Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
graphic.vbs
|
ASCII text, with very long lines
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\A09278-2768-DE0743-A6FB64083C2\LogicoolTouchPad.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_LogicoolTouchPad_947d9cf2526790edff1959af95e3e22df417fa27_e28e5cbf_19bbec0b\Report.wer
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_LogicoolTouchPad_947d9cf2526790edff1959af95e3e22df417fa27_e28e5cbf_19d14f63\Report.wer
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3246.tmp.dmp
|
Mini DuMP crash report, 14 streams, Thu Jun 23 21:16:44 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4BBB.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB58A.tmp.dmp
|
Mini DuMP crash report, 14 streams, Thu Jun 23 21:15:06 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC598.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\wscript.exe
|
C:\Windows\System32\wscript.exe "C:\Users\user\Desktop\graphic.vbs"
|
||
C:\Users\user\AppData\Local\Temp\A09278-2768-DE0743-A6FB64083C2\LogicoolTouchPad.exe
|
C:\Users\user\AppData\Local\Temp\A09278-2768-DE0743-A6FB64083C2\LogicoolTouchPad.exe
|
||
C:\Users\user\AppData\Local\Temp\A09278-2768-DE0743-A6FB64083C2\LogicoolTouchPad.exe
|
C:\Users\user\AppData\Local\Temp\A09278-2768-DE0743-A6FB64083C2\LogicoolTouchPad.exe
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 6400 -s 800
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 6588 -s 772
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://idontgetitpodcast.com/
|
unknown
|
||
https://idontgetitpodcast.com/contacting/responsible.dae
|
104.244.73.88
|
||
http://www.borland.com/namespaces/Types-
|
unknown
|
||
http://www.borland.com/namespaces/Types
|
unknown
|
||
http://www.borland.com/namespaces/Typesh
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/Nhttp://www.borland.com/namespaces/Types
|
unknown
|
||
https://idontgetitpodcast.com/contacting/responsible.daem
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://www.borland.com/namespaces/TypesR
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
idontgetitpodcast.com
|
104.244.73.88
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.244.73.88
|
idontgetitpodcast.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
|
AmiHivePermissionsCorrect
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
|
AmiHiveOwnerCorrect
|
||
\REGISTRY\A\{4fd6a22e-beb3-7565-a770-171cb02bfbb2}\Root\InventoryApplicationFile\logicooltouchpad|743221e3
|
ProgramId
|
||
\REGISTRY\A\{4fd6a22e-beb3-7565-a770-171cb02bfbb2}\Root\InventoryApplicationFile\logicooltouchpad|743221e3
|
FileId
|
||
\REGISTRY\A\{4fd6a22e-beb3-7565-a770-171cb02bfbb2}\Root\InventoryApplicationFile\logicooltouchpad|743221e3
|
LowerCaseLongPath
|
||
\REGISTRY\A\{4fd6a22e-beb3-7565-a770-171cb02bfbb2}\Root\InventoryApplicationFile\logicooltouchpad|743221e3
|
LongPathHash
|
||
\REGISTRY\A\{4fd6a22e-beb3-7565-a770-171cb02bfbb2}\Root\InventoryApplicationFile\logicooltouchpad|743221e3
|
Name
|
||
\REGISTRY\A\{4fd6a22e-beb3-7565-a770-171cb02bfbb2}\Root\InventoryApplicationFile\logicooltouchpad|743221e3
|
Publisher
|
||
\REGISTRY\A\{4fd6a22e-beb3-7565-a770-171cb02bfbb2}\Root\InventoryApplicationFile\logicooltouchpad|743221e3
|
Version
|
||
\REGISTRY\A\{4fd6a22e-beb3-7565-a770-171cb02bfbb2}\Root\InventoryApplicationFile\logicooltouchpad|743221e3
|
BinFileVersion
|
||
\REGISTRY\A\{4fd6a22e-beb3-7565-a770-171cb02bfbb2}\Root\InventoryApplicationFile\logicooltouchpad|743221e3
|
BinaryType
|
||
\REGISTRY\A\{4fd6a22e-beb3-7565-a770-171cb02bfbb2}\Root\InventoryApplicationFile\logicooltouchpad|743221e3
|
ProductName
|
||
\REGISTRY\A\{4fd6a22e-beb3-7565-a770-171cb02bfbb2}\Root\InventoryApplicationFile\logicooltouchpad|743221e3
|
ProductVersion
|
||
\REGISTRY\A\{4fd6a22e-beb3-7565-a770-171cb02bfbb2}\Root\InventoryApplicationFile\logicooltouchpad|743221e3
|
LinkDate
|
||
\REGISTRY\A\{4fd6a22e-beb3-7565-a770-171cb02bfbb2}\Root\InventoryApplicationFile\logicooltouchpad|743221e3
|
BinProductVersion
|
||
\REGISTRY\A\{4fd6a22e-beb3-7565-a770-171cb02bfbb2}\Root\InventoryApplicationFile\logicooltouchpad|743221e3
|
Size
|
||
\REGISTRY\A\{4fd6a22e-beb3-7565-a770-171cb02bfbb2}\Root\InventoryApplicationFile\logicooltouchpad|743221e3
|
Language
|
||
\REGISTRY\A\{4fd6a22e-beb3-7565-a770-171cb02bfbb2}\Root\InventoryApplicationFile\logicooltouchpad|743221e3
|
IsPeFile
|
||
\REGISTRY\A\{4fd6a22e-beb3-7565-a770-171cb02bfbb2}\Root\InventoryApplicationFile\logicooltouchpad|743221e3
|
IsOsComponent
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
|
ExceptionRecord
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceTicket
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceId
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
ApplicationFlags
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
|
00184006417502B9
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
TickCount
|
There are 16 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2420000
|
direct allocation
|
page execute and read and write
|
||
24F0000
|
direct allocation
|
page execute and read and write
|
||
2420000
|
direct allocation
|
page execute and read and write
|
||
2420000
|
direct allocation
|
page execute and read and write
|
||
24F0000
|
direct allocation
|
page execute and read and write
|
||
24F0000
|
direct allocation
|
page execute and read and write
|
||
23F5E25A000
|
heap
|
page read and write
|
||
1D4A6150000
|
heap
|
page read and write
|
||
1CB1BE02000
|
heap
|
page read and write
|
||
98000
|
stack
|
page read and write
|
||
1D4A8BF9000
|
heap
|
page read and write
|
||
1D4A833B000
|
heap
|
page read and write
|
||
1D4A9030000
|
heap
|
page read and write
|
||
A0AF37E000
|
stack
|
page read and write
|
||
C9FC1FE000
|
stack
|
page read and write
|
||
1D4A617E000
|
heap
|
page read and write
|
||
2465CE74000
|
heap
|
page read and write
|
||
2465CF02000
|
heap
|
page read and write
|
||
1D4A9230000
|
heap
|
page read and write
|
||
C9FBEFF000
|
stack
|
page read and write
|
||
1D4A83AF000
|
heap
|
page read and write
|
||
876A27B000
|
stack
|
page read and write
|
||
2A80085A000
|
heap
|
page read and write
|
||
1B6D1E70000
|
trusted library allocation
|
page read and write
|
||
C9FC4FC000
|
stack
|
page read and write
|
||
2C6F000
|
stack
|
page read and write
|
||
25AE000
|
stack
|
page read and write
|
||
2566A249000
|
heap
|
page read and write
|
||
1D4A6137000
|
heap
|
page read and write
|
||
1CB1AE4D000
|
heap
|
page read and write
|
||
2566A010000
|
heap
|
page read and write
|
||
25112FB000
|
stack
|
page read and write
|
||
1E5AD102000
|
heap
|
page read and write
|
||
98000
|
stack
|
page read and write
|
||
19CD4A62000
|
heap
|
page read and write
|
||
1CB1ACD0000
|
heap
|
page read and write
|
||
896677E000
|
stack
|
page read and write
|
||
1B6CC813000
|
heap
|
page read and write
|
||
1B6D1FB0000
|
remote allocation
|
page read and write
|
||
1B6CD000000
|
heap
|
page read and write
|
||
1CFE6285000
|
heap
|
page read and write
|
||
1B6CC926000
|
heap
|
page read and write
|
||
19CD4A5B000
|
heap
|
page read and write
|
||
1D4A6170000
|
heap
|
page read and write
|
||
1D4A7EFA000
|
heap
|
page read and write
|
||
1D4A82CA000
|
heap
|
page read and write
|
||
1D4A83BF000
|
heap
|
page read and write
|
||
1B6CC8AD000
|
heap
|
page read and write
|
||
41F667F000
|
stack
|
page read and write
|
||
AFF000
|
stack
|
page read and write
|
||
2A80085F000
|
heap
|
page read and write
|
||
C9FC5FF000
|
stack
|
page read and write
|
||
1CB1B988000
|
heap
|
page read and write
|
||
1B6CC88E000
|
heap
|
page read and write
|
||
1D4A8180000
|
heap
|
page read and write
|
||
41F6A7C000
|
stack
|
page read and write
|
||
22A0000
|
direct allocation
|
page read and write
|
||
1CB1BE00000
|
heap
|
page read and write
|
||
1CB1B98C000
|
heap
|
page read and write
|
||
19F000
|
stack
|
page read and write
|
||
23F5E278000
|
heap
|
page read and write
|
||
1D4A838F000
|
heap
|
page read and write
|
||
28A48800000
|
heap
|
page read and write
|
||
1B6D2065000
|
heap
|
page read and write
|
||
256E000
|
stack
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
1D4A7F03000
|
heap
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
23F5E260000
|
heap
|
page read and write
|
||
1D4A839B000
|
heap
|
page read and write
|
||
1D4A6075000
|
heap
|
page read and write
|
||
2566A26F000
|
heap
|
page read and write
|
||
2A2F000
|
stack
|
page read and write
|
||
19CD4A66000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
1D4A90F6000
|
heap
|
page read and write
|
||
C067CAB000
|
stack
|
page read and write
|
||
1D4A7E01000
|
heap
|
page read and write
|
||
1D4A90B8000
|
heap
|
page read and write
|
||
794AB7B000
|
stack
|
page read and write
|
||
1CB1AD70000
|
trusted library allocation
|
page read and write
|
||
1CB1B98D000
|
heap
|
page read and write
|
||
1D4A836C000
|
heap
|
page read and write
|
||
1CC38490000
|
trusted library allocation
|
page read and write
|
||
1D73C825000
|
heap
|
page read and write
|
||
1D4A8DF0000
|
heap
|
page read and write
|
||
7B8000
|
heap
|
page read and write
|
||
2465CF00000
|
heap
|
page read and write
|
||
4D2000
|
unkown
|
page read and write
|
||
1D4A836C000
|
heap
|
page read and write
|
||
794B079000
|
stack
|
page read and write
|
||
1D4A8336000
|
heap
|
page read and write
|
||
1D4A839D000
|
heap
|
page read and write
|
||
A0AF2FE000
|
stack
|
page read and write
|
||
1CB1B992000
|
heap
|
page read and write
|
||
E4E07FE000
|
stack
|
page read and write
|
||
1CB1B97E000
|
heap
|
page read and write
|
||
1CB1B98E000
|
heap
|
page read and write
|
||
1D4A837B000
|
heap
|
page read and write
|
||
2465CE24000
|
heap
|
page read and write
|
||
1E5AD04C000
|
heap
|
page read and write
|
||
1CB1B98D000
|
heap
|
page read and write
|
||
1D4A837C000
|
heap
|
page read and write
|
||
23F5E200000
|
heap
|
page read and write
|
||
2397B86E000
|
heap
|
page read and write
|
||
2520000
|
heap
|
page read and write
|
||
837000
|
heap
|
page read and write
|
||
80A000
|
heap
|
page read and write
|
||
64E000
|
stack
|
page read and write
|
||
2465CE02000
|
heap
|
page read and write
|
||
17812FB000
|
stack
|
page read and write
|
||
1D4A8BF6000
|
heap
|
page read and write
|
||
1B6D20D8000
|
heap
|
page read and write
|
||
23F5E26E000
|
heap
|
page read and write
|
||
1CB1BE02000
|
heap
|
page read and write
|
||
2A800827000
|
heap
|
page read and write
|
||
1B6CC914000
|
heap
|
page read and write
|
||
1B6D1E80000
|
trusted library allocation
|
page read and write
|
||
2510BFA000
|
stack
|
page read and write
|
||
1D4A836E000
|
heap
|
page read and write
|
||
A1000
|
stack
|
page read and write
|
||
1CB1AF08000
|
heap
|
page read and write
|
||
2B2F000
|
stack
|
page read and write
|
||
23F5E232000
|
heap
|
page read and write
|
||
1B6CDCC0000
|
trusted library allocation
|
page read and write
|
||
1CB1AE3C000
|
heap
|
page read and write
|
||
2470000
|
direct allocation
|
page execute and read and write
|
||
1B6CCFF0000
|
trusted library allocation
|
page read and write
|
||
9FF000
|
stack
|
page read and write
|
||
1D4A807F000
|
heap
|
page read and write
|
||
1B6D202E000
|
heap
|
page read and write
|
||
23A0000
|
direct allocation
|
page execute and read and write
|
||
1B6D1E71000
|
trusted library allocation
|
page read and write
|
||
1CB1B9A1000
|
heap
|
page read and write
|
||
1CB1BE03000
|
heap
|
page read and write
|
||
2566A289000
|
heap
|
page read and write
|
||
1B6D1E50000
|
trusted library allocation
|
page read and write
|
||
1CB1B9A4000
|
heap
|
page read and write
|
||
1E5AD040000
|
heap
|
page read and write
|
||
8966677000
|
stack
|
page read and write
|
||
25109F8000
|
stack
|
page read and write
|
||
1CB1B986000
|
heap
|
page read and write
|
||
1D73C902000
|
heap
|
page read and write
|
||
40C000
|
unkown
|
page execute read
|
||
A0AF8FF000
|
stack
|
page read and write
|
||
1D4A82F1000
|
heap
|
page read and write
|
||
98000
|
stack
|
page read and write
|
||
1CFE6313000
|
heap
|
page read and write
|
||
1D4A6177000
|
heap
|
page read and write
|
||
7BE000
|
stack
|
page read and write
|
||
4D2000
|
unkown
|
page read and write
|
||
1B6D1F20000
|
trusted library allocation
|
page read and write
|
||
41F6C7C000
|
stack
|
page read and write
|
||
89664FB000
|
stack
|
page read and write
|
||
1CB1BE03000
|
heap
|
page read and write
|
||
23F5E256000
|
heap
|
page read and write
|
||
1B6D2087000
|
heap
|
page read and write
|
||
1D4A7EFE000
|
heap
|
page read and write
|
||
AFF000
|
stack
|
page read and write
|
||
794B0FF000
|
unkown
|
page read and write
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
E4E057C000
|
stack
|
page read and write
|
||
1B6D2020000
|
heap
|
page read and write
|
||
1D73C858000
|
heap
|
page read and write
|
||
1CB1B97E000
|
heap
|
page read and write
|
||
1D73C7D0000
|
trusted library allocation
|
page read and write
|
||
40C000
|
unkown
|
page execute read
|
||
1B6CD840000
|
trusted library allocation
|
page read and write
|
||
23F5E23A000
|
heap
|
page read and write
|
||
1CB1AEC1000
|
heap
|
page read and write
|
||
19CD4980000
|
heap
|
page read and write
|
||
1D4A90F9000
|
heap
|
page read and write
|
||
1B6D1CC0000
|
trusted library allocation
|
page read and write
|
||
1D4A83A3000
|
heap
|
page read and write
|
||
A0AF677000
|
stack
|
page read and write
|
||
1D4A8342000
|
heap
|
page read and write
|
||
2397B730000
|
heap
|
page read and write
|
||
1D4A613C000
|
heap
|
page read and write
|
||
A1000
|
stack
|
page read and write
|
||
2C50000
|
remote allocation
|
page read and write
|
||
1D4A8181000
|
heap
|
page read and write
|
||
876AA7F000
|
stack
|
page read and write
|
||
794A79E000
|
stack
|
page read and write
|
||
1D4A613C000
|
heap
|
page read and write
|
||
D9887FB000
|
stack
|
page read and write
|
||
7C5000
|
heap
|
page read and write
|
||
1D4A7EEB000
|
heap
|
page read and write
|
||
1CB1B99E000
|
heap
|
page read and write
|
||
1B6D1F40000
|
trusted library allocation
|
page read and write
|
||
89663FB000
|
stack
|
page read and write
|
||
AFF000
|
stack
|
page read and write
|
||
1B6D203F000
|
heap
|
page read and write
|
||
788000
|
heap
|
page read and write
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
1CB1B992000
|
heap
|
page read and write
|
||
1D4A83CA000
|
heap
|
page read and write
|
||
1D4A839C000
|
heap
|
page read and write
|
||
23F5E26C000
|
heap
|
page read and write
|
||
C06847E000
|
stack
|
page read and write
|
||
1D4A82C6000
|
heap
|
page read and write
|
||
1B6CD015000
|
heap
|
page read and write
|
||
1E5AEC02000
|
trusted library allocation
|
page read and write
|
||
1CC383D9000
|
heap
|
page read and write
|
||
98000
|
stack
|
page read and write
|
||
19CD4A20000
|
heap
|
page read and write
|
||
2465CE51000
|
heap
|
page read and write
|
||
1CB1BE02000
|
heap
|
page read and write
|
||
2C40000
|
unkown
|
page read and write
|
||
23D0000
|
heap
|
page read and write
|
||
C06827E000
|
stack
|
page read and write
|
||
1D4A817A000
|
heap
|
page read and write
|
||
1CB1B9C8000
|
heap
|
page read and write
|
||
1CC38515000
|
heap
|
page read and write
|
||
1D4A8355000
|
heap
|
page read and write
|
||
876AE7F000
|
stack
|
page read and write
|
||
1CB1B988000
|
heap
|
page read and write
|
||
25B3000
|
trusted library allocation
|
page read and write
|
||
23F5E258000
|
heap
|
page read and write
|
||
7C5000
|
heap
|
page read and write
|
||
4DC000
|
unkown
|
page readonly
|
||
1B6D1F60000
|
trusted library allocation
|
page read and write
|
||
1D4A6250000
|
heap
|
page read and write
|
||
23F5E213000
|
heap
|
page read and write
|
||
19CD4A65000
|
heap
|
page read and write
|
||
1B6D1F20000
|
trusted library allocation
|
page read and write
|
||
1CFE627B000
|
heap
|
page read and write
|
||
1D4A6175000
|
heap
|
page read and write
|
||
2A800800000
|
heap
|
page read and write
|
||
23F5E276000
|
heap
|
page read and write
|
||
AFF000
|
stack
|
page read and write
|
||
23E0000
|
direct allocation
|
page execute and read and write
|
||
600000
|
heap
|
page read and write
|
||
EF87F7B000
|
stack
|
page read and write
|
||
1CB1B9A0000
|
heap
|
page read and write
|
||
1CB1B97F000
|
heap
|
page read and write
|
||
23F5E27B000
|
heap
|
page read and write
|
||
24C0000
|
heap
|
page read and write
|
||
23F5E267000
|
heap
|
page read and write
|
||
1CC383BF000
|
heap
|
page read and write
|
||
1E5AD074000
|
heap
|
page read and write
|
||
876AC7F000
|
stack
|
page read and write
|
||
1D4A817B000
|
heap
|
page read and write
|
||
1CC383BF000
|
heap
|
page read and write
|
||
1D4A8000000
|
heap
|
page read and write
|
||
1CB1B984000
|
heap
|
page read and write
|
||
1E5AEB00000
|
trusted library allocation
|
page read and write
|
||
80A000
|
heap
|
page read and write
|
||
1CB1B97C000
|
heap
|
page read and write
|
||
4DC000
|
unkown
|
page readonly
|
||
1CC38480000
|
trusted library allocation
|
page read and write
|
||
1CB1B97F000
|
heap
|
page read and write
|
||
1CB1B9B9000
|
heap
|
page read and write
|
||
876A87D000
|
stack
|
page read and write
|
||
7F0000
|
trusted library allocation
|
page read and write
|
||
1E5AEB80000
|
remote allocation
|
page read and write
|
||
23F5E265000
|
heap
|
page read and write
|
||
837000
|
heap
|
page read and write
|
||
1CB1BE20000
|
heap
|
page read and write
|
||
2465CE80000
|
heap
|
page read and write
|
||
2566A070000
|
heap
|
page read and write
|
||
1D4A83BF000
|
heap
|
page read and write
|
||
28A48902000
|
heap
|
page read and write
|
||
1CB1B978000
|
heap
|
page read and write
|
||
2370000
|
direct allocation
|
page read and write
|
||
19CD4A51000
|
heap
|
page read and write
|
||
896697E000
|
stack
|
page read and write
|
||
19CD4A5B000
|
heap
|
page read and write
|
||
1CB1B97F000
|
heap
|
page read and write
|
||
1CFE6229000
|
heap
|
page read and write
|
||
1B6CC640000
|
heap
|
page read and write
|
||
17813FF000
|
stack
|
page read and write
|
||
1CB1B986000
|
heap
|
page read and write
|
||
1CB1B966000
|
heap
|
page read and write
|
||
7B8000
|
heap
|
page read and write
|
||
1CB1AEED000
|
heap
|
page read and write
|
||
1CB1AE4E000
|
heap
|
page read and write
|
||
1B6CC8FE000
|
heap
|
page read and write
|
||
23F5EA02000
|
trusted library allocation
|
page read and write
|
||
19F000
|
stack
|
page read and write
|
||
1CC392C0000
|
trusted library allocation
|
page read and write
|
||
41F609C000
|
stack
|
page read and write
|
||
1D4A606D000
|
heap
|
page read and write
|
||
1D4A7F04000
|
heap
|
page read and write
|
||
2A800864000
|
heap
|
page read and write
|
||
2AFF000
|
stack
|
page read and write
|
||
1CB1B974000
|
heap
|
page read and write
|
||
23F5E25F000
|
heap
|
page read and write
|
||
AE1CFF000
|
stack
|
page read and write
|
||
1CB1B990000
|
heap
|
page read and write
|
||
1B6D20F0000
|
heap
|
page read and write
|
||
1D4A6136000
|
heap
|
page read and write
|
||
89662FD000
|
stack
|
page read and write
|
||
876AB7E000
|
stack
|
page read and write
|
||
1CB1AF02000
|
heap
|
page read and write
|
||
8BE000
|
stack
|
page read and write
|
||
C9FBFFE000
|
stack
|
page read and write
|
||
25B3000
|
heap
|
page read and write
|
||
1D4A8181000
|
heap
|
page read and write
|
||
1CB1B9BA000
|
heap
|
page read and write
|
||
23F5E241000
|
heap
|
page read and write
|
||
2C50000
|
remote allocation
|
page read and write
|
||
1CB1B989000
|
heap
|
page read and write
|
||
1B6CC875000
|
heap
|
page read and write
|
||
7AC000
|
heap
|
page read and write
|
||
1CC39010000
|
trusted library allocation
|
page read and write
|
||
2A8006A0000
|
heap
|
page read and write
|
||
23F5E0E0000
|
heap
|
page read and write
|
||
8B3DAFF000
|
stack
|
page read and write
|
||
24D0000
|
direct allocation
|
page execute and read and write
|
||
28A48829000
|
heap
|
page read and write
|
||
2397C202000
|
heap
|
page read and write
|
||
1CB1B9B4000
|
heap
|
page read and write
|
||
23F5E263000
|
heap
|
page read and write
|
||
2A2F000
|
stack
|
page read and write
|
||
1CB1B98C000
|
heap
|
page read and write
|
||
4D2000
|
unkown
|
page read and write
|
||
28A48802000
|
heap
|
page read and write
|
||
8B3D8FC000
|
stack
|
page read and write
|
||
30000
|
unkown
|
page read and write
|
||
1CB1B991000
|
heap
|
page read and write
|
||
1CC39270000
|
trusted library allocation
|
page read and write
|
||
1D4A6078000
|
heap
|
page read and write
|
||
23F5E22C000
|
heap
|
page read and write
|
||
23F5E268000
|
heap
|
page read and write
|
||
1B6D1E80000
|
trusted library allocation
|
page read and write
|
||
2A800900000
|
heap
|
page read and write
|
||
1CB1ADE0000
|
remote allocation
|
page read and write
|
||
2397B902000
|
heap
|
page read and write
|
||
E4E05FC000
|
stack
|
page read and write
|
||
23F5E264000
|
heap
|
page read and write
|
||
1CB1B9A5000
|
heap
|
page read and write
|
||
1D4A8531000
|
heap
|
page read and write
|
||
600000
|
heap
|
page read and write
|
||
876A57F000
|
stack
|
page read and write
|
||
4DC000
|
unkown
|
page readonly
|
||
2463000
|
trusted library allocation
|
page read and write
|
||
2370000
|
direct allocation
|
page read and write
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
1CB1AE00000
|
heap
|
page read and write
|
||
77E000
|
stack
|
page read and write
|
||
630000
|
heap
|
page read and write
|
||
1B6D20FC000
|
heap
|
page read and write
|
||
1D73C660000
|
heap
|
page read and write
|
||
28A48760000
|
remote allocation
|
page read and write
|
||
1CB1B981000
|
heap
|
page read and write
|
||
1D4A83F9000
|
heap
|
page read and write
|
||
1CB1B981000
|
heap
|
page read and write
|
||
2465CE00000
|
heap
|
page read and write
|
||
29FF000
|
stack
|
page read and write
|
||
1D4A8349000
|
heap
|
page read and write
|
||
61E000
|
stack
|
page read and write
|
||
1D4A8EF0000
|
heap
|
page read and write
|
||
23D0000
|
heap
|
page read and write
|
||
1D4A6177000
|
heap
|
page read and write
|
||
1D4A7E00000
|
heap
|
page read and write
|
||
C067D2E000
|
stack
|
page read and write
|
||
1CFE6A02000
|
trusted library allocation
|
page read and write
|
||
19F000
|
stack
|
page read and write
|
||
1E5AD000000
|
heap
|
page read and write
|
||
1CFE6308000
|
heap
|
page read and write
|
||
1D4A839D000
|
heap
|
page read and write
|
||
1CB1B978000
|
heap
|
page read and write
|
||
1CC39250000
|
heap
|
page readonly
|
||
23F5E27E000
|
heap
|
page read and write
|
||
1D4A8001000
|
heap
|
page read and write
|
||
E4E097D000
|
stack
|
page read and write
|
||
1B6D2000000
|
heap
|
page read and write
|
||
1CB1AD40000
|
heap
|
page read and write
|
||
1B6CD118000
|
heap
|
page read and write
|
||
8B3DBFF000
|
stack
|
page read and write
|
||
1D4A7EEA000
|
heap
|
page read and write
|
||
2397B800000
|
heap
|
page read and write
|
||
77E000
|
stack
|
page read and write
|
||
23F5E240000
|
heap
|
page read and write
|
||
1CB1B979000
|
heap
|
page read and write
|
||
1CB1B988000
|
heap
|
page read and write
|
||
1CB1B978000
|
heap
|
page read and write
|
||
2397B8E8000
|
heap
|
page read and write
|
||
876A67D000
|
stack
|
page read and write
|
||
2397B885000
|
heap
|
page read and write
|
||
AE19DA000
|
stack
|
page read and write
|
||
2C6F000
|
stack
|
page read and write
|
||
1CB1B989000
|
heap
|
page read and write
|
||
1B6D2058000
|
heap
|
page read and write
|
||
1E5AD013000
|
heap
|
page read and write
|
||
1D4A6079000
|
heap
|
page read and write
|
||
28A48813000
|
heap
|
page read and write
|
||
1B6CC650000
|
heap
|
page read and write
|
||
2566A308000
|
heap
|
page read and write
|
||
1CC382F0000
|
heap
|
page read and write
|
||
1E5AD05C000
|
heap
|
page read and write
|
||
1B6D1F80000
|
trusted library allocation
|
page read and write
|
||
19CD4A46000
|
heap
|
page read and write
|
||
1B6CC893000
|
heap
|
page read and write
|
||
2566A213000
|
heap
|
page read and write
|
||
19CD4A5B000
|
heap
|
page read and write
|
||
1D4A8EF7000
|
heap
|
page read and write
|
||
1CB1B9B8000
|
heap
|
page read and write
|
||
2A801002000
|
trusted library allocation
|
page read and write
|
||
1CB1AE49000
|
heap
|
page read and write
|
||
23F5E255000
|
heap
|
page read and write
|
||
EF87E7E000
|
stack
|
page read and write
|
||
1D4A6137000
|
heap
|
page read and write
|
||
2500000
|
remote allocation
|
page read and write
|
||
19CD4A51000
|
heap
|
page read and write
|
||
1CB1B98F000
|
heap
|
page read and write
|
||
1D4A8BFE000
|
heap
|
page read and write
|
||
28A48730000
|
trusted library allocation
|
page read and write
|
||
1CB1AEA9000
|
heap
|
page read and write
|
||
1CB1B98E000
|
heap
|
page read and write
|
||
1CB1AE52000
|
heap
|
page read and write
|
||
1D73C854000
|
heap
|
page read and write
|
||
2465CCD0000
|
heap
|
page read and write
|
||
1CB1B9A6000
|
heap
|
page read and write
|
||
1CFE6300000
|
heap
|
page read and write
|
||
1CB1B981000
|
heap
|
page read and write
|
||
1D4A613C000
|
heap
|
page read and write
|
||
2A800902000
|
heap
|
page read and write
|
||
19CD49F0000
|
heap
|
page read and write
|
||
1B6D1FB0000
|
remote allocation
|
page read and write
|
||
1CB1AE29000
|
heap
|
page read and write
|
||
1CC39260000
|
trusted library allocation
|
page read and write
|
||
1D4A82C7000
|
heap
|
page read and write
|
||
AFF000
|
stack
|
page read and write
|
||
8B3DC7C000
|
stack
|
page read and write
|
||
2397B83E000
|
heap
|
page read and write
|
||
1D4A7ED2000
|
heap
|
page read and write
|
||
1E5AEA70000
|
trusted library allocation
|
page read and write
|
||
25B0000
|
trusted library allocation
|
page read and write
|
||
1CB1BE02000
|
heap
|
page read and write
|
||
1CFE624B000
|
heap
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
1CB1B9B8000
|
heap
|
page read and write
|
||
1B6CD002000
|
heap
|
page read and write
|
||
A0AF6FF000
|
stack
|
page read and write
|
||
1D4A839D000
|
heap
|
page read and write
|
||
19F000
|
stack
|
page read and write
|
||
E4E009B000
|
stack
|
page read and write
|
||
1D4A9072000
|
heap
|
page read and write
|
||
2566A300000
|
heap
|
page read and write
|
||
1D4A834D000
|
heap
|
page read and write
|
||
1CB1BE02000
|
heap
|
page read and write
|
||
1D4A7EEB000
|
heap
|
page read and write
|
||
4DC000
|
unkown
|
page readonly
|
||
1CC383E3000
|
heap
|
page read and write
|
||
2B2F000
|
stack
|
page read and write
|
||
1CC38520000
|
trusted library allocation
|
page read and write
|
||
1E5AD02A000
|
heap
|
page read and write
|
||
2400000
|
direct allocation
|
page execute and read and write
|
||
24A0000
|
direct allocation
|
page execute and read and write
|
||
1CB1B920000
|
heap
|
page read and write
|
||
24F0000
|
unkown
|
page read and write
|
||
1D4A8201000
|
heap
|
page read and write
|
||
2397B888000
|
heap
|
page read and write
|
||
2A80083C000
|
heap
|
page read and write
|
||
1B6CC902000
|
heap
|
page read and write
|
||
1B6CC83D000
|
heap
|
page read and write
|
||
1E5ACFD0000
|
heap
|
page read and write
|
||
7BE000
|
stack
|
page read and write
|
||
1D4A8323000
|
heap
|
page read and write
|
||
23E0000
|
direct allocation
|
page execute and read and write
|
||
876A47B000
|
stack
|
page read and write
|
||
2465CE3C000
|
heap
|
page read and write
|
||
1CB1B98D000
|
heap
|
page read and write
|
||
1E5AEB80000
|
remote allocation
|
page read and write
|
||
2C40000
|
unkown
|
page read and write
|
||
1E5AD113000
|
heap
|
page read and write
|
||
1E5AD049000
|
heap
|
page read and write
|
||
25B0000
|
trusted library allocation
|
page read and write
|
||
1CB1AE54000
|
heap
|
page read and write
|
||
1CC383BF000
|
heap
|
page read and write
|
||
2463000
|
trusted library allocation
|
page read and write
|
||
1D4A6200000
|
remote allocation
|
page read and write
|
||
8B3DD7D000
|
stack
|
page read and write
|
||
1CB1AEE1000
|
heap
|
page read and write
|
||
1D4A8EF4000
|
heap
|
page read and write
|
||
2470000
|
direct allocation
|
page execute and read and write
|
||
1CB1B986000
|
heap
|
page read and write
|
||
2C3F000
|
stack
|
page read and write
|
||
A0AF57B000
|
stack
|
page read and write
|
||
1B6CD104000
|
heap
|
page read and write
|
||
1D4A8FEE000
|
heap
|
page read and write
|
||
1D4A83BF000
|
heap
|
page read and write
|
||
1CB1B990000
|
heap
|
page read and write
|
||
1D4A8C1C000
|
heap
|
page read and write
|
||
1CFE6200000
|
heap
|
page read and write
|
||
1D4A817A000
|
heap
|
page read and write
|
||
1780EDB000
|
stack
|
page read and write
|
||
C9FC2FF000
|
stack
|
page read and write
|
||
630000
|
heap
|
page read and write
|
||
1D4A8C00000
|
heap
|
page read and write
|
||
1B6CC907000
|
heap
|
page read and write
|
||
1CB1AE27000
|
heap
|
page read and write
|
||
1D4A7EFD000
|
heap
|
page read and write
|
||
1D4A8BFD000
|
heap
|
page read and write
|
||
1CB1BE02000
|
heap
|
page read and write
|
||
2C3F000
|
stack
|
page read and write
|
||
1CB1B9B0000
|
heap
|
page read and write
|
||
1D4A90FA000
|
heap
|
page read and write
|
||
1CB1B802000
|
heap
|
page read and write
|
||
2397B913000
|
heap
|
page read and write
|
||
19CD4A64000
|
heap
|
page read and write
|
||
1CB1B9A7000
|
heap
|
page read and write
|
||
2A2F000
|
stack
|
page read and write
|
||
9FE000
|
stack
|
page read and write
|
||
1CB1AE56000
|
heap
|
page read and write
|
||
2465CCC0000
|
heap
|
page read and write
|
||
2AFF000
|
stack
|
page read and write
|
||
2360000
|
heap
|
page read and write
|
||
1D73C841000
|
heap
|
page read and write
|
||
24A0000
|
direct allocation
|
page execute and read and write
|
||
1D4A6058000
|
heap
|
page read and write
|
||
1CB1AE4F000
|
heap
|
page read and write
|
||
1CB1B97D000
|
heap
|
page read and write
|
||
1D73C802000
|
heap
|
page read and write
|
||
9FE000
|
stack
|
page read and write
|
||
1CB1B997000
|
heap
|
page read and write
|
||
2566A313000
|
heap
|
page read and write
|
||
1D73C670000
|
heap
|
page read and write
|
||
25B3000
|
trusted library allocation
|
page read and write
|
||
1D4A9072000
|
heap
|
page read and write
|
||
1CB1B986000
|
heap
|
page read and write
|
||
1D4A8EFB000
|
heap
|
page read and write
|
||
2A800878000
|
heap
|
page read and write
|
||
1CC39240000
|
trusted library allocation
|
page read and write
|
||
1D4A6172000
|
heap
|
page read and write
|
||
1CB1B995000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
794AD77000
|
stack
|
page read and write
|
||
23F5E25C000
|
heap
|
page read and write
|
||
1CB1BE02000
|
heap
|
page read and write
|
||
1E5ACF60000
|
heap
|
page read and write
|
||
876AD7F000
|
stack
|
page read and write
|
||
1E5AD068000
|
heap
|
page read and write
|
||
1B6CD100000
|
heap
|
page read and write
|
||
1D73D002000
|
trusted library allocation
|
page read and write
|
||
1E5AD024000
|
heap
|
page read and write
|
||
1CC383DE000
|
heap
|
page read and write
|
||
23A0000
|
direct allocation
|
page execute and read and write
|
||
73F000
|
stack
|
page read and write
|
||
1CB1B986000
|
heap
|
page read and write
|
||
24D0000
|
direct allocation
|
page execute and read and write
|
||
1D4A8389000
|
heap
|
page read and write
|
||
29FF000
|
stack
|
page read and write
|
||
8BE000
|
stack
|
page read and write
|
||
1CB1B9B0000
|
heap
|
page read and write
|
||
2460000
|
trusted library allocation
|
page read and write
|
||
24D0000
|
direct allocation
|
page execute and read and write
|
||
1D4A83A3000
|
heap
|
page read and write
|
||
C06837E000
|
stack
|
page read and write
|
||
D9886FE000
|
stack
|
page read and write
|
||
23F5E249000
|
heap
|
page read and write
|
||
1D4A8C01000
|
heap
|
page read and write
|
||
C9FC3FC000
|
stack
|
page read and write
|
||
19CD4A36000
|
heap
|
page read and write
|
||
1D4A6082000
|
heap
|
page read and write
|
||
2397C33A000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
1CFE624D000
|
heap
|
page read and write
|
||
2A800908000
|
heap
|
page read and write
|
||
1CB1B992000
|
heap
|
page read and write
|
||
1CB1AEC8000
|
heap
|
page read and write
|
||
24C0000
|
heap
|
page read and write
|
||
1CB1B989000
|
heap
|
page read and write
|
||
1CB1B992000
|
heap
|
page read and write
|
||
8B3D4DC000
|
stack
|
page read and write
|
||
19CD4A31000
|
heap
|
page read and write
|
||
1CC383B7000
|
heap
|
page read and write
|
||
1B6D1F70000
|
trusted library allocation
|
page read and write
|
||
1E5AD05C000
|
heap
|
page read and write
|
||
2510AF9000
|
stack
|
page read and write
|
||
1CB1B9AE000
|
heap
|
page read and write
|
||
19CD4A36000
|
heap
|
page read and write
|
||
2510CFE000
|
stack
|
page read and write
|
||
896657E000
|
stack
|
page read and write
|
||
9FF000
|
stack
|
page read and write
|
||
841000
|
heap
|
page read and write
|
||
1CB1B9B7000
|
heap
|
page read and write
|
||
8965F9B000
|
stack
|
page read and write
|
||
1E5AD059000
|
heap
|
page read and write
|
||
1CFE61D0000
|
trusted library allocation
|
page read and write
|
||
4D2000
|
unkown
|
page read and write
|
||
1CB1B9A9000
|
heap
|
page read and write
|
||
1D4A82CA000
|
heap
|
page read and write
|
||
1E5AEA90000
|
trusted library allocation
|
page read and write
|
||
1D4A83FB000
|
heap
|
page read and write
|
||
1CB1AEFB000
|
heap
|
page read and write
|
||
1D4A8186000
|
heap
|
page read and write
|
||
1D4A613C000
|
heap
|
page read and write
|
||
24EE000
|
stack
|
page read and write
|
||
7B8000
|
heap
|
page read and write
|
||
AE1E7E000
|
stack
|
page read and write
|
||
1D4A83CE000
|
heap
|
page read and write
|
||
23F5E259000
|
heap
|
page read and write
|
||
1B6CC89E000
|
heap
|
page read and write
|
||
1CB1B98D000
|
heap
|
page read and write
|
||
30000
|
unkown
|
page read and write
|
||
41F677F000
|
stack
|
page read and write
|
||
C9FBBC9000
|
stack
|
page read and write
|
||
24F0000
|
unkown
|
page read and write
|
||
1D4A5F70000
|
heap
|
page read and write
|
||
600000
|
heap
|
page read and write
|
||
1D4A837B000
|
heap
|
page read and write
|
||
7CB000
|
heap
|
page read and write
|
||
24EE000
|
stack
|
page read and write
|
||
2A800851000
|
heap
|
page read and write
|
||
1CB1B992000
|
heap
|
page read and write
|
||
837000
|
heap
|
page read and write
|
||
1B6D1D40000
|
trusted library allocation
|
page read and write
|
||
1CB1B98D000
|
heap
|
page read and write
|
||
24AE000
|
stack
|
page read and write
|
||
1B6CC877000
|
heap
|
page read and write
|
||
24EE000
|
stack
|
page read and write
|
||
A1000
|
stack
|
page read and write
|
||
1CB1B9B7000
|
heap
|
page read and write
|
||
2C3F000
|
stack
|
page read and write
|
||
28A485D0000
|
heap
|
page read and write
|
||
2520000
|
heap
|
page read and write
|
||
2B3E000
|
stack
|
page read and write
|
||
1D73C6D0000
|
heap
|
page read and write
|
||
1D4A8377000
|
heap
|
page read and write
|
||
1CFE623C000
|
heap
|
page read and write
|
||
1D4A837B000
|
heap
|
page read and write
|
||
7F0000
|
trusted library allocation
|
page read and write
|
||
1D4A8C0C000
|
heap
|
page read and write
|
||
23F5E252000
|
heap
|
page read and write
|
||
1D4A6050000
|
heap
|
page read and write
|
||
2A800878000
|
heap
|
page read and write
|
||
2B3E000
|
stack
|
page read and write
|
||
1B6D1F90000
|
trusted library allocation
|
page read and write
|
||
1CB1B99D000
|
heap
|
page read and write
|
||
2400000
|
direct allocation
|
page execute and read and write
|
||
1CFE6070000
|
heap
|
page read and write
|
||
23F5E1E0000
|
trusted library allocation
|
page read and write
|
||
794AF7F000
|
stack
|
page read and write
|
||
1B6CC8A9000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
1CB1AF16000
|
heap
|
page read and write
|
||
2397B790000
|
heap
|
page read and write
|
||
AE1DFE000
|
stack
|
page read and write
|
||
770000
|
trusted library allocation
|
page read and write
|
||
1D4A6068000
|
heap
|
page read and write
|
||
A1000
|
stack
|
page read and write
|
||
1D4A8BF0000
|
heap
|
page read and write
|
||
1CB1B992000
|
heap
|
page read and write
|
||
1CB1B9A4000
|
heap
|
page read and write
|
||
C06817E000
|
stack
|
page read and write
|
||
1D4A7EDA000
|
heap
|
page read and write
|
||
1B6D20C6000
|
heap
|
page read and write
|
||
7AC000
|
heap
|
page read and write
|
||
770000
|
trusted library allocation
|
page read and write
|
||
1D4A7EE1000
|
heap
|
page read and write
|
||
1CB1AF13000
|
heap
|
page read and write
|
||
1B6D20AF000
|
heap
|
page read and write
|
||
1D4A90F6000
|
heap
|
page read and write
|
||
19CD4A51000
|
heap
|
page read and write
|
||
40C000
|
unkown
|
page execute read
|
||
1CB1B94D000
|
heap
|
page read and write
|
||
1B6CC902000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
1D4A8339000
|
heap
|
page read and write
|
||
1D4A9072000
|
heap
|
page read and write
|
||
1CB1B990000
|
heap
|
page read and write
|
||
1B6CC829000
|
heap
|
page read and write
|
||
2465CE79000
|
heap
|
page read and write
|
||
4DC000
|
unkown
|
page readonly
|
||
8B3DDFB000
|
stack
|
page read and write
|
||
24AE000
|
stack
|
page read and write
|
||
8B3E1FE000
|
stack
|
page read and write
|
||
EF87FFE000
|
stack
|
page read and write
|
||
1D4A617A000
|
heap
|
page read and write
|
||
1D73C813000
|
heap
|
page read and write
|
||
1D4A82DB000
|
heap
|
page read and write
|
||
25AE000
|
stack
|
page read and write
|
||
1CB1B963000
|
heap
|
page read and write
|
||
1CB1B953000
|
heap
|
page read and write
|
||
1D4A834B000
|
heap
|
page read and write
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
1D4A8385000
|
heap
|
page read and write
|
||
1B6CCFE3000
|
trusted library allocation
|
page read and write
|
||
AE1C7F000
|
stack
|
page read and write
|
||
1B6D20FC000
|
heap
|
page read and write
|
||
1E5AEB80000
|
remote allocation
|
page read and write
|
||
1B6D1D30000
|
trusted library allocation
|
page read and write
|
||
1E5AEAC0000
|
trusted library allocation
|
page read and write
|
||
794AA7E000
|
stack
|
page read and write
|
||
1D4A8C00000
|
heap
|
page read and write
|
||
1CB1AEB3000
|
heap
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
1CB1B98D000
|
heap
|
page read and write
|
||
1CB1BE19000
|
heap
|
page read and write
|
||
2400000
|
direct allocation
|
page execute and read and write
|
||
1CB1B99F000
|
heap
|
page read and write
|
||
1D4A8345000
|
heap
|
page read and write
|
||
1B6D1E90000
|
trusted library allocation
|
page read and write
|
||
1D4A608E000
|
heap
|
page read and write
|
||
1D4A6077000
|
heap
|
page read and write
|
||
1E5ACF70000
|
heap
|
page read and write
|
||
1B6D1F20000
|
trusted library allocation
|
page read and write
|
||
74F000
|
stack
|
page read and write
|
||
1B6D20DF000
|
heap
|
page read and write
|
||
19F000
|
stack
|
page read and write
|
||
1B6CC6B0000
|
heap
|
page read and write
|
||
2397B813000
|
heap
|
page read and write
|
||
1D4A90F6000
|
heap
|
page read and write
|
||
1B6D22A0000
|
trusted library allocation
|
page read and write
|
||
1CB1B900000
|
heap
|
page read and write
|
||
1D73C83E000
|
heap
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
2B6E000
|
stack
|
page read and write
|
||
1D4A83CB000
|
heap
|
page read and write
|
||
1D4A8384000
|
heap
|
page read and write
|
||
1CFE6253000
|
heap
|
page read and write
|
||
1CB1B9B9000
|
heap
|
page read and write
|
||
4D7000
|
unkown
|
page write copy
|
||
794A71B000
|
stack
|
page read and write
|
||
1CB1BE02000
|
heap
|
page read and write
|
||
9FE000
|
stack
|
page read and write
|
||
28A49002000
|
trusted library allocation
|
page read and write
|
||
1CB1B98D000
|
heap
|
page read and write
|
||
1CB1B98C000
|
heap
|
page read and write
|
||
1D4A83C7000
|
heap
|
page read and write
|
||
1D4A82F0000
|
heap
|
page read and write
|
||
2566A229000
|
heap
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
19CD4A42000
|
heap
|
page read and write
|
||
40C000
|
unkown
|
page execute read
|
||
1CB1B978000
|
heap
|
page read and write
|
||
23F5E261000
|
heap
|
page read and write
|
||
1CFE6227000
|
heap
|
page read and write
|
||
1D4A8342000
|
heap
|
page read and write
|
||
40C000
|
unkown
|
page execute read
|
||
1CB1B978000
|
heap
|
page read and write
|
||
2465CE71000
|
heap
|
page read and write
|
||
23E0000
|
direct allocation
|
page execute and read and write
|
||
1B6D20C8000
|
heap
|
page read and write
|
||
1CB1AEA9000
|
heap
|
page read and write
|
||
1D4A817E000
|
heap
|
page read and write
|
||
2A800FB0000
|
trusted library allocation
|
page read and write
|
||
2A80085D000
|
heap
|
page read and write
|
||
61E000
|
stack
|
page read and write
|
||
2566A24A000
|
heap
|
page read and write
|
||
1D4A82DB000
|
heap
|
page read and write
|
||
1D4A6145000
|
heap
|
page read and write
|
||
EF87B3B000
|
stack
|
page read and write
|
||
2397B8E2000
|
heap
|
page read and write
|
||
1D4A8DF1000
|
heap
|
page read and write
|
||
1CFE6270000
|
heap
|
page read and write
|
||
4DC000
|
unkown
|
page readonly
|
||
1CB1B9A8000
|
heap
|
page read and write
|
||
1E5AD04C000
|
heap
|
page read and write
|
||
1CB1AE71000
|
heap
|
page read and write
|
||
1D4A83A3000
|
heap
|
page read and write
|
||
256E000
|
stack
|
page read and write
|
||
29FF000
|
stack
|
page read and write
|
||
1D4A6135000
|
heap
|
page read and write
|
||
4D7000
|
unkown
|
page write copy
|
||
80A000
|
heap
|
page read and write
|
||
1D4A9231000
|
heap
|
page read and write
|
||
1D73C913000
|
heap
|
page read and write
|
||
98000
|
stack
|
page read and write
|
||
1B6CC870000
|
heap
|
page read and write
|
||
2566A24B000
|
heap
|
page read and write
|
||
41F697E000
|
stack
|
page read and write
|
||
1CB1B97F000
|
heap
|
page read and write
|
||
8B3DFFF000
|
stack
|
page read and write
|
||
2C6F000
|
stack
|
page read and write
|
||
2566A200000
|
heap
|
page read and write
|
||
1D4A7F05000
|
heap
|
page read and write
|
||
EF880FB000
|
stack
|
page read and write
|
||
1B6D2015000
|
heap
|
page read and write
|
||
1CC38310000
|
heap
|
page read and write
|
||
1CFE6213000
|
heap
|
page read and write
|
||
770000
|
trusted library allocation
|
page read and write
|
||
23F5E080000
|
heap
|
page read and write
|
||
23F5E262000
|
heap
|
page read and write
|
||
1B6CC8AD000
|
heap
|
page read and write
|
||
23F5E27C000
|
heap
|
page read and write
|
||
1D4A8200000
|
heap
|
page read and write
|
||
1D4A8530000
|
heap
|
page read and write
|
||
41F687F000
|
stack
|
page read and write
|
||
22A0000
|
direct allocation
|
page read and write
|
||
1D4A833E000
|
heap
|
page read and write
|
||
1CC381B0000
|
heap
|
page read and write
|
||
1D4A83A3000
|
heap
|
page read and write
|
||
1D4A614D000
|
heap
|
page read and write
|
||
AE1EF8000
|
stack
|
page read and write
|
||
1D4A8BFC000
|
heap
|
page read and write
|
||
1CC38510000
|
heap
|
page read and write
|
||
1B6D1E94000
|
trusted library allocation
|
page read and write
|
||
2A800913000
|
heap
|
page read and write
|
||
1B6CD113000
|
heap
|
page read and write
|
||
1CB1B916000
|
heap
|
page read and write
|
||
1CB1B997000
|
heap
|
page read and write
|
||
1D4A61E0000
|
heap
|
page read and write
|
||
1B6D1FB0000
|
remote allocation
|
page read and write
|
||
1D4A613E000
|
heap
|
page read and write
|
||
1D4A8378000
|
heap
|
page read and write
|
||
1CB1AE13000
|
heap
|
page read and write
|
||
1CFE6060000
|
heap
|
page read and write
|
||
1B6CC87A000
|
heap
|
page read and write
|
||
2566A302000
|
heap
|
page read and write
|
||
1CB1B979000
|
heap
|
page read and write
|
||
2465CD30000
|
heap
|
page read and write
|
||
1D73C82A000
|
heap
|
page read and write
|
||
61E000
|
stack
|
page read and write
|
||
28A4885C000
|
heap
|
page read and write
|
||
2397B8C5000
|
heap
|
page read and write
|
||
28A48630000
|
heap
|
page read and write
|
||
D9888FE000
|
stack
|
page read and write
|
||
24A0000
|
direct allocation
|
page execute and read and write
|
||
1B6CC8FE000
|
heap
|
page read and write
|
||
1D4A613C000
|
heap
|
page read and write
|
||
9BF000
|
stack
|
page read and write
|
||
1CB1B997000
|
heap
|
page read and write
|
||
2566AA02000
|
trusted library allocation
|
page read and write
|
||
28A48760000
|
remote allocation
|
page read and write
|
||
1CB1B9A3000
|
heap
|
page read and write
|
||
1781379000
|
stack
|
page read and write
|
||
2B2F000
|
stack
|
page read and write
|
||
1B6CC859000
|
heap
|
page read and write
|
||
1B6D20FA000
|
heap
|
page read and write
|
||
1B6D1FA0000
|
trusted library allocation
|
page read and write
|
||
1D4A83BF000
|
heap
|
page read and write
|
||
1CB1B9B9000
|
heap
|
page read and write
|
||
1CB1B99A000
|
heap
|
page read and write
|
||
1CB1B982000
|
heap
|
page read and write
|
||
7BE000
|
stack
|
page read and write
|
||
1D4A839D000
|
heap
|
page read and write
|
||
1E5AD002000
|
heap
|
page read and write
|
||
1D4A83C2000
|
heap
|
page read and write
|
||
794AC77000
|
stack
|
page read and write
|
||
2B3E000
|
stack
|
page read and write
|
||
1B6D22C0000
|
trusted library allocation
|
page read and write
|
||
788000
|
heap
|
page read and write
|
||
1CB1B989000
|
heap
|
page read and write
|
||
7C5000
|
heap
|
page read and write
|
||
1CB1B98A000
|
heap
|
page read and write
|
||
256E000
|
stack
|
page read and write
|
||
1CB1AE51000
|
heap
|
page read and write
|
||
7F0000
|
trusted library allocation
|
page read and write
|
||
1E5AD08D000
|
heap
|
page read and write
|
||
1CB1AE57000
|
heap
|
page read and write
|
||
1D4A7EF3000
|
heap
|
page read and write
|
||
1D73C879000
|
heap
|
page read and write
|
||
23D0000
|
heap
|
page read and write
|
||
EF882FE000
|
stack
|
page read and write
|
||
1CB1ADE0000
|
remote allocation
|
page read and write
|
||
2397B829000
|
heap
|
page read and write
|
||
1CFE6302000
|
heap
|
page read and write
|
||
24C0000
|
heap
|
page read and write
|
||
A0AF47C000
|
stack
|
page read and write
|
||
2465D802000
|
trusted library allocation
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
1CB1ADE0000
|
remote allocation
|
page read and write
|
||
2566A170000
|
trusted library allocation
|
page read and write
|
||
1D4A83CD000
|
heap
|
page read and write
|
||
A1000
|
stack
|
page read and write
|
||
841000
|
heap
|
page read and write
|
||
1CC38370000
|
heap
|
page read and write
|
||
1D4A5E30000
|
heap
|
page read and write
|
||
1D4A8EEE000
|
heap
|
page read and write
|
||
2397B7C0000
|
trusted library allocation
|
page read and write
|
||
1D73C85B000
|
heap
|
page read and write
|
||
1B6D1E5E000
|
trusted library allocation
|
page read and write
|
||
7AC000
|
heap
|
page read and write
|
||
896687C000
|
stack
|
page read and write
|
||
23F5E285000
|
heap
|
page read and write
|
||
1B6D204C000
|
heap
|
page read and write
|
||
4D2000
|
unkown
|
page write copy
|
||
1D4A6255000
|
heap
|
page read and write
|
||
23F5E257000
|
heap
|
page read and write
|
||
1CB1B98C000
|
heap
|
page read and write
|
||
2500000
|
remote allocation
|
page read and write
|
||
1D4A817C000
|
heap
|
page read and write
|
||
1D4A6136000
|
heap
|
page read and write
|
||
1CB1B974000
|
heap
|
page read and write
|
||
1CB1B98D000
|
heap
|
page read and write
|
||
23F5E070000
|
heap
|
page read and write
|
||
1D4A6200000
|
remote allocation
|
page read and write
|
||
2520000
|
heap
|
page read and write
|
||
1B6CC800000
|
heap
|
page read and write
|
||
1CB1B97D000
|
heap
|
page read and write
|
||
1D4A85D7000
|
heap
|
page read and write
|
||
40C000
|
unkown
|
page execute read
|
||
1CB1B996000
|
heap
|
page read and write
|
||
1D4A83BF000
|
heap
|
page read and write
|
||
28A48760000
|
remote allocation
|
page read and write
|
||
2397C312000
|
heap
|
page read and write
|
||
4DC000
|
unkown
|
page readonly
|
||
23F5E242000
|
heap
|
page read and write
|
||
1CC383E3000
|
heap
|
page read and write
|
||
8BE000
|
stack
|
page read and write
|
||
28A48840000
|
heap
|
page read and write
|
||
1CB1B98D000
|
heap
|
page read and write
|
||
4D2000
|
unkown
|
page read and write
|
||
25B0000
|
heap
|
page read and write
|
||
23F5E302000
|
heap
|
page read and write
|
||
2566A000000
|
heap
|
page read and write
|
||
2510DFC000
|
stack
|
page read and write
|
||
1CC38519000
|
heap
|
page read and write
|
||
2465CF13000
|
heap
|
page read and write
|
||
794000
|
heap
|
page read and write
|
||
1D4A834B000
|
heap
|
page read and write
|
||
1CB1B991000
|
heap
|
page read and write
|
||
C067DAE000
|
stack
|
page read and write
|
||
AE1D79000
|
stack
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
2397B866000
|
heap
|
page read and write
|
||
1E5AD118000
|
heap
|
page read and write
|
||
1CB1B981000
|
heap
|
page read and write
|
||
1CB1B9CE000
|
heap
|
page read and write
|
||
E4E047E000
|
stack
|
page read and write
|
||
2A800813000
|
heap
|
page read and write
|
||
EF881F7000
|
stack
|
page read and write
|
||
2566A24F000
|
heap
|
page read and write
|
||
2A800829000
|
heap
|
page read and write
|
||
64E000
|
stack
|
page read and write
|
||
1B6D1E58000
|
trusted library allocation
|
page read and write
|
||
1D4A9031000
|
heap
|
page read and write
|
||
23F5E275000
|
heap
|
page read and write
|
||
1D4A83A3000
|
heap
|
page read and write
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
2460000
|
heap
|
page read and write
|
||
2566A290000
|
heap
|
page read and write
|
||
2A800884000
|
heap
|
page read and write
|
||
1CB1B994000
|
heap
|
page read and write
|
||
EF883FF000
|
stack
|
page read and write
|
||
1D4A893A000
|
heap
|
page read and write
|
||
1D4A6200000
|
remote allocation
|
page read and write
|
||
19F000
|
stack
|
page read and write
|
||
2B6E000
|
stack
|
page read and write
|
||
2465CE13000
|
heap
|
page read and write
|
||
A0AF7FF000
|
stack
|
page read and write
|
||
1CB1B98D000
|
heap
|
page read and write
|
||
2397C300000
|
heap
|
page read and write
|
||
1B6D3000000
|
heap
|
page read and write
|
||
1D4A83D7000
|
heap
|
page read and write
|
||
1D4A7EC6000
|
heap
|
page read and write
|
||
1B6CD102000
|
heap
|
page read and write
|
||
1B6D1E74000
|
trusted library allocation
|
page read and write
|
||
2566A24E000
|
heap
|
page read and write
|
||
1CB1AE4A000
|
heap
|
page read and write
|
||
1D4A83A3000
|
heap
|
page read and write
|
||
2397B720000
|
heap
|
page read and write
|
||
1CB1B981000
|
heap
|
page read and write
|
||
1D4A8377000
|
heap
|
page read and write
|
||
25114FE000
|
stack
|
page read and write
|
||
1CB1B98D000
|
heap
|
page read and write
|
||
7CB000
|
heap
|
page read and write
|
||
1D4A6173000
|
heap
|
page read and write
|
||
1CFE6250000
|
heap
|
page read and write
|
||
2A800710000
|
heap
|
page read and write
|
||
1CB1B9AE000
|
heap
|
page read and write
|
||
1CC381C0000
|
trusted library allocation
|
page read and write
|
||
2460000
|
trusted library allocation
|
page read and write
|
||
19CD4960000
|
heap
|
page read and write
|
||
2465CE21000
|
heap
|
page read and write
|
||
1CC383C1000
|
heap
|
page read and write
|
||
1D4A837F000
|
heap
|
page read and write
|
||
1D4A83BF000
|
heap
|
page read and write
|
||
19CD4A44000
|
heap
|
page read and write
|
||
4DC000
|
unkown
|
page readonly
|
||
77E000
|
stack
|
page read and write
|
||
1D4A834B000
|
heap
|
page read and write
|
||
794000
|
heap
|
page read and write
|
||
25AE000
|
stack
|
page read and write
|
||
64E000
|
stack
|
page read and write
|
||
1CB1B99A000
|
heap
|
page read and write
|
||
9BF000
|
stack
|
page read and write
|
||
30000
|
unkown
|
page read and write
|
||
9BF000
|
stack
|
page read and write
|
||
2510EFB000
|
stack
|
page read and write
|
||
2A8006B0000
|
heap
|
page read and write
|
||
1D4A7EEA000
|
heap
|
page read and write
|
||
794B1FC000
|
stack
|
page read and write
|
||
8B3E0FC000
|
stack
|
page read and write
|
||
23A0000
|
direct allocation
|
page execute and read and write
|
||
2AFF000
|
stack
|
page read and write
|
||
1D4A617A000
|
heap
|
page read and write
|
||
2360000
|
heap
|
page read and write
|
||
D9885FB000
|
stack
|
page read and write
|
||
1CB1AE8B000
|
heap
|
page read and write
|
||
2465CD60000
|
trusted library allocation
|
page read and write
|
||
1D4A617A000
|
heap
|
page read and write
|
||
23F5E23C000
|
heap
|
page read and write
|
||
EF87BBE000
|
stack
|
page read and write
|
||
1CB1B978000
|
heap
|
page read and write
|
||
1D73C800000
|
heap
|
page read and write
|
||
1CB1ACE0000
|
heap
|
page read and write
|
||
794AE78000
|
stack
|
page read and write
|
||
2A80087A000
|
heap
|
page read and write
|
||
23F5E26A000
|
heap
|
page read and write
|
||
1B6CD118000
|
heap
|
page read and write
|
||
788000
|
heap
|
page read and write
|
||
1CFE6249000
|
heap
|
page read and write
|
||
1781479000
|
stack
|
page read and write
|
||
2470000
|
direct allocation
|
page execute and read and write
|
||
9FF000
|
stack
|
page read and write
|
||
19CD4A5F000
|
heap
|
page read and write
|
||
1B6CC7B0000
|
trusted library allocation
|
page read and write
|
||
D9880FB000
|
stack
|
page read and write
|
||
1CB1B97C000
|
heap
|
page read and write
|
||
1B6CCFE0000
|
trusted library allocation
|
page read and write
|
||
1B6D20AC000
|
heap
|
page read and write
|
||
794000
|
heap
|
page read and write
|
||
1D4A5F90000
|
heap
|
page read and write
|
||
1D4A8184000
|
heap
|
page read and write
|
||
19CD49F5000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
1D4A6135000
|
heap
|
page read and write
|
||
251059C000
|
stack
|
page read and write
|
||
1D4A83FC000
|
heap
|
page read and write
|
||
73F000
|
stack
|
page read and write
|
||
1CB1B9A0000
|
heap
|
page read and write
|
||
1B6D1E50000
|
trusted library allocation
|
page read and write
|
||
1D4A617B000
|
heap
|
page read and write
|
||
876A97D000
|
stack
|
page read and write
|
||
73F000
|
stack
|
page read and write
|
||
2566A251000
|
heap
|
page read and write
|
||
1D4A9430000
|
heap
|
page read and write
|
||
28A485C0000
|
heap
|
page read and write
|
||
19CD4A60000
|
heap
|
page read and write
|
||
1D4A7F00000
|
heap
|
page read and write
|
||
A0AF27C000
|
stack
|
page read and write
|
||
1CB1AEEA000
|
heap
|
page read and write
|
||
A1000
|
stack
|
page read and write
|
||
1CB1AE4C000
|
heap
|
page read and write
|
||
E4E087F000
|
stack
|
page read and write
|
||
23F5E229000
|
heap
|
page read and write
|
||
1CFE60D0000
|
heap
|
page read and write
|
||
2566A252000
|
heap
|
page read and write
|
||
1D4A6174000
|
heap
|
page read and write
|
||
1D4A83FE000
|
heap
|
page read and write
|
||
74F000
|
stack
|
page read and write
|
||
1D4A8323000
|
heap
|
page read and write
|
||
2360000
|
heap
|
page read and write
|
||
630000
|
heap
|
page read and write
|
||
1D4A8EFA000
|
heap
|
page read and write
|
||
19CD4830000
|
heap
|
page read and write
|
||
1CB1B9A4000
|
heap
|
page read and write
|
||
2397B8CD000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
2B6E000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
2397B8BC000
|
heap
|
page read and write
|
||
30000
|
unkown
|
page read and write
|
||
7CB000
|
heap
|
page read and write
|
||
2566A24C000
|
heap
|
page read and write
|
||
1D4A817C000
|
heap
|
page read and write
|
||
8B3DEFD000
|
stack
|
page read and write
|
||
1CB1B985000
|
heap
|
page read and write
|
||
4D2000
|
unkown
|
page read and write
|
||
1CB1B97A000
|
heap
|
page read and write
|
||
1CB1B97C000
|
heap
|
page read and write
|
||
1D4A85D8000
|
heap
|
page read and write
|
||
2566A23C000
|
heap
|
page read and write
|
||
22A0000
|
direct allocation
|
page read and write
|
||
896627E000
|
stack
|
page read and write
|
||
1E5AD100000
|
heap
|
page read and write
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
1B6CC826000
|
heap
|
page read and write
|
||
19CD4A47000
|
heap
|
page read and write
|
||
74F000
|
stack
|
page read and write
|
||
1D4A8400000
|
heap
|
page read and write
|
||
1CB1B98E000
|
heap
|
page read and write
|
||
1CB1AEEC000
|
heap
|
page read and write
|
||
24AE000
|
stack
|
page read and write
|
||
2370000
|
direct allocation
|
page read and write
|
||
1CB1B9A6000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1B6D1FB0000
|
trusted library allocation
|
page read and write
|
||
841000
|
heap
|
page read and write
|
||
4D2000
|
unkown
|
page write copy
|
||
AFF000
|
stack
|
page read and write
|
||
2463000
|
heap
|
page read and write
|
||
1CC384F0000
|
trusted library allocation
|
page read and write
|
||
98000
|
stack
|
page read and write
|
There are 1069 hidden memdumps, click here to show them.