Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
C.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\Desktop\C.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_d56bdb83eb9d4cf28c9bde832a0f519ccf44d5f_82810a17_0bbf029b\Report.wer
|
Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC572.tmp.dmp
|
Mini DuMP crash report, 14 streams, Thu Jun 23 15:55:36 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCB20.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCCE7.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\System32\20220623\PowerShell_transcript.724536.04iY03ef.20220623175558.txt
|
UTF-8 Unicode (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Windows\System32\20220623\PowerShell_transcript.724536.4jRUxIKh.20220623175701.txt
|
UTF-8 Unicode (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Windows\Temp\__PSScriptPolicyTest_5ss0gna4.r3v.psm1
|
very short file (no magic)
|
dropped
|
||
C:\Windows\Temp\__PSScriptPolicyTest_cyx5weiu.qmq.psm1
|
very short file (no magic)
|
dropped
|
||
C:\Windows\Temp\__PSScriptPolicyTest_et0gmkgs.0m3.ps1
|
very short file (no magic)
|
dropped
|
||
C:\Windows\Temp\__PSScriptPolicyTest_hwx3zdj0.32k.ps1
|
very short file (no magic)
|
dropped
|
There are 3 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\loaddll32.exe
|
loaddll32.exe "C:\Users\user\Desktop\C.dll"
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\C.dll",#1
|
||
C:\Windows\SysWOW64\explorer.exe
|
C:\Windows\SysWOW64\explorer.exe
|
||
C:\Windows\SysWOW64\explorer.exe
|
C:\Windows\SysWOW64\explorer.exe
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /Z /ST 17:57 /tn qsrshyj /ET 18:08 /tr "powershell.exe
-encodedCommand cgBlAGcAcwB2AHIAMwAyAC4AZQB4AGUAIAAiAEMAOgBcAFUAcwBlAHIAcwBcAGoAbwBuAGUAcwBcAEQAZQBzAGsAdABvAHAAXABDAC4AZABsAGwAIgA="
/SC ONCE
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe -encodedCommand cgBlAGcAcwB2AHIAMwAyAC4AZQB4AGUAIAAiAEMAOgBcAFUAcwBlAHIAcwBcAGoAbwBuAGUAcwBcAEQAZQBzAGsAdABvAHAAXABDAC4AZABsAGwAIgA=
|
||
C:\Windows\System32\regsvr32.exe
|
"C:\Windows\system32\regsvr32.exe" C:\Users\user\Desktop\C.dll
|
||
C:\Windows\SysWOW64\regsvr32.exe
|
C:\Users\user\Desktop\C.dll
|
||
C:\Windows\SysWOW64\explorer.exe
|
C:\Windows\SysWOW64\explorer.exe
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe -encodedCommand cgBlAGcAcwB2AHIAMwAyAC4AZQB4AGUAIAAiAEMAOgBcAFUAcwBlAHIAcwBcAGoAbwBuAGUAcwBcAEQAZQBzAGsAdABvAHAAXABDAC4AZABsAGwAIgA=
|
||
C:\Windows\System32\regsvr32.exe
|
"C:\Windows\system32\regsvr32.exe" C:\Users\user\Desktop\C.dll
|
||
C:\Windows\SysWOW64\regsvr32.exe
|
C:\Users\user\Desktop\C.dll
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\C.dll",#1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 5620 -s 752
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 8 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
|
unknown
|
||
http://www.borland.com/namespaces/Types-IAppServerSOAP
|
unknown
|
||
https://sectigo.com/CPS0
|
unknown
|
||
http://www.borland.com/namespaces/Types
|
unknown
|
||
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/Nhttp://www.borland.com/namespaces/Types
|
unknown
|
||
http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
|
unknown
|
||
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
|
unknown
|
||
http://ocsp.sectigo.com0
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://ocsp.sectigo.com0#
|
unknown
|
||
http://www.borland.com/namespaces/Typeslhttp://www.borland.com/namespaces/Types-IAppServerSOAP
|
unknown
|
There are 2 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
192.168.2.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\Software\Microsoft\Grgganpwctzo
|
3d9dd611
|
||
HKEY_CURRENT_USER\Software\Microsoft\Grgganpwctzo
|
802065f
|
||
HKEY_CURRENT_USER\Software\Microsoft\Grgganpwctzo
|
a432623
|
||
HKEY_CURRENT_USER\Software\Microsoft\Grgganpwctzo
|
b2ff4146
|
||
HKEY_CURRENT_USER\Software\Microsoft\Grgganpwctzo
|
cff70ecc
|
||
HKEY_CURRENT_USER\Software\Microsoft\Grgganpwctzo
|
774b69a9
|
||
HKEY_CURRENT_USER\Software\Microsoft\Grgganpwctzo
|
b0be613a
|
||
HKEY_CURRENT_USER\Software\Microsoft\Grgganpwctzo
|
42d4b9e7
|
||
HKEY_CURRENT_USER\Software\Microsoft\Grgganpwctzo
|
3d9dd611
|
||
HKEY_CURRENT_USER\Software\Microsoft\Grgganpwctzo
|
3d9dd611
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
|
AmiHivePermissionsCorrect
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
|
AmiHiveOwnerCorrect
|
||
\REGISTRY\A\{310c3c0f-b649-1ba3-9097-9825317ca22e}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
ProgramId
|
||
\REGISTRY\A\{310c3c0f-b649-1ba3-9097-9825317ca22e}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
FileId
|
||
\REGISTRY\A\{310c3c0f-b649-1ba3-9097-9825317ca22e}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
LowerCaseLongPath
|
||
\REGISTRY\A\{310c3c0f-b649-1ba3-9097-9825317ca22e}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
LongPathHash
|
||
\REGISTRY\A\{310c3c0f-b649-1ba3-9097-9825317ca22e}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
Name
|
||
\REGISTRY\A\{310c3c0f-b649-1ba3-9097-9825317ca22e}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
Publisher
|
||
\REGISTRY\A\{310c3c0f-b649-1ba3-9097-9825317ca22e}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
Version
|
||
\REGISTRY\A\{310c3c0f-b649-1ba3-9097-9825317ca22e}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
BinFileVersion
|
||
\REGISTRY\A\{310c3c0f-b649-1ba3-9097-9825317ca22e}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
BinaryType
|
||
\REGISTRY\A\{310c3c0f-b649-1ba3-9097-9825317ca22e}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
ProductName
|
||
\REGISTRY\A\{310c3c0f-b649-1ba3-9097-9825317ca22e}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
ProductVersion
|
||
\REGISTRY\A\{310c3c0f-b649-1ba3-9097-9825317ca22e}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
LinkDate
|
||
\REGISTRY\A\{310c3c0f-b649-1ba3-9097-9825317ca22e}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
BinProductVersion
|
||
\REGISTRY\A\{310c3c0f-b649-1ba3-9097-9825317ca22e}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
Size
|
||
\REGISTRY\A\{310c3c0f-b649-1ba3-9097-9825317ca22e}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
Language
|
||
\REGISTRY\A\{310c3c0f-b649-1ba3-9097-9825317ca22e}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
IsPeFile
|
||
\REGISTRY\A\{310c3c0f-b649-1ba3-9097-9825317ca22e}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
IsOsComponent
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
|
ExceptionRecord
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceTicket
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceId
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
ApplicationFlags
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
|
00184006417502B9
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\Oiyamnnomejtlb
|
51800d90
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\Oiyamnnomejtlb
|
641fddde
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\Oiyamnnomejtlb
|
665efda2
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\Oiyamnnomejtlb
|
dee29ac7
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\Oiyamnnomejtlb
|
a3ead54d
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\Oiyamnnomejtlb
|
1b56b228
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\Oiyamnnomejtlb
|
dca3babb
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\Oiyamnnomejtlb
|
2ec96266
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\Oiyamnnomejtlb
|
51800d90
|
There are 33 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
10A0000
|
direct allocation
|
page execute and read and write
|
||
3B10000
|
direct allocation
|
page execute and read and write
|
||
1070000
|
direct allocation
|
page execute and read and write
|
||
2FB0000
|
system
|
page execute and read and write
|
||
1070000
|
direct allocation
|
page execute and read and write
|
||
2750000
|
direct allocation
|
page execute and read and write
|
||
3230000
|
system
|
page execute and read and write
|
||
10C0000
|
direct allocation
|
page execute and read and write
|
||
3AF0000
|
direct allocation
|
page execute and read and write
|
||
2FB0000
|
system
|
page execute and read and write
|
||
10C0000
|
direct allocation
|
page execute and read and write
|
||
10C0000
|
direct allocation
|
page execute and read and write
|
||
10A0000
|
direct allocation
|
page execute and read and write
|
||
3230000
|
system
|
page execute and read and write
|
||
27A0000
|
direct allocation
|
page execute and read and write
|
||
3AC0000
|
direct allocation
|
page execute and read and write
|
||
2780000
|
direct allocation
|
page execute and read and write
|
||
10A0000
|
direct allocation
|
page execute and read and write
|
||
1070000
|
direct allocation
|
page execute and read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
1C6CDA13000
|
heap
|
page read and write
|
||
18D25502000
|
heap
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
B10000
|
unkown
|
page readonly
|
||
1BE5CA20000
|
trusted library allocation
|
page read and write
|
||
9D0000
|
unkown
|
page readonly
|
||
33C7000
|
heap
|
page read and write
|
||
203068E0000
|
trusted library allocation
|
page read and write
|
||
4D8F000
|
stack
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
207E7C2F000
|
heap
|
page read and write
|
||
1BE5BD25000
|
heap
|
page read and write
|
||
3C7F000
|
heap
|
page read and write
|
||
7A0000
|
trusted library allocation
|
page read and write
|
||
4380000
|
trusted library allocation
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
1BA12EA0000
|
heap
|
page read and write
|
||
1BDF2399000
|
heap
|
page read and write
|
||
20E30263000
|
heap
|
page read and write
|
||
1BE5CCE0000
|
trusted library allocation
|
page read and write
|
||
1BDF2392000
|
heap
|
page read and write
|
||
3F4F000
|
trusted library allocation
|
page read and write
|
||
6E9D97E000
|
stack
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
1C1A7A50000
|
heap
|
page read and write
|
||
1C6CDA47000
|
heap
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
1BDF17A0000
|
heap
|
page read and write
|
||
20306C10000
|
trusted library allocation
|
page read and write
|
||
18D25490000
|
heap
|
page read and write
|
||
4380000
|
trusted library allocation
|
page read and write
|
||
207E7C3D000
|
heap
|
page read and write
|
||
20306920000
|
remote allocation
|
page read and write
|
||
1BDF184B000
|
heap
|
page read and write
|
||
2030126D000
|
heap
|
page read and write
|
||
207E7C77000
|
heap
|
page read and write
|
||
341C000
|
heap
|
page read and write
|
||
F70000
|
direct allocation
|
page read and write
|
||
C5992FE000
|
stack
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
2CAF000
|
heap
|
page read and write
|
||
4380000
|
trusted library allocation
|
page read and write
|
||
16CCFFF000
|
unkown
|
page read and write
|
||
3220000
|
remote allocation
|
page read and write
|
||
2E60000
|
remote allocation
|
page read and write
|
||
323E47F000
|
stack
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
16CCC78000
|
stack
|
page read and write
|
||
1BDF18B4000
|
heap
|
page read and write
|
||
3760000
|
heap
|
page read and write
|
||
33C7000
|
heap
|
page read and write
|
||
64201FE000
|
stack
|
page read and write
|
||
1BDF2351000
|
heap
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
1BDF2384000
|
heap
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
1C3379B0000
|
heap
|
page read and write
|
||
5600000
|
trusted library allocation
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
F30000
|
direct allocation
|
page execute and read and write
|
||
1BDF2399000
|
heap
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
920000
|
trusted library allocation
|
page read and write
|
||
18D25413000
|
heap
|
page read and write
|
||
20301A00000
|
heap
|
page read and write
|
||
1C6CD910000
|
heap
|
page read and write
|
||
F00000
|
trusted library allocation
|
page read and write
|
||
4DA0000
|
heap
|
page read and write
|
||
203067E0000
|
trusted library allocation
|
page read and write
|
||
4380000
|
trusted library allocation
|
page read and write
|
||
18D2544C000
|
heap
|
page read and write
|
||
57FF000
|
stack
|
page read and write
|
||
4380000
|
trusted library allocation
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
1BDF236F000
|
heap
|
page read and write
|
||
1C6CD9D0000
|
trusted library allocation
|
page read and write
|
||
1BDF18D2000
|
heap
|
page read and write
|
||
10C0000
|
heap
|
page read and write
|
||
2E11000
|
heap
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
2C30000
|
heap
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
207E7C67000
|
heap
|
page read and write
|
||
207E7C50000
|
heap
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
1BDF237E000
|
heap
|
page read and write
|
||
5600000
|
trusted library allocation
|
page read and write
|
||
20306804000
|
trusted library allocation
|
page read and write
|
||
1BDF2202000
|
heap
|
page read and write
|
||
2030129C000
|
heap
|
page read and write
|
||
1C337C4C000
|
heap
|
page read and write
|
||
20E300B0000
|
heap
|
page read and write
|
||
1BDF1886000
|
heap
|
page read and write
|
||
F90BBCB000
|
stack
|
page read and write
|
||
4CE000
|
unkown
|
page write copy
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
4380000
|
trusted library allocation
|
page read and write
|
||
3500000
|
heap
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
4380000
|
trusted library allocation
|
page read and write
|
||
8E2F97C000
|
stack
|
page read and write
|
||
C598FFE000
|
stack
|
page read and write
|
||
1BDF2362000
|
heap
|
page read and write
|
||
1BDF2802000
|
heap
|
page read and write
|
||
1BA12F10000
|
heap
|
page read and write
|
||
23760FE000
|
stack
|
page read and write
|
||
1BDF1839000
|
heap
|
page read and write
|
||
1BDF2395000
|
heap
|
page read and write
|
||
EDF000
|
stack
|
page read and write
|
||
8E2F57F000
|
stack
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
1C6CDA76000
|
heap
|
page read and write
|
||
3760000
|
heap
|
page read and write
|
||
1C1A7AD6000
|
heap
|
page read and write
|
||
1BDF2393000
|
heap
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
18D25E02000
|
trusted library allocation
|
page read and write
|
||
C20000
|
heap
|
page read and write
|
||
1BDF2387000
|
heap
|
page read and write
|
||
23766FC000
|
stack
|
page read and write
|
||
3D0000
|
trusted library allocation
|
page read and write
|
||
2E11000
|
heap
|
page read and write
|
||
4380000
|
trusted library allocation
|
page read and write
|
||
1BDF2382000
|
heap
|
page read and write
|
||
3220000
|
remote allocation
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
16CCA7E000
|
stack
|
page read and write
|
||
1BDF1913000
|
heap
|
page read and write
|
||
1BDF184C000
|
heap
|
page read and write
|
||
3CF0000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
1BDF23A9000
|
heap
|
page read and write
|
||
2F7A000
|
stack
|
page read and write
|
||
1BDF2372000
|
heap
|
page read and write
|
||
20301273000
|
heap
|
page read and write
|
||
5600000
|
trusted library allocation
|
page read and write
|
||
5500000
|
heap
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
1BDF2375000
|
heap
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
1BDF18DF000
|
heap
|
page read and write
|
||
F90C27A000
|
stack
|
page read and write
|
||
2DCA000
|
heap
|
page read and write
|
||
300000
|
unkown
|
page readonly
|
||
203011F3000
|
trusted library allocation
|
page read and write
|
||
27D0000
|
trusted library allocation
|
page read and write
|
||
1BDF2384000
|
heap
|
page read and write
|
||
207E7AB0000
|
heap
|
page read and write
|
||
147B6858000
|
heap
|
page read and write
|
||
203067E1000
|
trusted library allocation
|
page read and write
|
||
1BDF184E000
|
heap
|
page read and write
|
||
2DF6000
|
heap
|
page read and write
|
||
207E7C4D000
|
heap
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
1BDF23DC000
|
heap
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
1BDF2389000
|
heap
|
page read and write
|
||
1C1A7AF0000
|
heap
|
page read and write
|
||
20E30200000
|
heap
|
page read and write
|
||
E1E000
|
stack
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
D1E000
|
stack
|
page read and write
|
||
1C6CDB02000
|
heap
|
page read and write
|
||
147B6900000
|
heap
|
page read and write
|
||
207E7C4A000
|
heap
|
page read and write
|
||
1BDF2394000
|
heap
|
page read and write
|
||
1BE5C9A0000
|
trusted library allocation
|
page read and write
|
||
203068D0000
|
trusted library allocation
|
page read and write
|
||
147B6660000
|
heap
|
page read and write
|
||
4690000
|
trusted library allocation
|
page read and write
|
||
4380000
|
trusted library allocation
|
page read and write
|
||
1BDF239B000
|
heap
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
4380000
|
trusted library allocation
|
page read and write
|
||
5600000
|
trusted library allocation
|
page read and write
|
||
147B6800000
|
heap
|
page read and write
|
||
3CF000
|
stack
|
page read and write
|
||
207E7C4F000
|
heap
|
page read and write
|
||
1BDF237C000
|
heap
|
page read and write
|
||
1BDF23AC000
|
heap
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
20306A9F000
|
heap
|
page read and write
|
||
82E000
|
stack
|
page read and write
|
||
5F159FE000
|
stack
|
page read and write
|
||
F25000
|
heap
|
page read and write
|
||
1BDF2802000
|
heap
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
1BA13100000
|
heap
|
page read and write
|
||
1C1A7AD4000
|
heap
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
20306A9D000
|
heap
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
1BE5BD50000
|
heap
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
1BDF1889000
|
heap
|
page read and write
|
||
2030128C000
|
heap
|
page read and write
|
||
1BE5CC80000
|
trusted library allocation
|
page read and write
|
||
20301229000
|
heap
|
page read and write
|
||
4380000
|
trusted library allocation
|
page read and write
|
||
4380000
|
trusted library allocation
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
203066B0000
|
trusted library allocation
|
page read and write
|
||
A9C000
|
unkown
|
page read and write
|
||
1BDF23A7000
|
heap
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
1BA1304B000
|
heap
|
page read and write
|
||
33C7000
|
heap
|
page read and write
|
||
46A0000
|
trusted library allocation
|
page read and write
|
||
29173064000
|
heap
|
page read and write
|
||
323E2FB000
|
stack
|
page read and write
|
||
18D25459000
|
heap
|
page read and write
|
||
583E000
|
stack
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
6E9DB7E000
|
stack
|
page read and write
|
||
207E7AC0000
|
heap
|
page read and write
|
||
1BDF23CA000
|
heap
|
page read and write
|
||
1BDF2800000
|
heap
|
page read and write
|
||
1C1A7AD5000
|
heap
|
page read and write
|
||
1BE5BD2D000
|
heap
|
page read and write
|
||
DF0000
|
remote allocation
|
page read and write
|
||
203068B0000
|
trusted library allocation
|
page read and write
|
||
1BE5CC60000
|
trusted library allocation
|
page read and write
|
||
3DFF000
|
heap
|
page read and write
|
||
8D0000
|
heap
|
page read and write
|
||
F70000
|
direct allocation
|
page read and write
|
||
20E3025C000
|
heap
|
page read and write
|
||
207E7C13000
|
heap
|
page read and write
|
||
5600000
|
trusted library allocation
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
1BA1304C000
|
heap
|
page read and write
|
||
1BDF1908000
|
heap
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
207E7C51000
|
heap
|
page read and write
|
||
1BDF2382000
|
heap
|
page read and write
|
||
8E2F67C000
|
stack
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
4D4E000
|
stack
|
page read and write
|
||
20E309F0000
|
remote allocation
|
page read and write
|
||
4380000
|
trusted library allocation
|
page read and write
|
||
207E7C7A000
|
heap
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
F90C57B000
|
stack
|
page read and write
|
||
F30000
|
direct allocation
|
page execute and read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
3D3E000
|
stack
|
page read and write
|
||
1BDF2399000
|
heap
|
page read and write
|
||
16CCF78000
|
stack
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
310000
|
unkown
|
page read and write
|
||
1BE5CA10000
|
trusted library allocation
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
18D25486000
|
heap
|
page read and write
|
||
2600000
|
direct allocation
|
page execute and read and write
|
||
BE3000
|
unkown
|
page readonly
|
||
1BDF2316000
|
heap
|
page read and write
|
||
4D90000
|
trusted library allocation
|
page readonly
|
||
203066A0000
|
trusted library allocation
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
3BEA7FF000
|
stack
|
page read and write
|
||
1C6CDA57000
|
heap
|
page read and write
|
||
1C1A7D10000
|
heap
|
page read and write
|
||
1BDF2100000
|
remote allocation
|
page read and write
|
||
1BA1304F000
|
heap
|
page read and write
|
||
237637B000
|
stack
|
page read and write
|
||
20300FC0000
|
heap
|
page read and write
|
||
10CB000
|
heap
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
207E7C64000
|
heap
|
page read and write
|
||
3E2A000
|
trusted library allocation
|
page read and write
|
||
4EE0000
|
trusted library allocation
|
page read and write
|
||
20306AFB000
|
heap
|
page read and write
|
||
3D00000
|
trusted library allocation
|
page read and write
|
||
1B2F4600000
|
heap
|
page read and write
|
||
CBB000
|
stack
|
page read and write
|
||
370E000
|
stack
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
1BE5BCB0000
|
heap
|
page read and write
|
||
3BE9FDC000
|
stack
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
BDC000
|
unkown
|
page read and write
|
||
2FA0000
|
remote allocation
|
page read and write
|
||
5600000
|
trusted library allocation
|
page read and write
|
||
20301A15000
|
heap
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
20E30202000
|
heap
|
page read and write
|
||
32AB000
|
stack
|
page read and write
|
||
3E05000
|
heap
|
page read and write
|
||
543487B000
|
stack
|
page read and write
|
||
1B2F466C000
|
heap
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
1BDF2382000
|
heap
|
page read and write
|
||
20301302000
|
heap
|
page read and write
|
||
464D000
|
stack
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
67B000
|
stack
|
page read and write
|
||
20306AAC000
|
heap
|
page read and write
|
||
1C6CDA65000
|
heap
|
page read and write
|
||
B00000
|
heap
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
641F8FB000
|
stack
|
page read and write
|
||
207E7C74000
|
heap
|
page read and write
|
||
207E7C7B000
|
heap
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
3260000
|
remote allocation
|
page read and write
|
||
28B0000
|
heap
|
page read and write
|
||
1BE5BD2D000
|
heap
|
page read and write
|
||
2D30000
|
trusted library allocation
|
page read and write
|
||
1C1A7D15000
|
heap
|
page read and write
|
||
5600000
|
trusted library allocation
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
4E7F000
|
heap
|
page read and write
|
||
5600000
|
trusted library allocation
|
page read and write
|
||
1BDF2802000
|
heap
|
page read and write
|
||
543467B000
|
stack
|
page read and write
|
||
2650000
|
direct allocation
|
page read and write
|
||
1BDF1854000
|
heap
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
1BDF2395000
|
heap
|
page read and write
|
||
1BDF2375000
|
heap
|
page read and write
|
||
1BDF2373000
|
heap
|
page read and write
|
||
207E7C2A000
|
heap
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
20301302000
|
heap
|
page read and write
|
||
5501000
|
heap
|
page read and write
|
||
1BDF2372000
|
heap
|
page read and write
|
||
8F2000
|
heap
|
page read and write
|
||
1BE5BCB9000
|
heap
|
page read and write
|
||
2D60000
|
heap
|
page read and write
|
||
1BA13000000
|
heap
|
page read and write
|
||
5600000
|
trusted library allocation
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
7A0000
|
trusted library allocation
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
1BDF2373000
|
heap
|
page read and write
|
||
207E7C46000
|
heap
|
page read and write
|
||
8DA000
|
heap
|
page read and write
|
||
20306C30000
|
trusted library allocation
|
page read and write
|
||
1C1A7AB0000
|
heap
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
18D2544B000
|
heap
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
1BDF2395000
|
heap
|
page read and write
|
||
1C1A7AC6000
|
heap
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
4710000
|
heap
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
4380000
|
trusted library allocation
|
page read and write
|
||
18D25400000
|
heap
|
page read and write
|
||
C5993FF000
|
stack
|
page read and write
|
||
1C338402000
|
trusted library allocation
|
page read and write
|
||
1C337C9D000
|
heap
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
1BE5BCE0000
|
heap
|
page read and write
|
||
3548000
|
heap
|
page read and write
|
||
1C6CF530000
|
remote allocation
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
1B2F4F12000
|
heap
|
page read and write
|
||
5600000
|
trusted library allocation
|
page read and write
|
||
1BDF18C5000
|
heap
|
page read and write
|
||
1BDF283E000
|
heap
|
page read and write
|
||
468E000
|
stack
|
page read and write
|
||
4380000
|
trusted library allocation
|
page read and write
|
||
1C337C2A000
|
heap
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
1BDF2396000
|
heap
|
page read and write
|
||
3260000
|
remote allocation
|
page read and write
|
||
8DA000
|
heap
|
page read and write
|
||
1BDF1813000
|
heap
|
page read and write
|
||
3C1D000
|
stack
|
page read and write
|
||
29173102000
|
heap
|
page read and write
|
||
3CA0000
|
heap
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
54FF000
|
stack
|
page read and write
|
||
2DC0000
|
heap
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
1BDF23A0000
|
heap
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
AA3000
|
unkown
|
page readonly
|
||
53EE000
|
stack
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
1BDF1870000
|
heap
|
page read and write
|
||
1C6CDA58000
|
heap
|
page read and write
|
||
207E7C02000
|
heap
|
page read and write
|
||
1BE5BCB5000
|
heap
|
page read and write
|
||
EDF000
|
stack
|
page read and write
|
||
64200FD000
|
stack
|
page read and write
|
||
4380000
|
trusted library allocation
|
page read and write
|
||
20301B00000
|
heap
|
page read and write
|
||
1C1A7A30000
|
heap
|
page read and write
|
||
2FE0000
|
remote allocation
|
page read and write
|
||
6A5197E000
|
stack
|
page read and write
|
||
16CC8FE000
|
stack
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
3A90000
|
direct allocation
|
page execute and read and write
|
||
4380000
|
trusted library allocation
|
page read and write
|
||
4E00000
|
heap
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
1BDF1858000
|
heap
|
page read and write
|
||
1BDF1881000
|
heap
|
page read and write
|
||
3C00000
|
heap
|
page read and write
|
||
3220000
|
remote allocation
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
35D0000
|
direct allocation
|
page read and write
|
||
4D3000
|
unkown
|
page readonly
|
||
1BA1308A000
|
heap
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
1C6CDA3D000
|
heap
|
page read and write
|
||
1BDF2382000
|
heap
|
page read and write
|
||
2FA0000
|
remote allocation
|
page read and write
|
||
2E60000
|
remote allocation
|
page read and write
|
||
3C9C000
|
stack
|
page read and write
|
||
9B0000
|
heap
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
1BA12EB0000
|
heap
|
page read and write
|
||
4BA0000
|
heap
|
page read and write
|
||
2FE0000
|
remote allocation
|
page read and write
|
||
5434BFE000
|
stack
|
page read and write
|
||
38E000
|
stack
|
page read and write
|
||
1C337A10000
|
heap
|
page read and write
|
||
207E7C41000
|
heap
|
page read and write
|
||
203012F9000
|
heap
|
page read and write
|
||
4280000
|
heap
|
page read and write
|
||
1C6CDA48000
|
heap
|
page read and write
|
||
F20000
|
heap
|
page read and write
|
||
29173069000
|
heap
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
C2B000
|
heap
|
page read and write
|
||
2FFA000
|
stack
|
page read and write
|
||
12B0000
|
heap
|
page read and write
|
||
1BDF2375000
|
heap
|
page read and write
|
||
D314DFE000
|
stack
|
page read and write
|
||
20306920000
|
trusted library allocation
|
page read and write
|
||
2F0000
|
unkown
|
page readonly
|
||
207E7B20000
|
heap
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
147B6902000
|
heap
|
page read and write
|
||
203067E4000
|
trusted library allocation
|
page read and write
|
||
34B0000
|
heap
|
page read and write
|
||
23764F7000
|
stack
|
page read and write
|
||
AF0000
|
direct allocation
|
page execute and read and write
|
||
1C1A7AF2000
|
heap
|
page read and write
|
||
20301020000
|
heap
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
20E30240000
|
heap
|
page read and write
|
||
4710000
|
heap
|
page read and write
|
||
1BDF2803000
|
heap
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
1BA1302A000
|
heap
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
4380000
|
trusted library allocation
|
page read and write
|
||
1BA13802000
|
trusted library allocation
|
page read and write
|
||
18D25457000
|
heap
|
page read and write
|
||
4690000
|
trusted library allocation
|
page read and write
|
||
23765FE000
|
stack
|
page read and write
|
||
4CC000
|
unkown
|
page read and write
|
||
F60000
|
heap
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
4E8000
|
stack
|
page read and write
|
||
1BDF18EC000
|
heap
|
page read and write
|
||
203012A9000
|
heap
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
1C6CDA02000
|
heap
|
page read and write
|
||
29173013000
|
heap
|
page read and write
|
||
3424000
|
heap
|
page read and write
|
||
8D0000
|
heap
|
page read and write
|
||
1BDF239B000
|
heap
|
page read and write
|
||
3520000
|
trusted library allocation
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
207E7D02000
|
heap
|
page read and write
|
||
86F000
|
stack
|
page read and write
|
||
2FA0000
|
remote allocation
|
page read and write
|
||
4380000
|
trusted library allocation
|
page read and write
|
||
3426000
|
heap
|
page read and write
|
||
1BDF23AC000
|
heap
|
page read and write
|
||
F90BFF8000
|
stack
|
page read and write
|
||
641F97D000
|
stack
|
page read and write
|
||
207E7C47000
|
heap
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
29173002000
|
heap
|
page read and write
|
||
AA3000
|
unkown
|
page readonly
|
||
1C1A7AD2000
|
heap
|
page read and write
|
||
10F0000
|
direct allocation
|
page execute and read and write
|
||
1B2F4410000
|
heap
|
page read and write
|
||
1BE5CC90000
|
trusted library allocation
|
page read and write
|
||
D314AFE000
|
stack
|
page read and write
|
||
5501000
|
heap
|
page read and write
|
||
203012F9000
|
heap
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
1BE5C9B0000
|
trusted library allocation
|
page read and write
|
||
147B67C0000
|
trusted library allocation
|
page read and write
|
||
27E0000
|
heap
|
page read and write
|
||
1B2F4702000
|
heap
|
page read and write
|
||
3200000
|
heap
|
page read and write
|
||
63E000
|
stack
|
page read and write
|
||
8A0000
|
heap
|
page read and write
|
||
20306A40000
|
heap
|
page read and write
|
||
1C1A7AF4000
|
heap
|
page read and write
|
||
5600000
|
trusted library allocation
|
page read and write
|
||
9D0000
|
unkown
|
page readonly
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
2E9000
|
stack
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
207E7C75000
|
heap
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
16CD0FC000
|
stack
|
page read and write
|
||
3020000
|
heap
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
3260000
|
remote allocation
|
page read and write
|
||
3421000
|
heap
|
page read and write
|
||
2FA0000
|
remote allocation
|
page read and write
|
||
20306AE8000
|
heap
|
page read and write
|
||
1C337C99000
|
heap
|
page read and write
|
||
3420000
|
heap
|
page read and write
|
||
5600000
|
trusted library allocation
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
310000
|
unkown
|
page read and write
|
||
1BDF2399000
|
heap
|
page read and write
|
||
A9C000
|
unkown
|
page read and write
|
||
1C6CF602000
|
trusted library allocation
|
page read and write
|
||
9D0000
|
unkown
|
page readonly
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
1C337D13000
|
heap
|
page read and write
|
||
4380000
|
trusted library allocation
|
page read and write
|
||
16CC5AB000
|
stack
|
page read and write
|
||
2030128A000
|
heap
|
page read and write
|
||
1B2F4713000
|
heap
|
page read and write
|
||
203067C0000
|
trusted library allocation
|
page read and write
|
||
1B2F46CC000
|
heap
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
207E7C4E000
|
heap
|
page read and write
|
||
1BDF18F8000
|
heap
|
page read and write
|
||
20301A02000
|
heap
|
page read and write
|
||
1BDF2384000
|
heap
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
4714000
|
heap
|
page read and write
|
||
20306800000
|
trusted library allocation
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
3CA1000
|
heap
|
page read and write
|
||
29173075000
|
heap
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
AA3000
|
unkown
|
page readonly
|
||
1B2F4F00000
|
heap
|
page read and write
|
||
20E30A02000
|
trusted library allocation
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
1C6CDA00000
|
heap
|
page read and write
|
||
A1B000
|
heap
|
page read and write
|
||
1BDF2382000
|
heap
|
page read and write
|
||
8D0000
|
heap
|
page read and write
|
||
207E7C52000
|
heap
|
page read and write
|
||
1BDF23AA000
|
heap
|
page read and write
|
||
4380000
|
trusted library allocation
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
20306AF5000
|
heap
|
page read and write
|
||
5600000
|
trusted library allocation
|
page read and write
|
||
6E9D8FE000
|
stack
|
page read and write
|
||
90B000
|
heap
|
page read and write
|
||
323DE9C000
|
stack
|
page read and write
|
||
C5986AC000
|
stack
|
page read and write
|
||
4690000
|
trusted library allocation
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
207E7C6D000
|
heap
|
page read and write
|
||
1B2F4480000
|
heap
|
page read and write
|
||
107B000
|
stack
|
page read and write
|
||
16CCE7F000
|
stack
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
D314FFF000
|
stack
|
page read and write
|
||
20306AEF000
|
heap
|
page read and write
|
||
1C6CDB18000
|
heap
|
page read and write
|
||
1C1A7AF5000
|
heap
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
5600000
|
trusted library allocation
|
page read and write
|
||
1BA13070000
|
heap
|
page read and write
|
||
1BDF23A7000
|
heap
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
20306890000
|
trusted library allocation
|
page read and write
|
||
20E309F0000
|
remote allocation
|
page read and write
|
||
4380000
|
trusted library allocation
|
page read and write
|
||
3424000
|
heap
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
3CDF000
|
stack
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
33E5000
|
heap
|
page read and write
|
||
54349FB000
|
stack
|
page read and write
|
||
1C3379A0000
|
heap
|
page read and write
|
||
1C6CF530000
|
remote allocation
|
page read and write
|
||
18D25452000
|
heap
|
page read and write
|
||
3E01000
|
heap
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
1BDF236F000
|
heap
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
29173802000
|
trusted library allocation
|
page read and write
|
||
34E0000
|
trusted library allocation
|
page readonly
|
||
8E2F77C000
|
stack
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
1BDF2370000
|
heap
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
207E7C45000
|
heap
|
page read and write
|
||
1C6CF470000
|
trusted library allocation
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
3DA0000
|
trusted library allocation
|
page read and write
|
||
5F15A79000
|
stack
|
page read and write
|
||
C5991FF000
|
stack
|
page read and write
|
||
2E10000
|
heap
|
page read and write
|
||
147B6828000
|
heap
|
page read and write
|
||
90B000
|
heap
|
page read and write
|
||
20306A00000
|
heap
|
page read and write
|
||
1BDF2100000
|
remote allocation
|
page read and write
|
||
18D25330000
|
heap
|
page read and write
|
||
1BDF2384000
|
heap
|
page read and write
|
||
2D64000
|
heap
|
page read and write
|
||
4B7F000
|
heap
|
page read and write
|
||
7A0000
|
trusted library allocation
|
page read and write
|
||
3765000
|
heap
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
20301213000
|
heap
|
page read and write
|
||
1BDF23B6000
|
heap
|
page read and write
|
||
903000
|
heap
|
page read and write
|
||
20302601000
|
trusted library allocation
|
page read and write
|
||
5600000
|
trusted library allocation
|
page read and write
|
||
4E7F000
|
heap
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
5034000
|
trusted library allocation
|
page read and write
|
||
4B7F000
|
heap
|
page read and write
|
||
F90C47A000
|
stack
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
20306920000
|
remote allocation
|
page read and write
|
||
F00000
|
trusted library allocation
|
page read and write
|
||
20306A2B000
|
heap
|
page read and write
|
||
4380000
|
trusted library allocation
|
page read and write
|
||
8BE000
|
stack
|
page read and write
|
||
12B5000
|
heap
|
page read and write
|
||
20301307000
|
heap
|
page read and write
|
||
3418000
|
heap
|
page read and write
|
||
237617E000
|
stack
|
page read and write
|
||
4F00000
|
heap
|
page read and write
|
||
20E309C0000
|
trusted library allocation
|
page read and write
|
||
6A51B7C000
|
stack
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
950000
|
heap
|
page read and write
|
||
5501000
|
heap
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
1C337B10000
|
trusted library allocation
|
page read and write
|
||
20306A10000
|
heap
|
page read and write
|
||
468E000
|
stack
|
page read and write
|
||
641FEF7000
|
stack
|
page read and write
|
||
4714000
|
heap
|
page read and write
|
||
1BDF17D0000
|
trusted library allocation
|
page read and write
|
||
323EA7F000
|
stack
|
page read and write
|
||
1B2F4629000
|
heap
|
page read and write
|
||
5F1550C000
|
stack
|
page read and write
|
||
3D7F000
|
stack
|
page read and write
|
||
F30000
|
direct allocation
|
page execute and read and write
|
||
326A000
|
stack
|
page read and write
|
||
20301B18000
|
heap
|
page read and write
|
||
1BDF231E000
|
heap
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
23767FE000
|
stack
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
1BDF23CE000
|
heap
|
page read and write
|
||
F60000
|
heap
|
page read and write
|
||
641FDFB000
|
stack
|
page read and write
|
||
5501000
|
heap
|
page read and write
|
||
57BE000
|
stack
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
207E7C42000
|
heap
|
page read and write
|
||
20301256000
|
heap
|
page read and write
|
||
1BDF1857000
|
heap
|
page read and write
|
||
10F0000
|
direct allocation
|
page execute and read and write
|
||
1BDF18B2000
|
heap
|
page read and write
|
||
34C0000
|
trusted library allocation
|
page read and write
|
||
33B0000
|
trusted library allocation
|
page read and write
|
||
4380000
|
trusted library allocation
|
page read and write
|
||
1C1A7ADD000
|
heap
|
page read and write
|
||
1BDF1838000
|
heap
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
3B40000
|
direct allocation
|
page execute and read and write
|
||
1BDF2381000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
641FCFC000
|
stack
|
page read and write
|
||
8F2000
|
heap
|
page read and write
|
||
1BE5BC40000
|
heap
|
page read and write
|
||
1C1A7ADD000
|
heap
|
page read and write
|
||
2D64000
|
heap
|
page read and write
|
||
AF0000
|
direct allocation
|
page execute and read and write
|
||
16CC87F000
|
stack
|
page read and write
|
||
240000
|
heap
|
page read and write
|
||
207E7C53000
|
heap
|
page read and write
|
||
20E30302000
|
heap
|
page read and write
|
||
18D2544D000
|
heap
|
page read and write
|
||
1BDF23A0000
|
heap
|
page read and write
|
||
23763FE000
|
stack
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
5600000
|
trusted library allocation
|
page read and write
|
||
1BDF1916000
|
heap
|
page read and write
|
||
4B7F000
|
heap
|
page read and write
|
||
1BDF1884000
|
heap
|
page read and write
|
||
8DA000
|
heap
|
page read and write
|
||
1BDF236F000
|
heap
|
page read and write
|
||
980000
|
remote allocation
|
page read and write
|
||
3BEA5FF000
|
stack
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
1BE5BBD0000
|
heap
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
4CF000
|
unkown
|
page read and write
|
||
1BDF2300000
|
heap
|
page read and write
|
||
1BA1304A000
|
heap
|
page read and write
|
||
203068F0000
|
trusted library allocation
|
page read and write
|
||
1BA13049000
|
heap
|
page read and write
|
||
29172E20000
|
heap
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
29173000000
|
heap
|
page read and write
|
||
4B00000
|
heap
|
page read and write
|
||
1BDF2802000
|
heap
|
page read and write
|
||
18D2542A000
|
heap
|
page read and write
|
||
C598AFB000
|
stack
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
203067C0000
|
trusted library allocation
|
page read and write
|
||
29172E90000
|
heap
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
20300FB0000
|
heap
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
1C337C7E000
|
heap
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
5600000
|
trusted library allocation
|
page read and write
|
||
4380000
|
trusted library allocation
|
page read and write
|
||
1C337D02000
|
heap
|
page read and write
|
||
A49000
|
heap
|
page read and write
|
||
237607B000
|
stack
|
page read and write
|
||
F90C37E000
|
stack
|
page read and write
|
||
F90C97A000
|
stack
|
page read and write
|
||
2DBE000
|
stack
|
page read and write
|
||
1BDF239B000
|
heap
|
page read and write
|
||
5600000
|
trusted library allocation
|
page read and write
|
||
4380000
|
trusted library allocation
|
page read and write
|
||
4380000
|
trusted library allocation
|
page read and write
|
||
20306620000
|
trusted library allocation
|
page read and write
|
||
1BDF239A000
|
heap
|
page read and write
|
||
4714000
|
heap
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
1BDF23BC000
|
heap
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
8E2F37E000
|
stack
|
page read and write
|
||
16CCD77000
|
stack
|
page read and write
|
||
1BDF236F000
|
heap
|
page read and write
|
||
1BDF23BC000
|
heap
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
4DFD000
|
stack
|
page read and write
|
||
3340000
|
heap
|
page read and write
|
||
28B4000
|
heap
|
page read and write
|
||
1C337C63000
|
heap
|
page read and write
|
||
4380000
|
trusted library allocation
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
C598EFD000
|
stack
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
8BE000
|
stack
|
page read and write
|
||
1BDF236F000
|
heap
|
page read and write
|
||
5600000
|
trusted library allocation
|
page read and write
|
||
4380000
|
trusted library allocation
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
1BE5BBE0000
|
trusted library allocation
|
page read and write
|
||
1BDF2372000
|
heap
|
page read and write
|
||
86F000
|
stack
|
page read and write
|
||
1BDF23A0000
|
heap
|
page read and write
|
||
903000
|
heap
|
page read and write
|
||
3C0000
|
unkown
|
page read and write
|
||
20306900000
|
trusted library allocation
|
page read and write
|
||
468E000
|
stack
|
page read and write
|
||
1BDF18AA000
|
heap
|
page read and write
|
||
34D3000
|
heap
|
page read and write
|
||
5600000
|
trusted library allocation
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
1C1A7AC1000
|
heap
|
page read and write
|
||
5600000
|
trusted library allocation
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
641F9FE000
|
stack
|
page read and write
|
||
B00000
|
heap
|
page read and write
|
||
20301287000
|
heap
|
page read and write
|
||
1BDF2395000
|
heap
|
page read and write
|
||
4380000
|
trusted library allocation
|
page read and write
|
||
2D64000
|
heap
|
page read and write
|
||
33C7000
|
heap
|
page read and write
|
||
20306A56000
|
heap
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
323E87D000
|
stack
|
page read and write
|
||
207E7C49000
|
heap
|
page read and write
|
||
203067F0000
|
trusted library allocation
|
page read and write
|
||
310000
|
unkown
|
page read and write
|
||
1BA1304E000
|
heap
|
page read and write
|
||
18D252D0000
|
heap
|
page read and write
|
||
1BDF2397000
|
heap
|
page read and write
|
||
F70000
|
direct allocation
|
page read and write
|
||
147B66C0000
|
heap
|
page read and write
|
||
1C6CDB13000
|
heap
|
page read and write
|
||
1BDF1829000
|
heap
|
page read and write
|
||
1BDF183C000
|
heap
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
F90CB7F000
|
stack
|
page read and write
|
||
AF0000
|
direct allocation
|
page execute and read and write
|
||
207E8402000
|
trusted library allocation
|
page read and write
|
||
6A5187A000
|
stack
|
page read and write
|
||
25D0000
|
trusted library allocation
|
page read and write
|
||
5600000
|
trusted library allocation
|
page read and write
|
||
54346FD000
|
stack
|
page read and write
|
||
3E01000
|
heap
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
3CA1000
|
heap
|
page read and write
|
||
1C337C3C000
|
heap
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
207E7C83000
|
heap
|
page read and write
|
||
6E9DBFF000
|
stack
|
page read and write
|
||
3C7F000
|
heap
|
page read and write
|
||
1BDF2802000
|
heap
|
page read and write
|
||
1BDF23CD000
|
heap
|
page read and write
|
||
203021E0000
|
trusted library allocation
|
page read and write
|
||
1BDF237F000
|
heap
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
1BDF2395000
|
heap
|
page read and write
|
||
46A0000
|
remote allocation
|
page read and write
|
||
3000000
|
direct allocation
|
page execute and read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
6A51AFF000
|
stack
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
147B6840000
|
heap
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
1BDF1740000
|
heap
|
page read and write
|
||
1BDF2374000
|
heap
|
page read and write
|
||
1BDF2100000
|
remote allocation
|
page read and write
|
||
1BA13050000
|
heap
|
page read and write
|
||
480000
|
heap
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
147B6650000
|
heap
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
147B6813000
|
heap
|
page read and write
|
||
2630000
|
direct allocation
|
page execute and read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
1B2F4580000
|
trusted library allocation
|
page read and write
|
||
4380000
|
trusted library allocation
|
page read and write
|
||
33B0000
|
trusted library allocation
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
1C6CDA2A000
|
heap
|
page read and write
|
||
16CCB79000
|
stack
|
page read and write
|
||
67F000
|
stack
|
page read and write
|
||
B11000
|
unkown
|
page execute read
|
||
10F0000
|
direct allocation
|
page execute and read and write
|
||
9F0000
|
direct allocation
|
page execute and read and write
|
||
F00000
|
trusted library allocation
|
page read and write
|
||
3220000
|
remote allocation
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
29173077000
|
heap
|
page read and write
|
||
18D25360000
|
trusted library allocation
|
page read and write
|
||
20301B13000
|
heap
|
page read and write
|
||
1BDF18C0000
|
heap
|
page read and write
|
||
34F5000
|
heap
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
2F50000
|
heap
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
1BA13102000
|
heap
|
page read and write
|
||
1BA137B0000
|
trusted library allocation
|
page read and write
|
||
1B2F4688000
|
heap
|
page read and write
|
||
1BDF2820000
|
heap
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
20E30229000
|
heap
|
page read and write
|
||
20307000000
|
heap
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
1C1A7ABB000
|
heap
|
page read and write
|
||
4380000
|
trusted library allocation
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
1C6CD980000
|
heap
|
page read and write
|
||
1B2F463E000
|
heap
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
99D000
|
stack
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
4D0F000
|
stack
|
page read and write
|
||
903000
|
heap
|
page read and write
|
||
20306630000
|
trusted library allocation
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
1BDF2395000
|
heap
|
page read and write
|
||
203012A6000
|
heap
|
page read and write
|
||
641FFFF000
|
stack
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
9D1000
|
unkown
|
page execute read
|
||
20306A1F000
|
heap
|
page read and write
|
||
4B00000
|
heap
|
page read and write
|
||
5600000
|
trusted library allocation
|
page read and write
|
||
18D25455000
|
heap
|
page read and write
|
||
5F158F9000
|
stack
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
2FBC000
|
stack
|
page read and write
|
||
29173040000
|
heap
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
3D80000
|
heap
|
page read and write
|
||
1C337C2D000
|
heap
|
page read and write
|
||
4380000
|
trusted library allocation
|
page read and write
|
||
4380000
|
trusted library allocation
|
page read and write
|
||
20301277000
|
heap
|
page read and write
|
||
3BD0000
|
trusted library allocation
|
page read and write
|
||
29173113000
|
heap
|
page read and write
|
||
20E30213000
|
heap
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
54348FE000
|
stack
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
3C5F000
|
stack
|
page read and write
|
||
1C337D08000
|
heap
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
1BDF239B000
|
heap
|
page read and write
|
||
1BDF23AA000
|
heap
|
page read and write
|
||
5600000
|
trusted library allocation
|
page read and write
|
||
1BDF2372000
|
heap
|
page read and write
|
||
4380000
|
trusted library allocation
|
page read and write
|
||
1B2F4420000
|
heap
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
1BE5BEB0000
|
trusted library allocation
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
5600000
|
trusted library allocation
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
1C6CF4B0000
|
trusted library allocation
|
page read and write
|
||
4B7F000
|
heap
|
page read and write
|
||
33FA000
|
heap
|
page read and write
|
||
4EDE000
|
stack
|
page read and write
|
||
5600000
|
trusted library allocation
|
page read and write
|
||
C598BFE000
|
stack
|
page read and write
|
||
20306A4D000
|
heap
|
page read and write
|
||
3DFF000
|
heap
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
323E5FC000
|
stack
|
page read and write
|
||
1B2F46E4000
|
heap
|
page read and write
|
||
147B6913000
|
heap
|
page read and write
|
||
1BA13113000
|
heap
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
20306B00000
|
heap
|
page read and write
|
||
5F1597F000
|
stack
|
page read and write
|
||
207E7C39000
|
heap
|
page read and write
|
||
D314EFE000
|
stack
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
1BDF2318000
|
heap
|
page read and write
|
||
9D1000
|
unkown
|
page execute read
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
1B2F4E02000
|
heap
|
page read and write
|
||
1C337D00000
|
heap
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
29173029000
|
heap
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
1BA1303C000
|
heap
|
page read and write
|
||
33F0000
|
heap
|
page read and write
|
||
20301B04000
|
heap
|
page read and write
|
||
1C6CDA48000
|
heap
|
page read and write
|
||
6E9D7FC000
|
stack
|
page read and write
|
||
20E309F0000
|
remote allocation
|
page read and write
|
||
4380000
|
trusted library allocation
|
page read and write
|
||
203067CE000
|
trusted library allocation
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
34F0000
|
heap
|
page read and write
|
||
1C337C4F000
|
heap
|
page read and write
|
||
20301120000
|
trusted library allocation
|
page read and write
|
||
54BE000
|
stack
|
page read and write
|
||
1BDF2375000
|
heap
|
page read and write
|
||
3390000
|
heap
|
page read and write
|
||
2F3D000
|
stack
|
page read and write
|
||
1BDF2802000
|
heap
|
page read and write
|
||
207E7C3F000
|
heap
|
page read and write
|
||
1BDF2375000
|
heap
|
page read and write
|
||
C7B000
|
stack
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
207E7C6F000
|
heap
|
page read and write
|
||
3540000
|
heap
|
page read and write
|
||
1C337C6B000
|
heap
|
page read and write
|
||
20301B02000
|
heap
|
page read and write
|
||
2D64000
|
heap
|
page read and write
|
||
207E7C79000
|
heap
|
page read and write
|
||
5600000
|
trusted library allocation
|
page read and write
|
||
3C0000
|
heap
|
page read and write
|
||
F90C17A000
|
stack
|
page read and write
|
||
5600000
|
trusted library allocation
|
page read and write
|
||
2FA0000
|
remote allocation
|
page read and write
|
||
207E7C00000
|
heap
|
page read and write
|
||
6A518FE000
|
stack
|
page read and write
|
||
18D2547E000
|
heap
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
33E0000
|
heap
|
page read and write
|
||
1BDF235C000
|
heap
|
page read and write
|
||
1C1A7900000
|
heap
|
page read and write
|
||
4380000
|
trusted library allocation
|
page read and write
|
||
323E77B000
|
stack
|
page read and write
|
||
207E7C44000
|
heap
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
300000
|
unkown
|
page readonly
|
||
3DFF000
|
heap
|
page read and write
|
||
207E7C7D000
|
heap
|
page read and write
|
||
1C6CDA89000
|
heap
|
page read and write
|
||
1BA13052000
|
heap
|
page read and write
|
||
1BE5BCF1000
|
heap
|
page read and write
|
||
6A519F9000
|
stack
|
page read and write
|
||
1C6CD920000
|
heap
|
page read and write
|
||
1BDF23A9000
|
heap
|
page read and write
|
||
18D25450000
|
heap
|
page read and write
|
||
1BDF23CE000
|
heap
|
page read and write
|
||
4380000
|
trusted library allocation
|
page read and write
|
||
20306890000
|
trusted library allocation
|
page read and write
|
||
33C5000
|
heap
|
page read and write
|
||
980000
|
remote allocation
|
page read and write
|
||
1BA13080000
|
heap
|
page read and write
|
||
1C337C63000
|
heap
|
page read and write
|
||
4380000
|
trusted library allocation
|
page read and write
|
||
D314A7B000
|
stack
|
page read and write
|
||
5600000
|
trusted library allocation
|
page read and write
|
||
1BDF18A3000
|
heap
|
page read and write
|
||
8BE000
|
stack
|
page read and write
|
||
1C1A7ADF000
|
heap
|
page read and write
|
||
29172E30000
|
heap
|
page read and write
|
||
8E2ED9C000
|
stack
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
3310000
|
trusted library allocation
|
page read and write
|
||
1BDF2372000
|
heap
|
page read and write
|
||
1BDF235C000
|
heap
|
page read and write
|
||
2FCF000
|
stack
|
page read and write
|
||
4380000
|
trusted library allocation
|
page read and write
|
||
20306890000
|
trusted library allocation
|
page read and write
|
||
1C6CD9B0000
|
trusted library allocation
|
page read and write
|
||
9DE000
|
stack
|
page read and write
|
||
1C1A7ADF000
|
heap
|
page read and write
|
||
2ED0000
|
heap
|
page read and write
|
||
29173073000
|
heap
|
page read and write
|
||
5434CFF000
|
stack
|
page read and write
|
||
203067F0000
|
trusted library allocation
|
page read and write
|
||
95B000
|
stack
|
page read and write
|
||
464D000
|
stack
|
page read and write
|
||
1BDF1859000
|
heap
|
page read and write
|
||
7B8000
|
heap
|
page read and write
|
||
67B000
|
stack
|
page read and write
|
||
20306AA9000
|
heap
|
page read and write
|
||
C5990FE000
|
stack
|
page read and write
|
||
4380000
|
trusted library allocation
|
page read and write
|
||
638000
|
stack
|
page read and write
|
||
1BDF23B4000
|
heap
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
1C6CDA58000
|
heap
|
page read and write
|
||
A10000
|
heap
|
page read and write
|
||
1BDF184F000
|
heap
|
page read and write
|
||
1C6CDB00000
|
heap
|
page read and write
|
||
3569000
|
heap
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
6E9DCFD000
|
stack
|
page read and write
|
||
323E57F000
|
stack
|
page read and write
|
||
86F000
|
stack
|
page read and write
|
||
20E300C0000
|
heap
|
page read and write
|
||
2917305B000
|
heap
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
remote allocation
|
page read and write
|
||
1BDF236F000
|
heap
|
page read and write
|
||
90B000
|
heap
|
page read and write
|
||
1B2F46BB000
|
heap
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
1B2F46C3000
|
heap
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
82E000
|
stack
|
page read and write
|
||
207E7C4B000
|
heap
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
A9C000
|
unkown
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
4F1A000
|
trusted library allocation
|
page read and write
|
||
4380000
|
trusted library allocation
|
page read and write
|
||
1BDF2389000
|
heap
|
page read and write
|
||
8F2000
|
heap
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
20301200000
|
heap
|
page read and write
|
||
1BDF2393000
|
heap
|
page read and write
|
||
6E9D67B000
|
stack
|
page read and write
|
||
323E6FD000
|
stack
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
1BDF1856000
|
heap
|
page read and write
|
||
3BEA4FB000
|
stack
|
page read and write
|
||
4710000
|
heap
|
page read and write
|
||
18D25470000
|
heap
|
page read and write
|
||
1BDF2382000
|
heap
|
page read and write
|
||
147B6802000
|
heap
|
page read and write
|
||
34B7000
|
heap
|
page read and write
|
||
1BE5BD2D000
|
heap
|
page read and write
|
||
300000
|
unkown
|
page readonly
|
||
D314B7E000
|
stack
|
page read and write
|
||
53AC000
|
stack
|
page read and write
|
||
1BDF2382000
|
heap
|
page read and write
|
||
9D1000
|
unkown
|
page execute read
|
||
1BE5CC70000
|
heap
|
page readonly
|
||
2F0000
|
unkown
|
page readonly
|
||
2AD000
|
stack
|
page read and write
|
||
4380000
|
trusted library allocation
|
page read and write
|
||
20E30120000
|
heap
|
page read and write
|
||
147B7002000
|
trusted library allocation
|
page read and write
|
||
2FE0000
|
remote allocation
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
203011F0000
|
trusted library allocation
|
page read and write
|
||
2E60000
|
remote allocation
|
page read and write
|
||
82E000
|
stack
|
page read and write
|
||
587F000
|
stack
|
page read and write
|
||
323E97E000
|
stack
|
page read and write
|
||
5EC000
|
stack
|
page read and write
|
||
1BDF2384000
|
heap
|
page read and write
|
||
4E7F000
|
heap
|
page read and write
|
||
207E83C0000
|
trusted library allocation
|
page read and write
|
||
1C337C54000
|
heap
|
page read and write
|
||
1BDF2396000
|
heap
|
page read and write
|
||
1BA13108000
|
heap
|
page read and write
|
||
3E02000
|
heap
|
page read and write
|
||
543477E000
|
stack
|
page read and write
|
||
6A51A79000
|
stack
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
1BDF1902000
|
heap
|
page read and write
|
||
5378000
|
trusted library allocation
|
page read and write
|
||
4BA0000
|
heap
|
page read and write
|
||
1BDF2370000
|
heap
|
page read and write
|
||
4B00000
|
heap
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
5600000
|
trusted library allocation
|
page read and write
|
||
1BDF23B6000
|
heap
|
page read and write
|
||
638000
|
stack
|
page read and write
|
||
1BDF1730000
|
heap
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
18D2543C000
|
heap
|
page read and write
|
||
1BDF2382000
|
heap
|
page read and write
|
||
3220000
|
remote allocation
|
page read and write
|
||
4BA0000
|
heap
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
18D25508000
|
heap
|
page read and write
|
||
46A0000
|
remote allocation
|
page read and write
|
||
1080000
|
heap
|
page read and write
|
||
5600000
|
trusted library allocation
|
page read and write
|
||
207E7C40000
|
heap
|
page read and write
|
||
B00000
|
heap
|
page read and write
|
||
8E2F47F000
|
stack
|
page read and write
|
||
5600000
|
trusted library allocation
|
page read and write
|
||
1B2F4613000
|
heap
|
page read and write
|
||
1C337C13000
|
heap
|
page read and write
|
||
1C6CF530000
|
remote allocation
|
page read and write
|
||
1BDF237E000
|
heap
|
page read and write
|
||
237627B000
|
stack
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
33C0000
|
heap
|
page read and write
|
||
374F000
|
stack
|
page read and write
|
||
20306920000
|
remote allocation
|
page read and write
|
||
EDF000
|
stack
|
page read and write
|
||
5600000
|
trusted library allocation
|
page read and write
|
||
3750000
|
trusted library allocation
|
page read and write
|
||
2D64000
|
heap
|
page read and write
|
||
20306910000
|
trusted library allocation
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
18D2544F000
|
heap
|
page read and write
|
||
3220000
|
remote allocation
|
page read and write
|
||
2C00000
|
trusted library allocation
|
page read and write
|
||
207E7C69000
|
heap
|
page read and write
|
||
1BDF1800000
|
heap
|
page read and write
|
||
1BDF18E9000
|
heap
|
page read and write
|
||
1BDF1850000
|
heap
|
page read and write
|
||
20301290000
|
heap
|
page read and write
|
||
147B6864000
|
heap
|
page read and write
|
||
20306AE4000
|
heap
|
page read and write
|
||
4380000
|
trusted library allocation
|
page read and write
|
||
67B000
|
stack
|
page read and write
|
||
20301314000
|
heap
|
page read and write
|
||
1BDF239E000
|
heap
|
page read and write
|
||
4380000
|
trusted library allocation
|
page read and write
|
||
20302620000
|
trusted library allocation
|
page read and write
|
||
18D25513000
|
heap
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
2030123F000
|
heap
|
page read and write
|
||
464D000
|
stack
|
page read and write
|
||
2FA0000
|
remote allocation
|
page read and write
|
||
1BDF2802000
|
heap
|
page read and write
|
||
1BA13002000
|
heap
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
207E7C7E000
|
heap
|
page read and write
|
||
1C337C4A000
|
heap
|
page read and write
|
||
18D25458000
|
heap
|
page read and write
|
||
16CC9FC000
|
stack
|
page read and write
|
||
18D252C0000
|
heap
|
page read and write
|
||
2640000
|
heap
|
page read and write
|
||
3C0000
|
unkown
|
page read and write
|
||
1C1A7ADF000
|
heap
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
D314CFE000
|
stack
|
page read and write
|
||
203067C8000
|
trusted library allocation
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
1BE5BC60000
|
heap
|
page read and write
|
||
2F0000
|
unkown
|
page readonly
|
||
1BA13013000
|
heap
|
page read and write
|
||
4E81000
|
heap
|
page read and write
|
||
1C1A7ADD000
|
heap
|
page read and write
|
||
18D25500000
|
heap
|
page read and write
|
||
1BDF2387000
|
heap
|
page read and write
|
||
1C337C00000
|
heap
|
page read and write
|
||
4CCE000
|
stack
|
page read and write
|
||
5434AF7000
|
stack
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
147B6868000
|
heap
|
page read and write
|
||
2CAF000
|
heap
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
10A0000
|
heap
|
page read and write
|
||
20306B02000
|
heap
|
page read and write
|
||
147B6879000
|
heap
|
page read and write
|
||
638000
|
stack
|
page read and write
|
||
F60000
|
heap
|
page read and write
|
||
20306A62000
|
heap
|
page read and write
|
||
29172F90000
|
trusted library allocation
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
20301B18000
|
heap
|
page read and write
|
||
3BEA6FE000
|
stack
|
page read and write
|
||
2D64000
|
heap
|
page read and write
|
||
C598CFC000
|
stack
|
page read and write
|
There are 1269 hidden memdumps, click here to show them.