack
|
page read and write
|
||
402000
|
unkown
|
page readonly
|
||
4270000
|
heap
|
page read and write
|
||
15B9EFE000
|
stack
|
page read and write
|
||
86CD000
|
stack
|
page read and write
|
||
426E000
|
stack
|
page read and write
|
||
217BD35B000
|
heap
|
page read and write
|
||
558D000
|
stack
|
page read and write
|
||
99000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
7DCE000
|
stack
|
page read and write
|
||
466D000
|
stack
|
page read and write
|
||
2130000
|
heap
|
page read and write
|
||
26C8F260000
|
heap
|
page read and write
|
||
6F6D000
|
stack
|
page read and write
|
||
544D000
|
stack
|
page read and write
|
||
48FD000
|
stack
|
page read and write
|
||
466D000
|
stack
|
page read and write
|
||
79BA000
|
trusted library allocation
|
page read and write
|
||
5A5000
|
heap
|
page read and write
|
||
23B964C5000
|
heap
|
page read and write
|
||
563207B000
|
stack
|
page read and write
|
||
3C2D000
|
stack
|
page read and write
|
||
76FD000
|
stack
|
page read and write
|
||
1EBA9A13000
|
unkown
|
page read and write
|
||
7970000
|
trusted library allocation
|
page read and write
|
||
666000
|
heap
|
page read and write
|
||
269811C000
|
stack
|
page read and write
|
||
66DD000
|
stack
|
page read and write
|
||
A5DE000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
840E000
|
stack
|
page read and write
|
||
552B000
|
trusted library allocation
|
page read and write
|
||
79B3000
|
trusted library allocation
|
page read and write
|
||
1B95C321000
|
trusted library allocation
|
page read and write
|
||
21E4000
|
direct allocation
|
page read and write
|
||
217BD2D8000
|
heap
|
page read and write
|
||
520D000
|
stack
|
page read and write
|
||
719000
|
heap
|
page read and write
|
||
9D4000
|
heap
|
page read and write
|
||
795E000
|
trusted library allocation
|
page read and write
|
||
3C2D000
|
stack
|
page read and write
|
||
217BD1B0000
|
heap
|
page read and write
|
||
687E1000
|
unkown
|
page execute read
|
||
54C4000
|
trusted library allocation
|
page read and write
|
||
8E5D000
|
stack
|
page read and write
|
||
A21E000
|
stack
|
page read and write
|
||
1B95C04D000
|
heap
|
page read and write
|
||
13F03750000
|
remote allocation
|
page read and write
|
||
3DAE000
|
stack
|
page read and write
|
||
217BD362000
|
heap
|
page read and write
|
||
931E000
|
stack
|
page read and write
|
||
4270000
|
heap
|
page read and write
|
||
783D000
|
stack
|
page read and write
|
||
971D000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
985D000
|
stack
|
page read and write
|
||
62DE000
|
stack
|
page read and write
|
||
2CA0000
|
trusted library allocation
|
page read and write
|
||
506D000
|
stack
|
page read and write
|
||
659D000
|
stack
|
page read and write
|
||
316EFEB000
|
stack
|
page read and write
|
||
49B000
|
unkown
|
page write copy
|
||
30000
|
heap
|
page read and write
|
||
7E0D000
|
stack
|
page read and write
|
||
26F0000
|
trusted library allocation
|
page read and write
|
||
552B000
|
trusted library allocation
|
page read and write
|
||
96DE000
|
stack
|
page read and write
|
||
935D000
|
stack
|
page read and write
|
||
79B1000
|
trusted library allocation
|
page read and write
|
||
4A5000
|
unkown
|
page readonly
|
||
4C9E000
|
stack
|
page read and write
|
||
316F4FF000
|
stack
|
page read and write
|
||
4D4EA7E000
|
stack
|
page read and write
|
||
891E000
|
stack
|
page read and write
|
||
86CD000
|
stack
|
page read and write
|
||
808D000
|
stack
|
page read and write
|
||
1B957EC3000
|
trusted library allocation
|
page read and write
|
||
AADF000
|
stack
|
page read and write
|
||
858D000
|
stack
|
page read and write
|
||
552B000
|
trusted library allocation
|
page read and write
|
||
A21E000
|
stack
|
page read and write
|
||
5530000
|
trusted library allocation
|
page read and write
|
||
730000
|
heap
|
page read and write
|
||
6F2E000
|
stack
|
page read and write
|
||
9E9D000
|
stack
|
page read and write
|
||
4F6D000
|
stack
|
page read and write
|
||
3FCE000
|
stack
|
page read and write
|
||
931E000
|
stack
|
page read and write
|
||
3C30000
|
direct allocation
|
page read and write
|
||
21E0000
|
direct allocation
|
page read and write
|
||
5693000
|
heap
|
page read and write
|
||
15BA37E000
|
stack
|
page read and write
|
||
26C8F925000
|
heap
|
page read and write
|
||
15BA07F000
|
stack
|
page read and write
|
||
9D5D000
|
stack
|
page read and write
|
||
6BAD000
|
stack
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
1B957B60000
|
trusted library section
|
page readonly
|
||
6E2D000
|
stack
|
page read and write
|
||
7DCE000
|
stack
|
page read and write
|
||
A99E000
|
stack
|
page read and write
|
||
79B1000
|
trusted library allocation
|
page read and write
|
||
563257F000
|
stack
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
8E5D000
|
stack
|
page read and write
|
||
1B95C0E2000
|
heap
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
48BD000
|
stack
|
page read and write
|
||
23A0000
|
trusted library allocation
|
page read and write
|
||
79A5000
|
trusted library allocation
|
page read and write
|
||
FD6EC7D000
|
stack
|
page read and write
|
||
8BDD000
|
stack
|
page read and write
|
||
91DE000
|
stack
|
page read and write
|
||
641D000
|
stack
|
page read and write
|
||
881D000
|
stack
|
page read and write
|
||
715000
|
heap
|
page read and write
|
||
26C8F24C000
|
heap
|
page read and write
|
||
17068D02000
|
heap
|
page read and write
|
||
9D5D000
|
stack
|
page read and write
|
||
9E9D000
|
stack
|
page read and write
|
||
452E000
|
stack
|
page read and write
|
||
3B2E000
|
stack
|
page read and write
|
||
1B95C0F2000
|
heap
|
page read and write
|
||
733D000
|
stack
|
page read and write
|
||
A4DD000
|
stack
|
page read and write
|
||
26C8F286000
|
heap
|
page read and write
|
||
13F03102000
|
heap
|
page read and write
|
||
1B95C3B0000
|
trusted library allocation
|
page read and write
|
||
1DE53C68000
|
heap
|
page read and write
|
||
702000
|
heap
|
page read and write
|
||
5494000
|
trusted library allocation
|
page read and write
|
||
5F51000
|
stack
|
page read and write
|
||
7970000
|
trusted library allocation
|
page read and write
|
||
4C9B000
|
stack
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
71AE000
|
stack
|
page read and write
|
||
15B9877000
|
stack
|
page read and write
|
||
51AD000
|
stack
|
page read and write
|
||
641E000
|
stack
|
page read and write
|
||
21D0000
|
heap
|
page read and write
|
||
5693000
|
heap
|
page read and write
|
||
87D0000
|
remote allocation
|
page read and write
|
||
5DCD000
|
stack
|
page read and write
|
||
5549000
|
trusted library allocation
|
page read and write
|
||
5522000
|
trusted library allocation
|
page read and write
|
||
1B95BF60000
|
trusted library allocation
|
page read and write
|
||
79A8000
|
trusted library allocation
|
page read and write
|
||
5535000
|
trusted library allocation
|
page read and write
|
||
A11D000
|
stack
|
page read and write
|
||
619E000
|
stack
|
page read and write
|
||
2453000
|
heap
|
page read and write
|
||
935D000
|
stack
|
page read and write
|
||
1B956C7C000
|
heap
|
page read and write
|
||
67E000
|
heap
|
page read and write
|
||
26C90043000
|
heap
|
page read and write
|
||
659D000
|
stack
|
page read and write
|
||
26C8F9F1000
|
heap
|
page read and write
|
||
7957000
|
trusted library allocation
|
page read and write
|
||
747D000
|
stack
|
page read and write
|
||
552B000
|
trusted library allocation
|
page read and write
|
||
1B956D02000
|
heap
|
page read and write
|
||
1B956C97000
|
heap
|
page read and write
|
||
550D000
|
trusted library allocation
|
page read and write
|
||
783D000
|
stack
|
page read and write
|
||
4121000
|
stack
|
page read and write
|
||
4CED000
|
stack
|
page read and write
|
||
795B000
|
trusted library allocation
|
page read and write
|
||
4A5000
|
unkown
|
page readonly
|
||
21EC000
|
direct allocation
|
page read and write
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
6C8000
|
heap
|
page read and write
|
||
47BD000
|
stack
|
page read and write
|
||
858D000
|
stack
|
page read and write
|
||
44EC000
|
stack
|
page read and write
|
||
49FA000
|
stack
|
page read and write
|
||
669E000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
553D000
|
trusted library allocation
|
page read and write
|
||
6A2E000
|
stack
|
page read and write
|
||
424E000
|
stack
|
page read and write
|
||
F111FFF000
|
stack
|
page read and write
|
||
217BD2D5000
|
heap
|
page read and write
|
||
6B6E000
|
stack
|
page read and write
|
||
F111EFD000
|
stack
|
page read and write
|
||
5C8E000
|
stack
|
page read and write
|
||
3DAE000
|
stack
|
page read and write
|
||
3E6B000
|
trusted library allocation
|
page read and write
|
||
891E000
|
stack
|
page read and write
|
||
51D0000
|
remote allocation
|
page read and write
|
||
553D000
|
trusted library allocation
|
page read and write
|
||
5450000
|
trusted library allocation
|
page read and write
|
||
1B957B40000
|
trusted library section
|
page readonly
|
||
1B95BF50000
|
trusted library allocation
|
page read and write
|
||
949D000
|
stack
|
page read and write
|
||
9E9D000
|
stack
|
page read and write
|
||
75C000
|
heap
|
page read and write
|
||
1B95C0FF000
|
heap
|
page read and write
|
||
5547000
|
trusted library allocation
|
page read and write
|
||
7E0D000
|
stack
|
page read and write
|
||
26C8F9D2000
|
heap
|
page read and write
|
||
90DD000
|
stack
|
page read and write
|
||
1B95BFA0000
|
trusted library allocation
|
page read and write
|
||
21D0000
|
heap
|
page read and write
|
||
6CE000
|
heap
|
page read and write
|
||
A85F000
|
stack
|
page read and write
|
||
645D000
|
stack
|
page read and write
|
||
217BD070000
|
heap
|
page read and write
|
||
26081102000
|
heap
|
page read and write
|
||
808D000
|
stack
|
page read and write
|
||
1B95C104000
|
heap
|
page read and write
|
||
1B956C3E000
|
heap
|
page read and write
|
||
97D8AFF000
|
stack
|
page read and write
|
||
23B9643D000
|
heap
|
page read and write
|
||
8F9D000
|
stack
|
page read and write
|
||
5527000
|
trusted library allocation
|
page read and write
|
||
818E000
|
stack
|
page read and write
|
||
2453000
|
heap
|
page read and write
|
||
1B956C24000
|
heap
|
page read and write
|
||
44EA000
|
stack
|
page read and write
|
||
5494000
|
trusted library allocation
|
page read and write
|
||
7F4D000
|
stack
|
page read and write
|
||
5549000
|
trusted library allocation
|
page read and write
|
||
48FD000
|
stack
|
page read and write
|
||
54E9000
|
trusted library allocation
|
page read and write
|
||
2200000
|
heap
|
page read and write
|
||
568D000
|
stack
|
page read and write
|
||
53A000
|
unkown
|
page readonly
|
||
26985FB000
|
stack
|
page read and write
|
||
971D000
|
stack
|
page read and write
|
||
757E000
|
stack
|
page read and write
|
||
79E2000
|
trusted library allocation
|
page read and write
|
||
949D000
|
stack
|
page read and write
|
||
550D000
|
trusted library allocation
|
page read and write
|
||
26C8F900000
|
heap
|
page read and write
|
||
1B95C107000
|
heap
|
page read and write
|
||
402D000
|
stack
|
page read and write
|
||
A71E000
|
stack
|
page read and write
|
||
715000
|
heap
|
page read and write
|
||
1DE53C00000
|
heap
|
page read and write
|
||
544D000
|
stack
|
page read and write
|
||
4A4D000
|
stack
|
page read and write
|
||
97D83DB000
|
stack
|
page read and write
|
||
641E000
|
stack
|
page read and write
|
||
8B9E000
|
stack
|
page read and write
|
||
54FF000
|
trusted library allocation
|
page read and write
|
||
5E9A000
|
trusted library allocation
|
page read and write
|
||
949D000
|
stack
|
page read and write
|
||
553A000
|
trusted library allocation
|
page read and write
|
||
217BD30C000
|
heap
|
page read and write
|
||
71AE000
|
stack
|
page read and write
|
||
804E000
|
stack
|
page read and write
|
||
1B956C8E000
|
heap
|
page read and write
|
||
5693000
|
heap
|
page read and write
|
||
79A1000
|
trusted library allocation
|
page read and write
|
||
23B96260000
|
heap
|
page read and write
|
||
7C7E000
|
stack
|
page read and write
|
||
9E5E000
|
stack
|
page read and write
|
||
8CDE000
|
stack
|
page read and write
|
||
95DD000
|
stack
|
page read and write
|
||
6CED000
|
stack
|
page read and write
|
||
550D000
|
trusted library allocation
|
page read and write
|
||
1B957318000
|
heap
|
page read and write
|
||
931E000
|
stack
|
page read and write
|
||
4F6D000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
854E000
|
stack
|
page read and write
|
||
7B7D000
|
stack
|
page read and write
|
||
1EBA9B00000
|
trusted library allocation
|
page read and write
|
||
A39D000
|
stack
|
page read and write
|
||
5B8E000
|
stack
|
page read and write
|
||
706E000
|
stack
|
page read and write
|
||
945E000
|
stack
|
page read and write
|
||
551F000
|
trusted library allocation
|
page read and write
|
||
17068C74000
|
heap
|
page read and write
|
||
3AED000
|
stack
|
page read and write
|
||
7954000
|
trusted library allocation
|
page read and write
|
||
61DD000
|
stack
|
page read and write
|
||
506D000
|
stack
|
page read and write
|
||
4C9B000
|
stack
|
page read and write
|
||
558D000
|
stack
|
page read and write
|
||
466D000
|
stack
|
page read and write
|
||
79D8000
|
trusted library allocation
|
page read and write
|
||
F1124FF000
|
stack
|
page read and write
|
||
21E0000
|
direct allocation
|
page read and write
|
||
76FD000
|
stack
|
page read and write
|
||
15B9FFF000
|
stack
|
page read and write
|
||
44EC000
|
stack
|
page read and write
|
||
17068C61000
|
heap
|
page read and write
|
||
783D000
|
stack
|
page read and write
|
||
1B95C0A1000
|
heap
|
page read and write
|
||
17068B70000
|
trusted library allocation
|
page read and write
|
||
530D000
|
stack
|
page read and write
|
||
21E0000
|
direct allocation
|
page read and write
|
||
217BD35C000
|
heap
|
page read and write
|
||
1DE53C13000
|
heap
|
page read and write
|
||
217BD2FE000
|
heap
|
page read and write
|
||
5EE000
|
stack
|
page read and write
|
||
1B95BF80000
|
trusted library allocation
|
page read and write
|
||
18282C70000
|
heap
|
page read and write
|
||
5530000
|
trusted library allocation
|
page read and write
|
||
79AA000
|
trusted library allocation
|
page read and write
|
||
1B956C91000
|
heap
|
page read and write
|
||
3C33000
|
trusted library allocation
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
79AE000
|
trusted library allocation
|
page read and write
|
||
95DD000
|
stack
|
page read and write
|
||
5A5000
|
heap
|
page read and write
|
||
6E2D000
|
stack
|
page read and write
|
||
716000
|
heap
|
page read and write
|
||
7C7E000
|
stack
|
page read and write
|
||
5DCD000
|
stack
|
page read and write
|
||
6A6D000
|
stack
|
page read and write
|
||
3EAF000
|
stack
|
page read and write
|
||
2150000
|
heap
|
page read and write
|
||
6F2E000
|
stack
|
page read and write
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
5E0D000
|
stack
|
page read and write
|
||
5C8E000
|
stack
|
page read and write
|
||
ADDB6FE000
|
stack
|
page read and write
|
||
5522000
|
trusted library allocation
|
page read and write
|
||
A75E000
|
stack
|
page read and write
|
||
E31F8FE000
|
stack
|
page read and write
|
||
5F0E000
|
stack
|
page read and write
|
||
7CCD000
|
stack
|
page read and write
|
||
9A9E000
|
stack
|
page read and write
|
||
476D000
|
stack
|
page read and write
|
||
30000
|
unkown
|
page read and write
|
||
7F0E000
|
stack
|
page read and write
|
||
5450000
|
trusted library allocation
|
page read and write
|
||
4B9D000
|
stack
|
page read and write
|
||
4A5000
|
unkown
|
page readonly
|
||
5CCD000
|
stack
|
page read and write
|
||
97D89FA000
|
stack
|
page read and write
|
||
631D000
|
stack
|
page read and write
|
||
F1125FF000
|
stack
|
page read and write
|
||
62DE000
|
stack
|
page read and write
|
||
17068C47000
|
heap
|
page read and write
|
||
26C8F7A0000
|
trusted library allocation
|
page read and write
|
||
551F000
|
trusted library allocation
|
page read and write
|
||
7940000
|
trusted library allocation
|
page read and write
|
||
551F000
|
trusted library allocation
|
page read and write
|
||
97D8D7E000
|
stack
|
page read and write
|
||
A5DE000
|
stack
|
page read and write
|
||
935D000
|
stack
|
page read and write
|
||
5F4D000
|
stack
|
page read and write
|
||
7B7D000
|
stack
|
page read and write
|
||
438E000
|
stack
|
page read and write
|
||
71C000
|
heap
|
page read and write
|
||
4B9D000
|
stack
|
page read and write
|
||
A35E000
|
stack
|
page read and write
|
||
7F4D000
|
stack
|
page read and write
|
||
5522000
|
trusted library allocation
|
page read and write
|
||
4B9D000
|
stack
|
page read and write
|
||
A21E000
|
stack
|
page read and write
|
||
733D000
|
stack
|
page read and write
|
||
3C6E000
|
stack
|
page read and write
|
||
8A9D000
|
stack
|
page read and write
|
||
A39D000
|
stack
|
page read and write
|
||
959E000
|
stack
|
page read and write
|
||
9A9E000
|
stack
|
page read and write
|
||
5527000
|
trusted library allocation
|
page read and write
|
||
9A9E000
|
stack
|
page read and write
|
||
7960000
|
trusted library allocation
|
page read and write
|
||
551F000
|
trusted library allocation
|
page read and write
|
||
1B95C000000
|
heap
|
page read and write
|
||
682000
|
heap
|
page read and write
|
||
4B4D000
|
stack
|
page read and write
|
||
4A5000
|
unkown
|
page readonly
|
||
A20000
|
trusted library allocation
|
page read and write
|
||
A71E000
|
stack
|
page read and write
|
||
985D000
|
stack
|
page read and write
|
||
8CDE000
|
stack
|
page read and write
|
||
858D000
|
stack
|
page read and write
|
||
75BD000
|
stack
|
page read and write
|
||
13F0305C000
|
heap
|
page read and write
|
||
1B9571E1000
|
trusted library allocation
|
page read and write
|
||
217BD365000
|
heap
|
page read and write
|
||
3FEF000
|
stack
|
page read and write
|
||
5530000
|
trusted library allocation
|
page read and write
|
||
1EBA9C02000
|
heap
|
page read and write
|
||
96DE000
|
stack
|
page read and write
|
||
276F000
|
stack
|
page read and write
|
||
56A0000
|
heap
|
page read and write
|
||
9C1D000
|
stack
|
page read and write
|
||
534D000
|
stack
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
1B95C047000
|
heap
|
page read and write
|
||
687E0000
|
unkown
|
page readonly
|
||
58CF000
|
stack
|
page read and write
|
||
5494000
|
trusted library allocation
|
page read and write
|
||
1B95BFE0000
|
trusted library allocation
|
page read and write
|
||
645D000
|
stack
|
page read and write
|
||
590D000
|
stack
|
page read and write
|
||
217BD270000
|
heap
|
page read and write
|
||
62E000
|
stack
|
page read and write
|
||
5527000
|
trusted library allocation
|
page read and write
|
||
619E000
|
stack
|
page read and write
|
||
2300000
|
direct allocation
|
page execute and read and write
|
||
8A5E000
|
stack
|
page read and write
|
||
1B95BFB0000
|
trusted library allocation
|
page read and write
|
||
9E9D000
|
stack
|
page read and write
|
||
796A000
|
trusted library allocation
|
page read and write
|
||
6F6D000
|
stack
|
page read and write
|
||
747D000
|
stack
|
page read and write
|
||
1EBA9C13000
|
heap
|
page read and write
|
||
2120000
|
direct allocation
|
page execute and read and write
|
||
610000
|
trusted library allocation
|
page read and write
|
||
17068C3D000
|
heap
|
page read and write
|
||
717000
|
heap
|
page read and write
|
||
19C000
|
stack
|
page read and write
|
||
72EE000
|
stack
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
5F50000
|
heap
|
page read and write
|
||
54EB000
|
trusted library allocation
|
page read and write
|
||
7CCD000
|
stack
|
page read and write
|
||
4A0000
|
unkown
|
page write copy
|
||
630000
|
heap
|
page read and write
|
||
A10000
|
trusted library allocation
|
page read and write
|
||
A9DE000
|
stack
|
page read and write
|
||
4E2D000
|
stack
|
page read and write
|
||
26C8F000000
|
heap
|
page read and write
|
||
62E000
|
stack
|
page read and write
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
51AD000
|
stack
|
page read and write
|
||
6B6E000
|
stack
|
page read and write
|
||
70F000
|
stack
|
page read and write
|
||
544D000
|
stack
|
page read and write
|
||
558D000
|
stack
|
page read and write
|
||
A85F000
|
stack
|
page read and write
|
||
15B9B7E000
|
stack
|
page read and write
|
||
671000
|
heap
|
page read and write
|
||
692D000
|
stack
|
page read and write
|
||
609D000
|
stack
|
page read and write
|
||
7960000
|
trusted library allocation
|
page read and write
|
||
6F6D000
|
stack
|
page read and write
|
||
4C9E000
|
stack
|
page read and write
|
||
262F000
|
stack
|
page read and write
|
||
830D000
|
stack
|
page read and write
|
||
5B8E000
|
stack
|
page read and write
|
||
7A08000
|
trusted library allocation
|
page read and write
|
||
520D000
|
stack
|
page read and write
|
||
410E000
|
stack
|
page read and write
|
||
630000
|
heap
|
page read and write
|
||
71A000
|
heap
|
page read and write
|
||
4F6D000
|
stack
|
page read and write
|
||
26C8F2BC000
|
heap
|
page read and write
|
||
563217E000
|
stack
|
page read and write
|
||
49FA000
|
stack
|
page read and write
|
||
A39D000
|
stack
|
page read and write
|
||
462F000
|
stack
|
page read and write
|
||
1EBA9D02000
|
heap
|
page read and write
|
||
818E000
|
stack
|
page read and write
|
||
1B95C3D0000
|
remote allocation
|
page read and write
|
||
316F5FE000
|
stack
|
page read and write
|
||
2110000
|
trusted library allocation
|
page read and write
|
||
96DE000
|
stack
|
page read and write
|
||
995E000
|
stack
|
page read and write
|
||
799E000
|
trusted library allocation
|
page read and write
|
||
4A4D000
|
stack
|
page read and write
|
||
79BC000
|
trusted library allocation
|
page read and write
|
||
808D000
|
stack
|
page read and write
|
||
666000
|
heap
|
page read and write
|
||
13F03026000
|
heap
|
page read and write
|
||
3B2E000
|
stack
|
page read and write
|
||
5A4D000
|
stack
|
page read and write
|
||
26C90058000
|
heap
|
page read and write
|
||
8A9D000
|
stack
|
page read and write
|
||
7940000
|
trusted library allocation
|
page read and write
|
||
8BDD000
|
stack
|
page read and write
|
||
4A4D000
|
stack
|
page read and write
|
||
9ADD000
|
stack
|
page read and write
|
||
63A000
|
heap
|
page read and write
|
||
416D000
|
stack
|
page read and write
|
||
6A3000
|
heap
|
page read and write
|
||
7F0E000
|
stack
|
page read and write
|
||
9E5E000
|
stack
|
page read and write
|
||
217BD240000
|
remote allocation
|
page read and write
|
||
669D000
|
stack
|
page read and write
|
||
F111DFD000
|
stack
|
page read and write
|
||
6D0000
|
heap
|
page read and write
|
||
A89D000
|
stack
|
page read and write
|
||
26C8F95C000
|
heap
|
page read and write
|
||
2370000
|
heap
|
page read and write
|
||
9D1E000
|
stack
|
page read and write
|
||
17068C41000
|
heap
|
page read and write
|
||
6CED000
|
stack
|
page read and write
|
||
7970000
|
trusted library allocation
|
page read and write
|
||
553A000
|
trusted library allocation
|
page read and write
|
||
19C000
|
stack
|
page read and write
|
||
5A4D000
|
stack
|
page read and write
|
||
715000
|
heap
|
page read and write
|
||
9FDD000
|
stack
|
page read and write
|
||
217BD278000
|
heap
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
9D5D000
|
stack
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
79BA000
|
trusted library allocation
|
page read and write
|
||
921D000
|
stack
|
page read and write
|
||
217BD1D0000
|
heap
|
page read and write
|
||
26080EA0000
|
heap
|
page read and write
|
||
97D867E000
|
stack
|
page read and write
|
||
1B95C05F000
|
heap
|
page read and write
|
||
61DD000
|
stack
|
page read and write
|
||
66DD000
|
stack
|
page read and write
|
||
959E000
|
stack
|
page read and write
|
||
793E000
|
stack
|
page read and write
|
||
23B9646D000
|
heap
|
page read and write
|
||
830D000
|
stack
|
page read and write
|
||
641E000
|
stack
|
page read and write
|
||
A25D000
|
stack
|
page read and write
|
||
7963000
|
trusted library allocation
|
page read and write
|
||
1B9569A0000
|
heap
|
page read and write
|
||
669E000
|
stack
|
page read and write
|
||
1B95C3A0000
|
trusted library allocation
|
page read and write
|
||
6B6E000
|
stack
|
page read and write
|
||
5E9A000
|
trusted library allocation
|
page read and write
|
||
2120000
|
direct allocation
|
page execute and read and write
|
||
3EAF000
|
stack
|
page read and write
|
||
5F51000
|
stack
|
page read and write
|
||
448C000
|
stack
|
page read and write
|
||
26C8F275000
|
heap
|
page read and write
|
||
A49E000
|
stack
|
page read and write
|
||
1B956BF0000
|
trusted library section
|
page read and write
|
||
50AD000
|
stack
|
page read and write
|
||
3C6E000
|
stack
|
page read and write
|
||
702000
|
heap
|
page read and write
|
||
949D000
|
stack
|
page read and write
|
||
15B9D7B000
|
stack
|
page read and write
|
||
A89D000
|
stack
|
page read and write
|
||
71F000
|
heap
|
page read and write
|
||
AAE0000
|
remote allocation
|
page read and write
|
||
6CED000
|
stack
|
page read and write
|
||
7E0D000
|
stack
|
page read and write
|
||
4B4D000
|
stack
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
21CE000
|
stack
|
page read and write
|
||
3FEF000
|
stack
|
page read and write
|
||
5A0D000
|
stack
|
page read and write
|
||
97D86FE000
|
stack
|
page read and write
|
||
1B956C00000
|
heap
|
page read and write
|
||
6DEE000
|
stack
|
page read and write
|
||
6B6D000
|
stack
|
page read and write
|
||
6BAD000
|
stack
|
page read and write
|
||
985D000
|
stack
|
page read and write
|
||
26C8F92E000
|
heap
|
page read and write
|
||
645D000
|
stack
|
page read and write
|
||
A75E000
|
stack
|
page read and write
|
||
4A5000
|
unkown
|
page readonly
|
||
8F9D000
|
stack
|
page read and write
|
||
4A5000
|
unkown
|
page readonly
|
||
659D000
|
stack
|
page read and write
|
||
86CD000
|
stack
|
page read and write
|
||
2A5E000
|
stack
|
page read and write
|
||
65E000
|
stack
|
page read and write
|
||
79B3000
|
trusted library allocation
|
page read and write
|
||
5E0D000
|
stack
|
page read and write
|
||
46B000
|
unkown
|
page readonly
|
||
1B957302000
|
heap
|
page read and write
|
||
6DED000
|
stack
|
page read and write
|
||
82CE000
|
stack
|
page read and write
|
||
840E000
|
stack
|
page read and write
|
||
4B4D000
|
stack
|
page read and write
|
||
79BA000
|
trusted library allocation
|
page read and write
|
||
796A000
|
trusted library allocation
|
page read and write
|
||
1B956BE0000
|
trusted library allocation
|
page read and write
|
||
21EC000
|
direct allocation
|
page read and write
|
||
434F000
|
stack
|
page read and write
|
||
8F9D000
|
stack
|
page read and write
|
||
3EEE000
|
stack
|
page read and write
|
||
999D000
|
stack
|
page read and write
|
||
FD6E2CC000
|
stack
|
page read and write
|
||
E31F97F000
|
stack
|
page read and write
|
||
8F5E000
|
stack
|
page read and write
|
||
840E000
|
stack
|
page read and write
|
||
A0DE000
|
stack
|
page read and write
|
||
8BDD000
|
stack
|
page read and write
|
||
21D0000
|
heap
|
page read and write
|
||
420F000
|
stack
|
page read and write
|
||
9F9E000
|
stack
|
page read and write
|
||
2110000
|
trusted library allocation
|
page read and write
|
||
A25D000
|
stack
|
page read and write
|
||
79AA000
|
trusted library allocation
|
page read and write
|
||
217BDB80000
|
heap
|
page read and write
|
||
844D000
|
stack
|
page read and write
|
||
720000
|
heap
|
page read and write
|
||
79DB000
|
trusted library allocation
|
page read and write
|
||
7CCD000
|
stack
|
page read and write
|
||
737000
|
heap
|
page read and write
|
||
97D8BFC000
|
stack
|
page read and write
|
||
79B3000
|
trusted library allocation
|
page read and write
|
||
702000
|
heap
|
page read and write
|
||
2CC0000
|
trusted library allocation
|
page read and write
|
||
50AD000
|
stack
|
page read and write
|
||
98000
|
stack
|
page read and write
|
||
13F03000000
|
heap
|
page read and write
|
||
23A0000
|
trusted library allocation
|
page read and write
|
||
57CE000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
689000
|
heap
|
page read and write
|
||
17068C5F000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
3EAF000
|
stack
|
page read and write
|
||
881D000
|
stack
|
page read and write
|
||
844D000
|
stack
|
page read and write
|
||
7952000
|
trusted library allocation
|
page read and write
|
||
722000
|
heap
|
page read and write
|
||
17068C29000
|
heap
|
page read and write
|
||
79BC000
|
trusted library allocation
|
page read and write
|
||
909E000
|
stack
|
page read and write
|
||
217BD2D5000
|
heap
|
page read and write
|
||
17068C62000
|
heap
|
page read and write
|
||
3C6E000
|
stack
|
page read and write
|
||
5F0E000
|
stack
|
page read and write
|
||
5D1D000
|
stack
|
page read and write
|
||
76BE000
|
stack
|
page read and write
|
||
79C7000
|
trusted library allocation
|
page read and write
|
||
56A0000
|
heap
|
page read and write
|
||
452E000
|
stack
|
page read and write
|
||
881D000
|
stack
|
page read and write
|
||
A11D000
|
stack
|
page read and write
|
||
79AA000
|
trusted library allocation
|
page read and write
|
||
8A5E000
|
stack
|
page read and write
|
||
3AED000
|
stack
|
page read and write
|
||
7F4D000
|
stack
|
page read and write
|
||
217BD2C4000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
A85F000
|
stack
|
page read and write
|
||
5E0D000
|
stack
|
page read and write
|
||
69D000
|
heap
|
page read and write
|
||
5E20000
|
trusted library allocation
|
page read and write
|
||
82F000
|
stack
|
page read and write
|
||
868E000
|
stack
|
page read and write
|
||
783D000
|
stack
|
page read and write
|
||
217BD28B000
|
heap
|
page read and write
|
||
51AD000
|
stack
|
page read and write
|
||
402D000
|
stack
|
page read and write
|
||
1EBA9A39000
|
heap
|
page read and write
|
||
50AD000
|
stack
|
page read and write
|
||
269857E000
|
stack
|
page read and write
|
||
61DD000
|
stack
|
page read and write
|
||
56B0000
|
heap
|
page read and write
|
||
655E000
|
stack
|
page read and write
|
||
97D88FE000
|
stack
|
page read and write
|
||
79AE000
|
trusted library allocation
|
page read and write
|
||
5489000
|
trusted library allocation
|
page read and write
|
||
796A000
|
trusted library allocation
|
page read and write
|
||
5489000
|
trusted library allocation
|
page read and write
|
||
87CE000
|
stack
|
page read and write
|
||
1EBA9D13000
|
heap
|
page read and write
|
||
999D000
|
stack
|
page read and write
|
||
17068C3A000
|
heap
|
page read and write
|
||
269819F000
|
stack
|
page read and write
|
||
48BD000
|
stack
|
page read and write
|
||
2B5F000
|
stack
|
page read and write
|
||
217BD240000
|
remote allocation
|
page read and write
|
||
534D000
|
stack
|
page read and write
|
||
909E000
|
stack
|
page read and write
|
||
95DD000
|
stack
|
page read and write
|
||
FD6ED7E000
|
stack
|
page read and write
|
||
844D000
|
stack
|
page read and write
|
||
5547000
|
trusted library allocation
|
page read and write
|
||
26C8F27C000
|
heap
|
page read and write
|
||
476D000
|
stack
|
page read and write
|
||
8CDE000
|
stack
|
page read and write
|
||
26C8F277000
|
heap
|
page read and write
|
||
7954000
|
trusted library allocation
|
page read and write
|
||
71ED000
|
stack
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
5A4D000
|
stack
|
page read and write
|
||
1EBA9A0D000
|
unkown
|
page read and write
|
||
520D000
|
stack
|
page read and write
|
||
54CA000
|
trusted library allocation
|
page read and write
|
||
13F03013000
|
heap
|
page read and write
|
||
2C9F000
|
stack
|
page read and write
|
||
217BD2DB000
|
heap
|
page read and write
|
||
854E000
|
stack
|
page read and write
|
||
6F2E000
|
stack
|
page read and write
|
||
6CED000
|
stack
|
page read and write
|
||
551C000
|
trusted library allocation
|
page read and write
|
||
A4DD000
|
stack
|
page read and write
|
||
72EE000
|
stack
|
page read and write
|
||
717000
|
heap
|
page read and write
|
||
58CF000
|
stack
|
page read and write
|
||
5537000
|
trusted library allocation
|
page read and write
|
||
15B967B000
|
stack
|
page read and write
|
||
6C8000
|
heap
|
page read and write
|
||
17068C7D000
|
heap
|
page read and write
|
||
51AD000
|
stack
|
page read and write
|
||
62DE000
|
stack
|
page read and write
|
||
26C8F220000
|
heap
|
page read and write
|
||
8E1E000
|
stack
|
page read and write
|
||
9D1E000
|
stack
|
page read and write
|
||
954000
|
trusted library allocation
|
page read and write
|
||
804E000
|
stack
|
page read and write
|
||
793E000
|
stack
|
page read and write
|
||
23B96513000
|
heap
|
page read and write
|
||
FD6EAFD000
|
stack
|
page read and write
|
||
2450000
|
heap
|
page read and write
|
||
6B6000
|
heap
|
page read and write
|
||
1EBA98A0000
|
heap
|
page read and write
|
||
21D8000
|
heap
|
page read and write
|
||
795B000
|
trusted library allocation
|
page read and write
|
||
7957000
|
trusted library allocation
|
page read and write
|
||
47BD000
|
stack
|
page read and write
|
||
26C8F26A000
|
heap
|
page read and write
|
||
8A9D000
|
stack
|
page read and write
|
||
13F03802000
|
trusted library allocation
|
page read and write
|
||
1B957ED0000
|
trusted library allocation
|
page read and write
|
||
1B95C390000
|
trusted library allocation
|
page read and write
|
||
4B4D000
|
stack
|
page read and write
|
||
530D000
|
stack
|
page read and write
|
||
79DB000
|
trusted library allocation
|
page read and write
|
||
5A0D000
|
stack
|
page read and write
|
||
15B9F7F000
|
stack
|
page read and write
|
||
6BAD000
|
stack
|
page read and write
|
||
49FE000
|
stack
|
page read and write
|
||
452E000
|
stack
|
page read and write
|
||
641E000
|
stack
|
page read and write
|
||
7C7E000
|
stack
|
page read and write
|
||
92F000
|
stack
|
page read and write
|
||
619C000
|
stack
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
18282C50000
|
heap
|
page read and write
|
||
6E4000
|
heap
|
page read and write
|
||
620000
|
direct allocation
|
page execute and read and write
|
||
7963000
|
trusted library allocation
|
page read and write
|
||
5F40000
|
heap
|
page read and write
|
||
2150000
|
heap
|
page read and write
|
||
26080E90000
|
heap
|
page read and write
|
||
2110000
|
trusted library allocation
|
page read and write
|
||
26C8F298000
|
heap
|
page read and write
|
||
9FDD000
|
stack
|
page read and write
|
||
26C8F2B9000
|
heap
|
page read and write
|
||
476D000
|
stack
|
page read and write
|
||
416D000
|
stack
|
page read and write
|
||
609D000
|
stack
|
page read and write
|
||
1DE53C7F000
|
heap
|
page read and write
|
||
79BC000
|
trusted library allocation
|
page read and write
|
||
1B957359000
|
heap
|
page read and write
|
||
6C8000
|
heap
|
page read and write
|
||
58CF000
|
stack
|
page read and write
|
||
981E000
|
stack
|
page read and write
|
||
743E000
|
stack
|
page read and write
|
||
830D000
|
stack
|
page read and write
|
||
757E000
|
stack
|
page read and write
|
||
6BAD000
|
stack
|
page read and write
|
||
70AD000
|
stack
|
page read and write
|
||
4E2D000
|
stack
|
page read and write
|
||
98000
|
stack
|
page read and write
|
||
17068C84000
|
heap
|
page read and write
|
||
92F000
|
stack
|
page read and write
|
||
5494000
|
trusted library allocation
|
page read and write
|
||
4270000
|
heap
|
page read and write
|
||
868E000
|
stack
|
page read and write
|
||
8B9E000
|
stack
|
page read and write
|
||
6CAE000
|
stack
|
page read and write
|
||
6E2D000
|
stack
|
page read and write
|
||
722000
|
heap
|
page read and write
|
||
858D000
|
stack
|
page read and write
|
||
8F9D000
|
stack
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
669E000
|
stack
|
page read and write
|
||
799E000
|
trusted library allocation
|
page read and write
|
||
57CE000
|
stack
|
page read and write
|
||
3AED000
|
stack
|
page read and write
|
||
66DD000
|
stack
|
page read and write
|
||
79BA000
|
trusted library allocation
|
page read and write
|
||
45EB000
|
stack
|
page read and write
|
||
A46000
|
heap
|
page read and write
|
||
7960000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
743E000
|
stack
|
page read and write
|
||
6CAE000
|
stack
|
page read and write
|
||
799E000
|
trusted library allocation
|
page read and write
|
||
5B4D000
|
stack
|
page read and write
|
||
234C000
|
stack
|
page read and write
|
||
9D1E000
|
stack
|
page read and write
|
||
4F2D000
|
stack
|
page read and write
|
||
909E000
|
stack
|
page read and write
|
||
854E000
|
stack
|
page read and write
|
||
A49E000
|
stack
|
page read and write
|
||
909E000
|
stack
|
page read and write
|
||
4A0000
|
unkown
|
page write copy
|
||
1EBA9B02000
|
trusted library allocation
|
page read and write
|
||
717000
|
heap
|
page read and write
|
||
959E000
|
stack
|
page read and write
|
||
A00000
|
heap
|
page read and write
|
||
79A8000
|
trusted library allocation
|
page read and write
|
||
895D000
|
stack
|
page read and write
|
||
26C8F246000
|
heap
|
page read and write
|
||
2150000
|
heap
|
page read and write
|
||
28B9000
|
stack
|
page read and write
|
||
E31F5AA000
|
stack
|
page read and write
|
||
79B6000
|
trusted library allocation
|
page read and write
|
||
8D1D000
|
stack
|
page read and write
|
||
FD6E6FB000
|
stack
|
page read and write
|
||
5537000
|
trusted library allocation
|
page read and write
|
||
8A5E000
|
stack
|
page read and write
|
||
AAE0000
|
remote allocation
|
page read and write
|
||
79B1000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
720000
|
heap
|
page read and write
|
||
7952000
|
trusted library allocation
|
page read and write
|
||
7954000
|
trusted library allocation
|
page read and write
|
||
87CE000
|
stack
|
page read and write
|
||
43ED000
|
stack
|
page read and write
|
||
796C000
|
trusted library allocation
|
page read and write
|
||
7B7D000
|
stack
|
page read and write
|
||
3D6F000
|
stack
|
page read and write
|
||
A25D000
|
stack
|
page read and write
|
||
82F000
|
stack
|
page read and write
|
||
1B957215000
|
heap
|
page read and write
|
||
9E5E000
|
stack
|
page read and write
|
||
7952000
|
trusted library allocation
|
page read and write
|
||
7940000
|
trusted library allocation
|
page read and write
|
||
2450000
|
heap
|
page read and write
|
||
757E000
|
stack
|
page read and write
|
||
9ADD000
|
stack
|
page read and write
|
||
412D000
|
stack
|
page read and write
|
||
43ED000
|
stack
|
page read and write
|
||
9D5D000
|
stack
|
page read and write
|
||
722000
|
heap
|
page read and write
|
||
981E000
|
stack
|
page read and write
|
||
868E000
|
stack
|
page read and write
|
||
49B000
|
unkown
|
page read and write
|
||
1B95C380000
|
trusted library allocation
|
page read and write
|
||
3C6E000
|
stack
|
page read and write
|
||
5C8E000
|
stack
|
page read and write
|
||
7954000
|
trusted library allocation
|
page read and write
|
||
2B9E000
|
stack
|
page read and write
|
||
21E4000
|
direct allocation
|
page read and write
|
||
26C90113000
|
heap
|
page read and write
|
||
5A5000
|
heap
|
page read and write
|
||
6CF000
|
heap
|
page read and write
|
||
79BC000
|
trusted library allocation
|
page read and write
|
||
90DD000
|
stack
|
page read and write
|
||
5489000
|
trusted library allocation
|
page read and write
|
||
79E2000
|
trusted library allocation
|
page read and write
|
||
F1122FF000
|
stack
|
page read and write
|
||
18282B50000
|
heap
|
page read and write
|
||
217BD2C2000
|
heap
|
page read and write
|
||
5450000
|
trusted library allocation
|
page read and write
|
||
A11D000
|
stack
|
page read and write
|
||
6CAE000
|
stack
|
page read and write
|
||
26081002000
|
heap
|
page read and write
|
||
17068C46000
|
heap
|
page read and write
|
||
687E4000
|
unkown
|
page readonly
|
||
1EBA9B15000
|
trusted library allocation
|
page read and write
|
||
631D000
|
stack
|
page read and write
|
||
733D000
|
stack
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
82CE000
|
stack
|
page read and write
|
||
891E000
|
stack
|
page read and write
|
||
2207000
|
heap
|
page read and write
|
||
23A0000
|
trusted library allocation
|
page read and write
|
||
5CCD000
|
stack
|
page read and write
|
||
5F0E000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
995E000
|
stack
|
page read and write
|
||
8E5D000
|
stack
|
page read and write
|
||
72EE000
|
stack
|
page read and write
|
||
1DE53C64000
|
heap
|
page read and write
|
||
881D000
|
stack
|
page read and write
|
||
935D000
|
stack
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
7952000
|
trusted library allocation
|
page read and write
|
||
56A0000
|
heap
|
page read and write
|
||
895D000
|
stack
|
page read and write
|
||
5530000
|
trusted library allocation
|
page read and write
|
||
985D000
|
stack
|
page read and write
|
||
F1120FD000
|
stack
|
page read and write
|
||
981E000
|
stack
|
page read and write
|
||
67DE000
|
stack
|
page read and write
|
||
747D000
|
stack
|
page read and write
|
||
ADDB3FB000
|
stack
|
page read and write
|
||
931E000
|
stack
|
page read and write
|
||
4B9D000
|
stack
|
page read and write
|
||
9E9D000
|
stack
|
page read and write
|
||
79DB000
|
trusted library allocation
|
page read and write
|
||
70AD000
|
stack
|
page read and write
|
||
2608103C000
|
heap
|
page read and write
|
||
3D6F000
|
stack
|
page read and write
|
||
92F000
|
stack
|
page read and write
|
||
6E4000
|
heap
|
page read and write
|
||
23B96488000
|
heap
|
page read and write
|
||
8A5E000
|
stack
|
page read and write
|
||
13F03750000
|
remote allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
49B000
|
unkown
|
page read and write
|
||
A5DE000
|
stack
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
316F77E000
|
stack
|
page read and write
|
||
476D000
|
stack
|
page read and write
|
||
5EE000
|
stack
|
page read and write
|
||
AADF000
|
stack
|
page read and write
|
||
600000
|
heap
|
page read and write
|
||
6A2D000
|
stack
|
page read and write
|
||
75BD000
|
stack
|
page read and write
|
||
999D000
|
stack
|
page read and write
|
||
2450000
|
heap
|
page read and write
|
||
81CD000
|
stack
|
page read and write
|
||
659D000
|
stack
|
page read and write
|
||
551C000
|
trusted library allocation
|
page read and write
|
||
480000
|
trusted library allocation
|
page read and write
|
||
A61D000
|
stack
|
page read and write
|
||
76BE000
|
stack
|
page read and write
|
||
412D000
|
stack
|
page read and write
|
||
5527000
|
trusted library allocation
|
page read and write
|
||
5A4D000
|
stack
|
page read and write
|
||
692D000
|
stack
|
page read and write
|
||
26C8F3FC000
|
heap
|
page read and write
|
||
217BD35C000
|
heap
|
page read and write
|
||
8D1D000
|
stack
|
page read and write
|
||
706E000
|
stack
|
page read and write
|
||
5549000
|
trusted library allocation
|
page read and write
|
||
645D000
|
stack
|
page read and write
|
||
63A000
|
heap
|
page read and write
|
||
8B9E000
|
stack
|
page read and write
|
||
72EE000
|
stack
|
page read and write
|
||
26C8EFB0000
|
heap
|
page read and write
|
||
4A5000
|
unkown
|
page readonly
|
||
6E2D000
|
stack
|
page read and write
|
||
3DAE000
|
stack
|
page read and write
|
||
26081113000
|
heap
|
page read and write
|
||
891E000
|
stack
|
page read and write
|
||
3AED000
|
stack
|
page read and write
|
||
8F5E000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
71AE000
|
stack
|
page read and write
|
||
921D000
|
stack
|
page read and write
|
||
5DCD000
|
stack
|
page read and write
|
||
17068C40000
|
heap
|
page read and write
|
||
2453000
|
heap
|
page read and write
|
||
9D5D000
|
stack
|
page read and write
|
||
8B9E000
|
stack
|
page read and write
|
||
6F6D000
|
stack
|
page read and write
|
||
8E1E000
|
stack
|
page read and write
|
||
75C000
|
heap
|
page read and write
|
||
79C7000
|
trusted library allocation
|
page read and write
|
||
AADF000
|
stack
|
page read and write
|
||
A0DE000
|
stack
|
page read and write
|
||
804E000
|
stack
|
page read and write
|
||
534D000
|
stack
|
page read and write
|
||
17068C31000
|
heap
|
page read and write
|
||
6C8000
|
heap
|
page read and write
|
||
79E4000
|
trusted library allocation
|
page read and write
|
||
840E000
|
stack
|
page read and write
|
||
17068C6B000
|
heap
|
page read and write
|
||
995E000
|
stack
|
page read and write
|
||
79A1000
|
trusted library allocation
|
page read and write
|
||
8CDE000
|
stack
|
page read and write
|
||
692D000
|
stack
|
page read and write
|
||
6A7000
|
heap
|
page read and write
|
||
6DEE000
|
stack
|
page read and write
|
||
8F5E000
|
stack
|
page read and write
|
||
61DD000
|
stack
|
page read and write
|
||
3040000
|
trusted library allocation
|
page read and write
|
||
21E0000
|
direct allocation
|
page read and write
|
||
A39D000
|
stack
|
page read and write
|
||
17068C5C000
|
heap
|
page read and write
|
||
82CE000
|
stack
|
page read and write
|
||
2776000
|
trusted library allocation
|
page read and write
|
There are 1918 hidden memdumps, click here to show them.