Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
psIFSn7VLi.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Network\Downloader\edb.chk
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\edb.log
|
MPEG-4 LOAS
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
|
Extensible storage engine DataBase, version 0x620, checksum 0xa177ce27, page size 16384, Windows version 10.0
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
|
Microsoft Cabinet archive data, 61712 bytes, 1 file
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
|
data
|
modified
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
|
Little-endian UTF-16 Unicode text, with CRLF, CR line terminators
|
modified
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\SysWOW64\regsvr32.exe
|
regsvr32.exe /s C:\Users\user\Desktop\psIFSn7VLi.dll
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\psIFSn7VLi.dll",#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\psIFSn7VLi.dll,DllRegisterServer
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\psIFSn7VLi.dll,DllUnregisterServer
|
||
C:\Windows\SysWOW64\regsvr32.exe
|
C:\Windows\SysWOW64\regsvr32.exe /s "C:\Windows\SysWOW64\Arwhu\ttgk.pdy"
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
|
||
C:\Windows\System32\svchost.exe
|
c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc
|
||
C:\Windows\System32\svchost.exe
|
c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k NetworkService -p
|
||
C:\Windows\System32\svchost.exe
|
c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc
|
||
C:\Windows\System32\svchost.exe
|
c:\windows\system32\svchost.exe -k unistacksvcgroup
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
c:\windows\system32\svchost.exe -k localservice -s W32Time
|
||
C:\Windows\System32\loaddll32.exe
|
loaddll32.exe "C:\Users\user\Desktop\psIFSn7VLi.dll"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\psIFSn7VLi.dll",#1
|
||
C:\Windows\System32\SgrmBroker.exe
|
C:\Windows\system32\SgrmBroker.exe
|
||
C:\Program Files\Windows Defender\MpCmdRun.exe
|
"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 12 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://51.91.76.89:8080/WUUUrykRKzQgKnGAgOWXwbTPpbZjnbjXYyUgItVQHAlMtltf
|
unknown
|
||
https://51.91.7.5/
|
unknown
|
||
https://206.188.212.92:8080/WvwiYegTHwVudezOCrWPjYKhpMeUQep
|
unknown
|
||
https://46.55.222.11/TBwKHjQjVeCWIQFS
|
46.55.222.11
|
||
https://79.172.212.216:8080/VNwOftDFidReElfWGyCwgb
|
unknown
|
||
https://192.99.251.50/njigQUBviBvfjJoFmpOFCcuxzCMjisKOYgnAJJuZGrOYExdzIkjfPaaGvSwrlp
|
unknown
|
||
https://46.55.222.11/.50.40.183:80/YQXxdxwQWLyBEVjMOlgty
|
unknown
|
||
https://120.50.40.183/rosoft
|
unknown
|
||
https://51.91.7.5:8080/EEsdElRrfqZScZWLqBhRqLSt
|
unknown
|
||
https://103.221.221.247:8080/
|
unknown
|
||
https://131.100.24.231:80/MIMNtRZxLqGHZoTXVDtaMauEeLlGAjcyCUbpgyHmvtdbZTHIDbPoaw
|
unknown
|
||
https://192.99.251.50/:
|
unknown
|
||
https://192.99.251.50/F
|
unknown
|
||
https://192.99.251.50/
|
unknown
|
||
https://131.100.24.231/
|
unknown
|
||
https://103.221.221.247:8080/PosEzINMiHgCPAexqpnbXngfJaZeCEEsiTgLE3062332-1002
|
unknown
|
||
https://46.55.222.11/TBwKHjQjVeCWIQFSz
|
unknown
|
||
https://149.56.128.192/SSYKvnZUOEUlRtjgPVsscjkUTaNTgTQQvJUHkyX-
|
unknown
|
||
https://149.56.128.192/SSYKvnZUOEUlRtjgPVsscjkUTaNTgTQQvJUHkyX
|
149.56.128.192
|
||
https://79.172.212.216:8080/VNwOftDFidReElfWGyCwg(
|
unknown
|
||
https://185.157.82.211/
|
unknown
|
||
https://79.172.212.216:8080/nes
|
unknown
|
||
https://51.91.76.89/
|
unknown
|
||
https://79.172.212.216:8080/.
|
unknown
|
||
https://79.172.212.216/
|
unknown
|
||
https://46.55.222.11/TBwKHjQjVeCWIQFSi
|
unknown
|
||
https://206.188.212.92/X
|
unknown
|
||
https://160.16.218.63:8080/lksHycwarnaSRJQsEAZwtocdkTVZGajE
|
unknown
|
||
https://120.50.40.183/
|
unknown
|
||
https://159.8.59.82/
|
unknown
|
||
https://131.100.24.231:80/MIMNtRZxLqGHZoTXVDtaMauEeLlGAjcyCUbpgyHmvtdbZTHIDbPoawrlp
|
unknown
|
||
https://192.99.251.50/27.42.236/h
|
unknown
|
||
https://79.172.212.216:8080/VNwOftDFidReElfWGyCwg$v6/
|
unknown
|
||
https://46.55.222.11/TBwKHjQjVeCWIQFSN
|
unknown
|
||
https://103.221.221.247/Certificates
|
unknown
|
||
https://173.254.208.91:8080/iqyyOTGODIozOxlzJCOa
|
unknown
|
||
https://206.188.212.92/7
|
unknown
|
||
https://173.254.208.91:8080/iqyyOTGODIozOxlzJCOT
|
unknown
|
||
https://185.157.82.211:8080/cal
|
unknown
|
||
https://120.50.40.183:80/$v6/
|
unknown
|
||
https://185.157.82.211:8080/r
|
unknown
|
||
https://206.188.212.92/
|
unknown
|
||
https://173.254.208.91/
|
unknown
|
||
https://160.16.218.63/
|
unknown
|
||
https://149.56.128.192/
|
unknown
|
||
https://159.8.59.82:8080/AgctwBgxIsTEnzPyqHwVtfcFB
|
unknown
|
||
https://103.221.221.247/Global
|
unknown
|
||
https://120.50.40.183:80/za
|
unknown
|
||
https://46.55.222.11/
|
unknown
|
||
https://46.55.222.11/TBwKHjQjVeCWIQFS)
|
unknown
|
||
https://120.50.40.183/d
|
unknown
|
||
https://160.16.218.63:8080/5
|
unknown
|
||
https://103.221.221.247:8080/PosEzINMiHgCPAexqpnbXngfJaZeCEEsiTgLEr
|
unknown
|
||
https://103.221.221.247/
|
unknown
|
||
https://103.221.221.247:8080/PosEzINMiHgCPAexqpnbXngfJaZeCEEsiTgLE
|
unknown
|
||
https://120.50.40.183/m
|
unknown
|
||
https://103.221.221.247:8080/i
|
unknown
|
||
https://79.172.212.216:8080/
|
unknown
|
||
https://185.157.82.211:8080/
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/Routes/
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/Traffic/Incidents/
|
unknown
|
||
https://t0.tiles.ditu.live.com/tiles/gen
|
unknown
|
||
https://58.227.42.236/
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Routes/Walking
|
unknown
|
||
https://58.227.42.236:80/CBvqXjPjXUGuuflNLuZWkXecSmHukPuGWkGWJXlIStqkcdnP
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Transit/Schedules/
|
unknown
|
||
https://58.227.42.236:80/CBvqXjPjXUGuuflNLuZWkXecSmHukPuGWkGWJXlIStqkcdnPK
|
unknown
|
||
http://www.bingmapsportal.com
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Routes/
|
unknown
|
||
http://crl.ver)
|
unknown
|
||
https://58.227.42.236/N
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
|
unknown
|
||
https://%s.xboxlive.com
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Locations
|
unknown
|
||
https://58.227.42.236/c4
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/JsonFilter/VenueMaps/data/
|
unknown
|
||
https://dynamic.t
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Routes/Transit
|
unknown
|
||
https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/
|
unknown
|
||
https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Routes/Driving
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
|
unknown
|
||
https://58.227.42.236:80/$v6/
|
unknown
|
||
https://58.227.42.236:80/D
|
unknown
|
||
https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n=
|
unknown
|
||
https://58.227.42.236:80/:
|
unknown
|
||
https://dev.ditu.live.com/mapcontrol/logging.ashx
|
unknown
|
||
https://58.227.42.236:80/-
|
unknown
|
||
https://www.hotspotshield.com/terms/
|
unknown
|
||
https://www.pango.co/privacy
|
unknown
|
||
https://www.tiktok.com/legal/report
|
unknown
|
||
https://79.172.212.2167:8080/
|
unknown
|
||
https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
|
unknown
|
||
https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
|
unknown
|
||
https://www.disneyplus.com/legal/your-california-privacy-rights
|
unknown
|
||
https://58.227.42.236:80/
|
unknown
|
||
https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
time.windows.com
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
217.182.25.250
|
unknown
|
France
|
||
79.172.212.216
|
unknown
|
Hungary
|
||
151.106.112.196
|
unknown
|
Germany
|
||
110.232.117.186
|
unknown
|
Australia
|
||
51.254.140.238
|
unknown
|
France
|
||
173.254.208.91
|
unknown
|
United States
|
||
206.188.212.92
|
unknown
|
United States
|
||
45.118.115.99
|
unknown
|
Indonesia
|
||
209.126.98.206
|
unknown
|
United States
|
||
1.234.21.73
|
unknown
|
Korea Republic of
|
||
149.56.128.192
|
unknown
|
Canada
|
||
176.56.128.118
|
unknown
|
Switzerland
|
||
45.118.135.203
|
unknown
|
Japan
|
||
167.99.115.35
|
unknown
|
United States
|
||
185.8.212.130
|
unknown
|
Uzbekistan
|
||
197.242.150.244
|
unknown
|
South Africa
|
||
51.91.76.89
|
unknown
|
France
|
||
178.79.147.66
|
unknown
|
United Kingdom
|
||
207.38.84.195
|
unknown
|
United States
|
||
164.68.99.3
|
unknown
|
Germany
|
||
189.126.111.200
|
unknown
|
Brazil
|
||
146.59.226.45
|
unknown
|
Norway
|
||
120.50.40.183
|
unknown
|
Singapore
|
||
58.227.42.236
|
unknown
|
Korea Republic of
|
||
158.69.222.101
|
unknown
|
Canada
|
||
196.218.30.83
|
unknown
|
Egypt
|
||
101.50.0.91
|
unknown
|
Indonesia
|
||
195.154.133.20
|
unknown
|
France
|
||
185.157.82.211
|
unknown
|
Poland
|
||
103.43.46.182
|
unknown
|
Indonesia
|
||
212.237.17.99
|
unknown
|
Italy
|
||
212.24.98.99
|
unknown
|
Lithuania
|
||
138.185.72.26
|
unknown
|
Brazil
|
||
103.75.201.2
|
unknown
|
Thailand
|
||
216.158.226.206
|
unknown
|
United States
|
||
103.75.201.4
|
unknown
|
Thailand
|
||
51.91.7.5
|
unknown
|
France
|
||
5.9.116.246
|
unknown
|
Germany
|
||
188.44.20.25
|
unknown
|
Macedonia
|
||
72.15.201.15
|
unknown
|
United States
|
||
209.250.246.206
|
unknown
|
European Union
|
||
82.165.152.127
|
unknown
|
Germany
|
||
107.182.225.142
|
unknown
|
United States
|
||
50.116.54.215
|
unknown
|
United States
|
||
131.100.24.231
|
unknown
|
Brazil
|
||
46.55.222.11
|
unknown
|
Bulgaria
|
||
173.212.193.249
|
unknown
|
Germany
|
||
160.16.218.63
|
unknown
|
Japan
|
||
192.99.251.50
|
unknown
|
Canada
|
||
45.142.114.231
|
unknown
|
Germany
|
||
203.114.109.124
|
unknown
|
Thailand
|
||
1.234.2.232
|
unknown
|
Korea Republic of
|
||
119.193.124.41
|
unknown
|
Korea Republic of
|
||
159.8.59.82
|
unknown
|
United States
|
||
129.232.188.93
|
unknown
|
South Africa
|
||
103.221.221.247
|
unknown
|
Viet Nam
|
||
127.0.0.1
|
unknown
|
unknown
|
There are 47 hidden IPs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
|
cval
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
|
cval
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f1\52C64B7E
|
@%SystemRoot%\System32\ci.dll,-100
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f1\52C64B7E
|
@%SystemRoot%\System32\ci.dll,-101
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f1\52C64B7E
|
@%SystemRoot%\system32\dnsapi.dll,-103
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f1\52C64B7E
|
@%SystemRoot%\System32\fveui.dll,-843
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f1\52C64B7E
|
@%SystemRoot%\System32\fveui.dll,-844
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f1\52C64B7E
|
@%SystemRoot%\System32\wuaueng.dll,-400
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f1\52C64B7E
|
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f1\52C64B7E
|
@%SystemRoot%\system32\NgcRecovery.dll,-100
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage
|
MonthID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
|
PerfMMFileName
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\W32Time\Config
|
LastKnownGoodTime
|
There are 3 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
4231000
|
direct allocation
|
page execute read
|
||
2940000
|
direct allocation
|
page execute and read and write
|
||
4591000
|
direct allocation
|
page execute read
|
||
3530000
|
direct allocation
|
page execute and read and write
|
||
9C0000
|
direct allocation
|
page execute and read and write
|
||
4DF1000
|
direct allocation
|
page execute read
|
||
4DC0000
|
direct allocation
|
page execute and read and write
|
||
4F11000
|
direct allocation
|
page execute read
|
||
4E8F000
|
trusted library allocation
|
page read and write
|
||
600000
|
trusted library allocation
|
page read and write
|
||
1F917453000
|
heap
|
page read and write
|
||
B0B000
|
heap
|
page read and write
|
||
55E0000
|
trusted library allocation
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
1E986F7000
|
stack
|
page read and write
|
||
10095000
|
unkown
|
page write copy
|
||
10095000
|
unkown
|
page write copy
|
||
1697E83D000
|
heap
|
page read and write
|
||
16904121000
|
trusted library allocation
|
page read and write
|
||
1F91744C000
|
heap
|
page read and write
|
||
136BAA02000
|
trusted library allocation
|
page read and write
|
||
EEDDDFB000
|
stack
|
page read and write
|
||
2BDF000
|
heap
|
page read and write
|
||
1697E8AE000
|
heap
|
page read and write
|
||
5000000
|
heap
|
page read and write
|
||
4B6D000
|
stack
|
page read and write
|
||
2C0B000
|
heap
|
page read and write
|
||
20E58229000
|
heap
|
page read and write
|
||
10015000
|
unkown
|
page execute read
|
||
549D000
|
stack
|
page read and write
|
||
2720645A000
|
heap
|
page read and write
|
||
18D579D0000
|
trusted library allocation
|
page read and write
|
||
15C8A789000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
15C8A602000
|
heap
|
page read and write
|
||
293F000
|
stack
|
page read and write
|
||
3400000
|
heap
|
page read and write
|
||
175FBDE000
|
stack
|
page read and write
|
||
1697F202000
|
heap
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
A195000
|
trusted library allocation
|
page read and write
|
||
15C8A7B4000
|
heap
|
page read and write
|
||
1EB1FE81000
|
heap
|
page read and write
|
||
18D579B0000
|
trusted library allocation
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
1EB1FE5F000
|
heap
|
page read and write
|
||
16904370000
|
trusted library allocation
|
page read and write
|
||
B00000
|
heap
|
page read and write
|
||
1763D7E000
|
stack
|
page read and write
|
||
4E60000
|
trusted library allocation
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
16904108000
|
trusted library allocation
|
page read and write
|
||
54B000
|
stack
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
15C8A747000
|
heap
|
page read and write
|
||
1ECDFA5F000
|
heap
|
page read and write
|
||
18D57C00000
|
trusted library allocation
|
page read and write
|
||
25B78F40000
|
heap
|
page read and write
|
||
16904100000
|
trusted library allocation
|
page read and write
|
||
27206413000
|
heap
|
page read and write
|
||
1697FED6000
|
heap
|
page read and write
|
||
7E3957C000
|
stack
|
page read and write
|
||
914A4FC000
|
stack
|
page read and write
|
||
2F10000
|
heap
|
page read and write
|
||
1AAEBF10000
|
trusted library allocation
|
page read and write
|
||
1F917500000
|
heap
|
page read and write
|
||
15C8A76F000
|
heap
|
page read and write
|
||
350F000
|
stack
|
page read and write
|
||
2C1F000
|
heap
|
page read and write
|
||
F5AF07F000
|
stack
|
page read and write
|
||
15C8A78B000
|
heap
|
page read and write
|
||
961A67B000
|
stack
|
page read and write
|
||
4ED2000
|
trusted library allocation
|
page read and write
|
||
1697FE3E000
|
heap
|
page read and write
|
||
15C8A7A3000
|
heap
|
page read and write
|
||
276B2E44000
|
heap
|
page read and write
|
||
34FF000
|
stack
|
page read and write
|
||
630000
|
heap
|
page read and write
|
||
F5AE9FB000
|
stack
|
page read and write
|
||
15C8AC02000
|
heap
|
page read and write
|
||
15C89E4B000
|
heap
|
page read and write
|
||
15C8AC03000
|
heap
|
page read and write
|
||
15C89CF0000
|
heap
|
page read and write
|
||
6BC000
|
heap
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
10001000
|
unkown
|
page execute read
|
||
1F917413000
|
heap
|
page read and write
|
||
1ECDFA5C000
|
heap
|
page read and write
|
||
15C8A795000
|
heap
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
643E29B000
|
stack
|
page read and write
|
||
18D56048000
|
heap
|
page read and write
|
||
7E39CFF000
|
stack
|
page read and write
|
||
506E000
|
stack
|
page read and write
|
||
276B3700000
|
heap
|
page read and write
|
||
2BEA000
|
heap
|
page read and write
|
||
2C6D000
|
heap
|
page read and write
|
||
1EB1FD50000
|
heap
|
page read and write
|
||
914A77E000
|
stack
|
page read and write
|
||
7E399FE000
|
stack
|
page read and write
|
||
1EB20802000
|
trusted library allocation
|
page read and write
|
||
545F000
|
stack
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
2C31000
|
heap
|
page read and write
|
||
1F917427000
|
heap
|
page read and write
|
||
15C8A792000
|
heap
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
4252000
|
direct allocation
|
page read and write
|
||
276B2DC0000
|
trusted library allocation
|
page read and write
|
||
15C8A777000
|
heap
|
page read and write
|
||
65C0000
|
heap
|
page read and write
|
||
3330000
|
trusted library allocation
|
page read and write
|
||
276B2C60000
|
heap
|
page read and write
|
||
3521000
|
heap
|
page read and write
|
||
1697E878000
|
heap
|
page read and write
|
||
18D55F10000
|
heap
|
page read and write
|
||
15C89E4A000
|
heap
|
page read and write
|
||
1697F215000
|
heap
|
page read and write
|
||
276B3602000
|
heap
|
page read and write
|
||
1ECDFA74000
|
heap
|
page read and write
|
||
2C64000
|
heap
|
page read and write
|
||
15C89E53000
|
heap
|
page read and write
|
||
643EAFB000
|
stack
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
18D56062000
|
heap
|
page read and write
|
||
1ECDFA55000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
850D5F9000
|
stack
|
page read and write
|
||
1F91743C000
|
heap
|
page read and write
|
||
16904124000
|
trusted library allocation
|
page read and write
|
||
100CE000
|
unkown
|
page readonly
|
||
1F91742D000
|
heap
|
page read and write
|
||
609097E000
|
stack
|
page read and write
|
||
3520000
|
heap
|
page read and write
|
||
4D60000
|
remote allocation
|
page read and write
|
||
15C8A777000
|
heap
|
page read and write
|
||
1ECDFA7B000
|
heap
|
page read and write
|
||
1763C7E000
|
stack
|
page read and write
|
||
20E580A0000
|
heap
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
45C0000
|
heap
|
page read and write
|
||
16904260000
|
remote allocation
|
page read and write
|
||
24B7A870000
|
heap
|
page read and write
|
||
1007D000
|
unkown
|
page execute read
|
||
25B79146000
|
heap
|
page read and write
|
||
15C8A773000
|
heap
|
page read and write
|
||
552E000
|
stack
|
page read and write
|
||
1697E829000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
15C89EFA000
|
heap
|
page read and write
|
||
15C8A792000
|
heap
|
page read and write
|
||
136BA1D0000
|
remote allocation
|
page read and write
|
||
136BA229000
|
heap
|
page read and write
|
||
15C89E6D000
|
heap
|
page read and write
|
||
15C8A7C4000
|
heap
|
page read and write
|
||
1ECDFB02000
|
heap
|
page read and write
|
||
334E000
|
stack
|
page read and write
|
||
2C1F000
|
heap
|
page read and write
|
||
16904240000
|
trusted library allocation
|
page read and write
|
||
1009F000
|
unkown
|
page write copy
|
||
4BAA000
|
stack
|
page read and write
|
||
15C8AB90000
|
remote allocation
|
page read and write
|
||
534F000
|
stack
|
page read and write
|
||
10057000
|
unkown
|
page execute read
|
||
136BA040000
|
heap
|
page read and write
|
||
276B2E13000
|
heap
|
page read and write
|
||
15C8A7B4000
|
heap
|
page read and write
|
||
100A2000
|
unkown
|
page readonly
|
||
9F4000
|
heap
|
page read and write
|
||
175FE7E000
|
stack
|
page read and write
|
||
15C89E82000
|
heap
|
page read and write
|
||
1EB1FE76000
|
heap
|
page read and write
|
||
15C8A781000
|
heap
|
page read and write
|
||
15C8A786000
|
heap
|
page read and write
|
||
2C2E000
|
heap
|
page read and write
|
||
33C0000
|
heap
|
page read and write
|
||
15C8AC02000
|
heap
|
page read and write
|
||
914A7FC000
|
stack
|
page read and write
|
||
15C8AC02000
|
heap
|
page read and write
|
||
25B79144000
|
heap
|
page read and write
|
||
18D56118000
|
heap
|
page read and write
|
||
1AAEC05A000
|
heap
|
page read and write
|
||
1FFE77F000
|
stack
|
page read and write
|
||
3534000
|
heap
|
page read and write
|
||
1697FEF5000
|
heap
|
page read and write
|
||
65C4000
|
heap
|
page read and write
|
||
15C8A792000
|
heap
|
page read and write
|
||
136BA202000
|
heap
|
page read and write
|
||
33EA000
|
heap
|
page read and write
|
||
15C89EEA000
|
heap
|
page read and write
|
||
3537000
|
heap
|
page read and write
|
||
355A77C000
|
stack
|
page read and write
|
||
10095000
|
unkown
|
page write copy
|
||
276B2E00000
|
heap
|
page read and write
|
||
25B79136000
|
heap
|
page read and write
|
||
1697E6F0000
|
heap
|
page read and write
|
||
1ECDFA84000
|
heap
|
page read and write
|
||
15C89E70000
|
heap
|
page read and write
|
||
45B2000
|
direct allocation
|
page read and write
|
||
690000
|
heap
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
355A9FE000
|
stack
|
page read and write
|
||
15C89E55000
|
heap
|
page read and write
|
||
20E58257000
|
heap
|
page read and write
|
||
15C89E4E000
|
heap
|
page read and write
|
||
4B2C000
|
stack
|
page read and write
|
||
18D55EB0000
|
heap
|
page read and write
|
||
15C8A783000
|
heap
|
page read and write
|
||
1F917310000
|
trusted library allocation
|
page read and write
|
||
20E589D0000
|
remote allocation
|
page read and write
|
||
15C8A781000
|
heap
|
page read and write
|
||
4E9D000
|
trusted library allocation
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
1D38E3C0000
|
trusted library allocation
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
25B79090000
|
heap
|
page read and write
|
||
20E589A0000
|
trusted library allocation
|
page read and write
|
||
1EB1FE13000
|
heap
|
page read and write
|
||
2BEC000
|
heap
|
page read and write
|
||
2BE0000
|
heap
|
page read and write
|
||
4E12000
|
direct allocation
|
page read and write
|
||
1ECDFA5A000
|
heap
|
page read and write
|
||
4EEC000
|
trusted library allocation
|
page read and write
|
||
1697FEEC000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
9F0000
|
trusted library allocation
|
page read and write
|
||
1697FE00000
|
heap
|
page read and write
|
||
3377000
|
heap
|
page read and write
|
||
4EEC000
|
trusted library allocation
|
page read and write
|
||
1697E8AE000
|
heap
|
page read and write
|
||
51A0000
|
heap
|
page read and write
|
||
1FFE87E000
|
stack
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
1AAEBDB0000
|
heap
|
page read and write
|
||
1D38E345000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
2EEB000
|
stack
|
page read and write
|
||
276B2EE2000
|
heap
|
page read and write
|
||
2C1D000
|
heap
|
page read and write
|
||
570000
|
remote allocation
|
page read and write
|
||
1F917477000
|
heap
|
page read and write
|
||
15C8AC02000
|
heap
|
page read and write
|
||
850D579000
|
stack
|
page read and write
|
||
15C8AC02000
|
heap
|
page read and write
|
||
1E9857B000
|
stack
|
page read and write
|
||
1ECDFA65000
|
heap
|
page read and write
|
||
1ECDFA57000
|
heap
|
page read and write
|
||
914AB7E000
|
stack
|
page read and write
|
||
50E0000
|
trusted library allocation
|
page read and write
|
||
27206E02000
|
trusted library allocation
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
ADFB000
|
trusted library allocation
|
page read and write
|
||
1697E85A000
|
heap
|
page read and write
|
||
136BA24A000
|
heap
|
page read and write
|
||
15C8A77E000
|
heap
|
page read and write
|
||
48C000
|
stack
|
page read and write
|
||
1EB1FF00000
|
heap
|
page read and write
|
||
1763A7C000
|
stack
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
33B0000
|
heap
|
page read and write
|
||
15C8AC02000
|
heap
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
3363000
|
heap
|
page read and write
|
||
1ECDFA3D000
|
heap
|
page read and write
|
||
4EB2000
|
trusted library allocation
|
page read and write
|
||
1763FFF000
|
stack
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
175FF7B000
|
stack
|
page read and write
|
||
4EB8000
|
trusted library allocation
|
page read and write
|
||
18D56013000
|
heap
|
page read and write
|
||
4350000
|
heap
|
page read and write
|
||
15C8A795000
|
heap
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
1ECDFA4D000
|
heap
|
page read and write
|
||
272063E0000
|
trusted library allocation
|
page read and write
|
||
15C8A77E000
|
heap
|
page read and write
|
||
F5AEE7D000
|
stack
|
page read and write
|
||
25B79142000
|
heap
|
page read and write
|
||
352E000
|
heap
|
page read and write
|
||
1FFEC7F000
|
stack
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
15C89C90000
|
heap
|
page read and write
|
||
20E58202000
|
heap
|
page read and write
|
||
15C89EC6000
|
heap
|
page read and write
|
||
15C8A792000
|
heap
|
page read and write
|
||
15C8A784000
|
heap
|
page read and write
|
||
15C8AC03000
|
heap
|
page read and write
|
||
EEDE1FF000
|
stack
|
page read and write
|
||
4F32000
|
direct allocation
|
page read and write
|
||
1D38F280000
|
trusted library allocation
|
page read and write
|
||
10057000
|
unkown
|
page execute read
|
||
477E000
|
stack
|
page read and write
|
||
1FFE34B000
|
stack
|
page read and write
|
||
4E13000
|
direct allocation
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
10086000
|
unkown
|
page readonly
|
||
1ECDF9A0000
|
trusted library allocation
|
page read and write
|
||
55AD000
|
stack
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
1ECDFA3B000
|
heap
|
page read and write
|
||
15C8A791000
|
heap
|
page read and write
|
||
961A57C000
|
stack
|
page read and write
|
||
352D000
|
heap
|
page read and write
|
||
1EB1FE00000
|
heap
|
page read and write
|
||
15C8AC02000
|
heap
|
page read and write
|
||
3500000
|
heap
|
page read and write
|
||
15C8A7B9000
|
heap
|
page read and write
|
||
1697FE4B000
|
heap
|
page read and write
|
||
4120000
|
trusted library allocation
|
page read and write
|
||
1ECDFA6B000
|
heap
|
page read and write
|
||
4E80000
|
trusted library allocation
|
page read and write
|
||
15C8A76F000
|
heap
|
page read and write
|
||
513E000
|
stack
|
page read and write
|
||
4CA000
|
stack
|
page read and write
|
||
1EB1FCE0000
|
heap
|
page read and write
|
||
3542000
|
heap
|
page read and write
|
||
4DF0000
|
direct allocation
|
page read and write
|
||
2ED8000
|
stack
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
276B2EBA000
|
heap
|
page read and write
|
||
4EB2000
|
trusted library allocation
|
page read and write
|
||
7E39BFE000
|
stack
|
page read and write
|
||
1F917400000
|
heap
|
page read and write
|
||
1EB1FE29000
|
heap
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
15C8A71B000
|
heap
|
page read and write
|
||
1D38E3B0000
|
trusted library allocation
|
page read and write
|
||
1763CFC000
|
stack
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
2C2A000
|
heap
|
page read and write
|
||
15C89C80000
|
heap
|
page read and write
|
||
15C8A792000
|
heap
|
page read and write
|
||
A555000
|
trusted library allocation
|
page read and write
|
||
15C8A75F000
|
heap
|
page read and write
|
||
276B2ECB000
|
heap
|
page read and write
|
||
1E982FE000
|
stack
|
page read and write
|
||
272063B0000
|
heap
|
page read and write
|
||
F5AF17E000
|
stack
|
page read and write
|
||
15C89EA2000
|
heap
|
page read and write
|
||
3525000
|
heap
|
page read and write
|
||
1697E88C000
|
heap
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
961A8FE000
|
stack
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
18D5603D000
|
heap
|
page read and write
|
||
961A7F7000
|
stack
|
page read and write
|
||
1E988FF000
|
stack
|
page read and write
|
||
1ECDFA60000
|
heap
|
page read and write
|
||
1D38E446000
|
heap
|
page read and write
|
||
609015B000
|
stack
|
page read and write
|
||
4EC6000
|
trusted library allocation
|
page read and write
|
||
1ECDFA75000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
2C98000
|
heap
|
page read and write
|
||
4ED5000
|
trusted library allocation
|
page read and write
|
||
27206513000
|
heap
|
page read and write
|
||
4EEC000
|
trusted library allocation
|
page read and write
|
||
1ECDFA67000
|
heap
|
page read and write
|
||
33BF000
|
stack
|
page read and write
|
||
136BA25A000
|
heap
|
page read and write
|
||
18D56025000
|
heap
|
page read and write
|
||
4590000
|
direct allocation
|
page read and write
|
||
4230000
|
direct allocation
|
page read and write
|
||
20E58100000
|
heap
|
page read and write
|
||
1697E7F3000
|
trusted library allocation
|
page read and write
|
||
10001000
|
unkown
|
page execute read
|
||
1760578000
|
stack
|
page read and write
|
||
2C63000
|
heap
|
page read and write
|
||
25B79160000
|
heap
|
page read and write
|
||
10080000
|
unkown
|
page execute read
|
||
18D56058000
|
heap
|
page read and write
|
||
4E53279000
|
stack
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
100CE000
|
unkown
|
page readonly
|
||
15C89EA9000
|
heap
|
page read and write
|
||
1006C000
|
unkown
|
page execute read
|
||
1007D000
|
unkown
|
page execute read
|
||
1ECDFA56000
|
heap
|
page read and write
|
||
1AAEBDA0000
|
heap
|
page read and write
|
||
635000
|
heap
|
page read and write
|
||
50AF000
|
stack
|
page read and write
|
||
10015000
|
unkown
|
page execute read
|
||
1007D000
|
unkown
|
page execute read
|
||
4EBF000
|
trusted library allocation
|
page read and write
|
||
1697E902000
|
heap
|
page read and write
|
||
1EB1FE60000
|
heap
|
page read and write
|
||
24B7A800000
|
heap
|
page read and write
|
||
15C8A792000
|
heap
|
page read and write
|
||
1697E914000
|
heap
|
page read and write
|
||
10000000
|
unkown
|
page readonly
|
||
15C8AC19000
|
heap
|
page read and write
|
||
2C73000
|
heap
|
page read and write
|
||
352A000
|
heap
|
page read and write
|
||
17603FF000
|
stack
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
2BEA000
|
heap
|
page read and write
|
||
16905000000
|
heap
|
page read and write
|
||
1760077000
|
stack
|
page read and write
|
||
1AAEC100000
|
heap
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
4E52EAB000
|
stack
|
page read and write
|
||
16904260000
|
remote allocation
|
page read and write
|
||
15C8A7B9000
|
heap
|
page read and write
|
||
4E90000
|
trusted library allocation
|
page read and write
|
||
1FFE97A000
|
stack
|
page read and write
|
||
15C8A77E000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
EEDE0FF000
|
stack
|
page read and write
|
||
16904140000
|
trusted library allocation
|
page read and write
|
||
3360000
|
heap
|
page read and write
|
||
4E5337E000
|
stack
|
page read and write
|
||
1AAEC05E000
|
heap
|
page read and write
|
||
330E000
|
stack
|
page read and write
|
||
1AAEC029000
|
heap
|
page read and write
|
||
476F000
|
stack
|
page read and write
|
||
24B7AA40000
|
heap
|
page read and write
|
||
3528000
|
heap
|
page read and write
|
||
276B2CC0000
|
heap
|
page read and write
|
||
136BA302000
|
heap
|
page read and write
|
||
1D38F270000
|
trusted library allocation
|
page read and write
|
||
850D47E000
|
stack
|
page read and write
|
||
136BA1D0000
|
remote allocation
|
page read and write
|
||
420000
|
heap
|
page read and write
|
||
24B7AB13000
|
heap
|
page read and write
|
||
100A2000
|
unkown
|
page readonly
|
||
69A000
|
heap
|
page read and write
|
||
20E58090000
|
heap
|
page read and write
|
||
27206429000
|
heap
|
page read and write
|
||
15C8A792000
|
heap
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
10000000
|
unkown
|
page readonly
|
||
9F5000
|
heap
|
page read and write
|
||
1EB1FE5B000
|
heap
|
page read and write
|
||
15C8A7A3000
|
heap
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
961A6FE000
|
stack
|
page read and write
|
||
18D56057000
|
heap
|
page read and write
|
||
337E000
|
stack
|
page read and write
|
||
2F40000
|
trusted library allocation
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
5101000
|
trusted library allocation
|
page read and write
|
||
15C89E4D000
|
heap
|
page read and write
|
||
643E6F8000
|
stack
|
page read and write
|
||
1F917482000
|
heap
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
176027F000
|
stack
|
page read and write
|
||
15C8A77E000
|
heap
|
page read and write
|
||
1697F200000
|
heap
|
page read and write
|
||
276B2E6D000
|
heap
|
page read and write
|
||
15C89F16000
|
heap
|
page read and write
|
||
15C8A7D3000
|
heap
|
page read and write
|
||
15C8A722000
|
heap
|
page read and write
|
||
3445000
|
heap
|
page read and write
|
||
18D57C40000
|
trusted library allocation
|
page read and write
|
||
1006C000
|
unkown
|
page execute read
|
||
33AF000
|
stack
|
page read and write
|
||
4CEE000
|
stack
|
page read and write
|
||
609087B000
|
stack
|
page read and write
|
||
1697FE2C000
|
heap
|
page read and write
|
||
46DE000
|
stack
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
1AAEC07F000
|
heap
|
page read and write
|
||
2C0B000
|
heap
|
page read and write
|
||
15C89E48000
|
heap
|
page read and write
|
||
1EB1FE8E000
|
heap
|
page read and write
|
||
1EB1FF13000
|
heap
|
page read and write
|
||
1697FE63000
|
heap
|
page read and write
|
||
27206475000
|
heap
|
page read and write
|
||
27206502000
|
heap
|
page read and write
|
||
1ECDFA58000
|
heap
|
page read and write
|
||
16904350000
|
trusted library allocation
|
page read and write
|
||
2FBD000
|
stack
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
350A000
|
heap
|
page read and write
|
||
25B79150000
|
heap
|
page read and write
|
||
20E58302000
|
heap
|
page read and write
|
||
10000000
|
unkown
|
page readonly
|
||
10095000
|
unkown
|
page write copy
|
||
169041D0000
|
trusted library allocation
|
page read and write
|
||
136BA251000
|
heap
|
page read and write
|
||
5100000
|
trusted library allocation
|
page read and write
|
||
1697E88E000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
15C8A771000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
4D60000
|
remote allocation
|
page read and write
|
||
1697F318000
|
heap
|
page read and write
|
||
961A1BE000
|
stack
|
page read and write
|
||
3432000
|
heap
|
page read and write
|
||
18D58000000
|
remote allocation
|
page read and write
|
||
15C8A77A000
|
heap
|
page read and write
|
||
1697E89F000
|
heap
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
1D38E1C0000
|
heap
|
page read and write
|
||
2C99000
|
heap
|
page read and write
|
||
1D38F040000
|
trusted library allocation
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
1697FDD0000
|
trusted library allocation
|
page read and write
|
||
2E30000
|
heap
|
page read and write
|
||
18D58000000
|
remote allocation
|
page read and write
|
||
4E5F000
|
stack
|
page read and write
|
||
1ECDF840000
|
heap
|
page read and write
|
||
1EB1FF08000
|
heap
|
page read and write
|
||
10080000
|
unkown
|
page execute read
|
||
1697E87A000
|
heap
|
page read and write
|
||
4EEC000
|
trusted library allocation
|
page read and write
|
||
1F917502000
|
heap
|
page read and write
|
||
27206350000
|
heap
|
page read and write
|
||
1F917456000
|
heap
|
page read and write
|
||
15C89E49000
|
heap
|
page read and write
|
||
136BA23F000
|
heap
|
page read and write
|
||
15C89F02000
|
heap
|
page read and write
|
||
27206402000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
1D38E349000
|
heap
|
page read and write
|
||
1697F313000
|
heap
|
page read and write
|
||
15C8A783000
|
heap
|
page read and write
|
||
1ECDF830000
|
heap
|
page read and write
|
||
1ECDFA00000
|
heap
|
page read and write
|
||
2C2A000
|
heap
|
page read and write
|
||
24B7AA02000
|
heap
|
page read and write
|
||
1697FDF0000
|
trusted library allocation
|
page read and write
|
||
18D56000000
|
heap
|
page read and write
|
||
15C8A7A4000
|
heap
|
page read and write
|
||
550000
|
heap
|
page read and write
|
||
1F9171B0000
|
heap
|
page read and write
|
||
1ECDFA32000
|
heap
|
page read and write
|
||
276B2EE8000
|
heap
|
page read and write
|
||
4F10000
|
direct allocation
|
page read and write
|
||
4F33000
|
direct allocation
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
15C8A775000
|
heap
|
page read and write
|
||
15C8A7B5000
|
heap
|
page read and write
|
||
1ECE0202000
|
trusted library allocation
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
15C89E7C000
|
heap
|
page read and write
|
||
7CF000
|
stack
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
15C89E13000
|
heap
|
page read and write
|
||
4E10000
|
trusted library allocation
|
page read and write
|
||
471F000
|
stack
|
page read and write
|
||
15C89F13000
|
heap
|
page read and write
|
||
15C8A792000
|
heap
|
page read and write
|
||
352D000
|
heap
|
page read and write
|
||
4253000
|
direct allocation
|
page read and write
|
||
2C1F000
|
heap
|
page read and write
|
||
15C8A7B4000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
33E0000
|
heap
|
page read and write
|
||
276B2F13000
|
heap
|
page read and write
|
||
15C8A7B6000
|
heap
|
page read and write
|
||
1AAEC108000
|
heap
|
page read and write
|
||
15C8AB90000
|
remote allocation
|
page read and write
|
||
2BEA000
|
heap
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
4E1E000
|
stack
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
1697E858000
|
heap
|
page read and write
|
||
15C8A790000
|
heap
|
page read and write
|
||
4AED000
|
stack
|
page read and write
|
||
1009F000
|
unkown
|
page write copy
|
||
9F4000
|
heap
|
page read and write
|
||
25B79145000
|
heap
|
page read and write
|
||
4EB1000
|
trusted library allocation
|
page read and write
|
||
978000
|
heap
|
page read and write
|
||
1D38E400000
|
heap
|
page read and write
|
||
1AAEBE10000
|
heap
|
page read and write
|
||
1FFEB7A000
|
stack
|
page read and write
|
||
136BA200000
|
heap
|
page read and write
|
||
24B7AA28000
|
heap
|
page read and write
|
||
24B7AB00000
|
heap
|
page read and write
|
||
4BEE000
|
stack
|
page read and write
|
||
2C2A000
|
heap
|
page read and write
|
||
1ECDFA77000
|
heap
|
page read and write
|
||
355AAFF000
|
stack
|
page read and write
|
||
1D38F2D0000
|
trusted library allocation
|
page read and write
|
||
25B79120000
|
heap
|
page read and write
|
||
10080000
|
unkown
|
page execute read
|
||
20E589D0000
|
remote allocation
|
page read and write
|
||
357A000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
18D56102000
|
heap
|
page read and write
|
||
914AD7F000
|
stack
|
page read and write
|
||
15C8A773000
|
heap
|
page read and write
|
||
33B7000
|
heap
|
page read and write
|
||
EEDDEFB000
|
stack
|
page read and write
|
||
850D4FE000
|
stack
|
page read and write
|
||
1697FE10000
|
heap
|
page read and write
|
||
24B7AA68000
|
heap
|
page read and write
|
||
355ABFD000
|
stack
|
page read and write
|
||
136BA213000
|
heap
|
page read and write
|
||
1697FEA5000
|
heap
|
page read and write
|
||
18D57A02000
|
trusted library allocation
|
page read and write
|
||
24B7AA13000
|
heap
|
page read and write
|
||
25B79390000
|
heap
|
page read and write
|
||
344E000
|
heap
|
page read and write
|
||
276B2E87000
|
heap
|
page read and write
|
||
1697F300000
|
heap
|
page read and write
|
||
15C8A77F000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
18D56047000
|
heap
|
page read and write
|
||
4EBF000
|
trusted library allocation
|
page read and write
|
||
169041D0000
|
trusted library allocation
|
page read and write
|
||
15C8A7A3000
|
heap
|
page read and write
|
||
4EB8000
|
trusted library allocation
|
page read and write
|
||
1006C000
|
unkown
|
page execute read
|
||
1EB1FE5A000
|
heap
|
page read and write
|
||
1697E8A9000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
53CD000
|
stack
|
page read and write
|
||
2C0B000
|
heap
|
page read and write
|
||
4EEC000
|
trusted library allocation
|
page read and write
|
||
1D38E300000
|
heap
|
page read and write
|
||
136BA0B0000
|
heap
|
page read and write
|
||
1007D000
|
unkown
|
page execute read
|
||
15C89EE7000
|
heap
|
page read and write
|
||
15C89EEC000
|
heap
|
page read and write
|
||
15C8A7B4000
|
heap
|
page read and write
|
||
15C8A761000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
136BA1B0000
|
trusted library allocation
|
page read and write
|
||
15C8A7B3000
|
heap
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
2BEA000
|
heap
|
page read and write
|
||
15C8A786000
|
heap
|
page read and write
|
||
136BA1D0000
|
remote allocation
|
page read and write
|
||
2880000
|
trusted library allocation
|
page read and write
|
||
1697E8A6000
|
heap
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
16904230000
|
trusted library allocation
|
page read and write
|
||
169041D0000
|
trusted library allocation
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
3549000
|
heap
|
page read and write
|
||
943000
|
heap
|
page read and write
|
||
914AC7D000
|
stack
|
page read and write
|
||
850000
|
heap
|
page read and write
|
||
1AAEC102000
|
heap
|
page read and write
|
||
2F7C000
|
stack
|
page read and write
|
||
4F4B000
|
trusted library allocation
|
page read and write
|
||
10015000
|
unkown
|
page execute read
|
||
1AAEC05C000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
930000
|
trusted library allocation
|
page read and write
|
||
3405000
|
heap
|
page read and write
|
||
1FFEA7E000
|
stack
|
page read and write
|
||
914AA7D000
|
stack
|
page read and write
|
||
136BA223000
|
heap
|
page read and write
|
||
1763BFE000
|
stack
|
page read and write
|
||
10057000
|
unkown
|
page execute read
|
||
176047F000
|
unkown
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
2C2A000
|
heap
|
page read and write
|
||
16904130000
|
trusted library allocation
|
page read and write
|
||
1AAEC000000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
15C8A772000
|
heap
|
page read and write
|
||
1ECDFA40000
|
heap
|
page read and write
|
||
1697E813000
|
heap
|
page read and write
|
||
136BA255000
|
heap
|
page read and write
|
||
8FD000
|
stack
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
2C1F000
|
heap
|
page read and write
|
||
15C8A77E000
|
heap
|
page read and write
|
||
1EB1FE56000
|
heap
|
page read and write
|
||
850D1CA000
|
stack
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
15C8A77E000
|
heap
|
page read and write
|
||
15C89EBF000
|
heap
|
page read and write
|
||
100CE000
|
unkown
|
page readonly
|
||
1AAEC013000
|
heap
|
page read and write
|
||
25B79161000
|
heap
|
page read and write
|
||
1697FEA9000
|
heap
|
page read and write
|
||
4D2F000
|
stack
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
4D60000
|
remote allocation
|
page read and write
|
||
15C8AB90000
|
remote allocation
|
page read and write
|
||
1E9827B000
|
stack
|
page read and write
|
||
3330000
|
heap
|
page read and write
|
||
4F4B000
|
trusted library allocation
|
page read and write
|
||
2C2A000
|
heap
|
page read and write
|
||
1AAEC066000
|
heap
|
page read and write
|
||
16904250000
|
trusted library allocation
|
page read and write
|
||
F5AF27F000
|
stack
|
page read and write
|
||
1697F1F0000
|
trusted library allocation
|
page read and write
|
||
2FCE000
|
stack
|
page read and write
|
||
1697FEDB000
|
heap
|
page read and write
|
||
F5AEB7C000
|
stack
|
page read and write
|
||
850D67E000
|
stack
|
page read and write
|
||
15C8A792000
|
heap
|
page read and write
|
||
136BA24F000
|
heap
|
page read and write
|
||
15C8A774000
|
heap
|
page read and write
|
||
1D38E44D000
|
heap
|
page read and write
|
||
7E395FE000
|
stack
|
page read and write
|
||
1ECDF8A0000
|
heap
|
page read and write
|
||
15C8A792000
|
heap
|
page read and write
|
||
4E80000
|
heap
|
page read and write
|
||
1697F8E0000
|
trusted library allocation
|
page read and write
|
||
15C89E29000
|
heap
|
page read and write
|
||
3469000
|
heap
|
page read and write
|
||
50C000
|
stack
|
page read and write
|
||
2BB0000
|
heap
|
page read and write
|
||
3370000
|
heap
|
page read and write
|
||
50FF000
|
stack
|
page read and write
|
||
15C89E3C000
|
heap
|
page read and write
|
||
1D38E445000
|
heap
|
page read and write
|
||
570000
|
remote allocation
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
15C8A795000
|
heap
|
page read and write
|
||
1D38E44D000
|
heap
|
page read and write
|
||
355ACFC000
|
stack
|
page read and write
|
||
3340000
|
trusted library allocation
|
page read and write
|
||
1E987FE000
|
stack
|
page read and write
|
||
100CE000
|
unkown
|
page readonly
|
||
15C8A792000
|
heap
|
page read and write
|
||
3525000
|
heap
|
page read and write
|
||
20E5825C000
|
heap
|
page read and write
|
||
1697E8FE000
|
heap
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
15C89F08000
|
heap
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
2FC5000
|
heap
|
page read and write
|
||
15C8A792000
|
heap
|
page read and write
|
||
4330000
|
heap
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
136BA270000
|
heap
|
page read and write
|
||
F5AE5FB000
|
stack
|
page read and write
|
||
5BC000
|
stack
|
page read and write
|
||
643F17F000
|
stack
|
page read and write
|
||
1D38F260000
|
heap
|
page readonly
|
||
1F9171A0000
|
heap
|
page read and write
|
||
4C2E000
|
stack
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
1E9837E000
|
stack
|
page read and write
|
||
2FC0000
|
heap
|
page read and write
|
||
55EC000
|
stack
|
page read and write
|
||
16904210000
|
trusted library allocation
|
page read and write
|
||
1F917508000
|
heap
|
page read and write
|
||
25B79070000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
1ECDFA47000
|
heap
|
page read and write
|
||
517E000
|
stack
|
page read and write
|
||
2BE0000
|
heap
|
page read and write
|
||
10086000
|
unkown
|
page readonly
|
||
1D38F250000
|
trusted library allocation
|
page read and write
|
||
1F917452000
|
heap
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
15C8AC44000
|
heap
|
page read and write
|
||
337A000
|
heap
|
page read and write
|
||
18D5611C000
|
heap
|
page read and write
|
||
EEDDCFE000
|
stack
|
page read and write
|
||
4220000
|
heap
|
page read and write
|
||
1697E907000
|
heap
|
page read and write
|
||
15C89E50000
|
heap
|
page read and write
|
||
15C89E47000
|
heap
|
page read and write
|
||
EEDD9FB000
|
stack
|
page read and write
|
||
1697FEF4000
|
heap
|
page read and write
|
||
10001000
|
unkown
|
page execute read
|
||
1697E8FE000
|
heap
|
page read and write
|
||
1D38E465000
|
heap
|
page read and write
|
||
4EB8000
|
trusted library allocation
|
page read and write
|
||
EEDDC7E000
|
stack
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
15C8A773000
|
heap
|
page read and write
|
||
18D56048000
|
heap
|
page read and write
|
||
15C8A7B3000
|
heap
|
page read and write
|
||
15C8A780000
|
heap
|
page read and write
|
||
1F917429000
|
heap
|
page read and write
|
||
15C8A7A3000
|
heap
|
page read and write
|
||
15C8A700000
|
heap
|
page read and write
|
||
10086000
|
unkown
|
page readonly
|
||
4EBF000
|
trusted library allocation
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
1ECDFA6A000
|
heap
|
page read and write
|
||
15C8A778000
|
heap
|
page read and write
|
||
10001000
|
unkown
|
page execute read
|
||
9F4000
|
heap
|
page read and write
|
||
3592000
|
heap
|
page read and write
|
||
1ECDFA29000
|
heap
|
page read and write
|
||
24B7AA00000
|
heap
|
page read and write
|
||
136BA050000
|
heap
|
page read and write
|
||
136BA252000
|
heap
|
page read and write
|
||
1006C000
|
unkown
|
page execute read
|
||
1697E800000
|
heap
|
page read and write
|
||
2C75000
|
heap
|
page read and write
|
||
15C89E51000
|
heap
|
page read and write
|
||
1F91746F000
|
heap
|
page read and write
|
||
4EEC000
|
trusted library allocation
|
page read and write
|
||
4A0000
|
heap
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
643E8F9000
|
stack
|
page read and write
|
||
1ECDFA6D000
|
heap
|
page read and write
|
||
25B79131000
|
heap
|
page read and write
|
||
2E40000
|
heap
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
100A2000
|
unkown
|
page readonly
|
||
45F1000
|
heap
|
page read and write
|
||
1ECDFA7E000
|
heap
|
page read and write
|
||
2C9B000
|
heap
|
page read and write
|
||
175FB5B000
|
stack
|
page read and write
|
||
16904130000
|
trusted library allocation
|
page read and write
|
||
20E589D0000
|
remote allocation
|
page read and write
|
||
1F917C02000
|
trusted library allocation
|
page read and write
|
||
1ECDFA42000
|
heap
|
page read and write
|
||
15C8A7A3000
|
heap
|
page read and write
|
||
4E30000
|
heap
|
page read and write
|
||
1009F000
|
unkown
|
page write copy
|
||
17640FD000
|
stack
|
page read and write
|
||
27206400000
|
heap
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
961A47F000
|
stack
|
page read and write
|
||
18D56058000
|
heap
|
page read and write
|
||
15C89E56000
|
heap
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
24B7AA52000
|
heap
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
2C1D000
|
heap
|
page read and write
|
||
15C89E00000
|
heap
|
page read and write
|
||
1AAEC002000
|
heap
|
page read and write
|
||
5101000
|
trusted library allocation
|
page read and write
|
||
341E000
|
heap
|
page read and write
|
||
24B7AB02000
|
heap
|
page read and write
|
||
16904220000
|
trusted library allocation
|
page read and write
|
||
AF77000
|
trusted library allocation
|
page read and write
|
||
2FB9000
|
stack
|
page read and write
|
||
1EB1FE5E000
|
heap
|
page read and write
|
||
2BDF000
|
heap
|
page read and write
|
||
15C8A781000
|
heap
|
page read and write
|
||
1AAEC051000
|
heap
|
page read and write
|
||
541E000
|
stack
|
page read and write
|
||
914A97B000
|
stack
|
page read and write
|
||
25B79150000
|
heap
|
page read and write
|
||
1697E870000
|
heap
|
page read and write
|
||
18D56113000
|
heap
|
page read and write
|
||
1697F302000
|
heap
|
page read and write
|
||
643E7FA000
|
stack
|
page read and write
|
||
24B7AA79000
|
heap
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
609067B000
|
stack
|
page read and write
|
||
352D000
|
heap
|
page read and write
|
||
1697FD60000
|
trusted library allocation
|
page read and write
|
||
1697E8AC000
|
heap
|
page read and write
|
||
538C000
|
stack
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
1697E875000
|
heap
|
page read and write
|
||
1D38E407000
|
heap
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
1697FEEE000
|
heap
|
page read and write
|
||
27206465000
|
heap
|
page read and write
|
||
27206340000
|
heap
|
page read and write
|
||
54DC000
|
stack
|
page read and write
|
||
15C89DF0000
|
trusted library allocation
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
3350000
|
trusted library allocation
|
page read and write
|
||
1AAEC03C000
|
heap
|
page read and write
|
||
45F7000
|
trusted library allocation
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
1ECDFA7A000
|
heap
|
page read and write
|
||
4E532F9000
|
stack
|
page read and write
|
||
10080000
|
unkown
|
page execute read
|
||
1697E780000
|
trusted library allocation
|
page read and write
|
||
10000000
|
unkown
|
page readonly
|
||
1697E7F0000
|
trusted library allocation
|
page read and write
|
||
1AAEC08A000
|
heap
|
page read and write
|
||
18D55EA0000
|
heap
|
page read and write
|
||
355A8FF000
|
stack
|
page read and write
|
||
914A67F000
|
stack
|
page read and write
|
||
18D56089000
|
heap
|
page read and write
|
||
18D56002000
|
heap
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
1697E6E0000
|
heap
|
page read and write
|
||
15C8A7A4000
|
heap
|
page read and write
|
||
15C89EAF000
|
heap
|
page read and write
|
||
4EB8000
|
trusted library allocation
|
page read and write
|
||
1697F304000
|
heap
|
page read and write
|
||
1EB1FE62000
|
heap
|
page read and write
|
||
2AF0000
|
trusted library allocation
|
page read and write
|
||
530D000
|
stack
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
2720646B000
|
heap
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
1FFE67F000
|
stack
|
page read and write
|
||
1EB1FE5C000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
3549000
|
heap
|
page read and write
|
||
EEDDFF7000
|
stack
|
page read and write
|
||
1763F7D000
|
stack
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
1E985FF000
|
stack
|
page read and write
|
||
15C8AC02000
|
heap
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
4E534F9000
|
stack
|
page read and write
|
||
7E39AFE000
|
stack
|
page read and write
|
||
1760177000
|
stack
|
page read and write
|
||
1697FE56000
|
heap
|
page read and write
|
||
1697E750000
|
heap
|
page read and write
|
||
2720643D000
|
heap
|
page read and write
|
||
961A9FE000
|
stack
|
page read and write
|
||
2F50000
|
trusted library allocation
|
page read and write
|
||
643EF7C000
|
stack
|
page read and write
|
||
24B7B202000
|
trusted library allocation
|
page read and write
|
||
1EB1FD80000
|
trusted library allocation
|
page read and write
|
||
1D38E1D0000
|
trusted library allocation
|
page read and write
|
||
5B0000
|
trusted library allocation
|
page read and write
|
||
609077E000
|
stack
|
page read and write
|
||
914A0BB000
|
stack
|
page read and write
|
||
16904140000
|
trusted library allocation
|
page read and write
|
||
276B2E29000
|
heap
|
page read and write
|
||
15C8A7A3000
|
heap
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
4EB1000
|
trusted library allocation
|
page read and write
|
||
355A31B000
|
stack
|
page read and write
|
||
1EB1FCF0000
|
heap
|
page read and write
|
||
3410000
|
trusted library allocation
|
page read and write
|
||
570000
|
remote allocation
|
page read and write
|
||
15C8AC00000
|
heap
|
page read and write
|
||
1690410E000
|
trusted library allocation
|
page read and write
|
||
2BBA000
|
heap
|
page read and write
|
||
10086000
|
unkown
|
page readonly
|
||
45B3000
|
direct allocation
|
page read and write
|
||
5010000
|
heap
|
page read and write
|
||
1ECDFA62000
|
heap
|
page read and write
|
||
15C89E6D000
|
heap
|
page read and write
|
||
18D58000000
|
remote allocation
|
page read and write
|
||
16904144000
|
trusted library allocation
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
F5AEC7F000
|
stack
|
page read and write
|
||
6CB000
|
heap
|
page read and write
|
||
15C8A719000
|
heap
|
page read and write
|
||
4ECE000
|
trusted library allocation
|
page read and write
|
||
1EB1FF02000
|
heap
|
page read and write
|
||
25B79136000
|
heap
|
page read and write
|
||
15C8A792000
|
heap
|
page read and write
|
||
4EBF000
|
trusted library allocation
|
page read and write
|
||
2BEA000
|
heap
|
page read and write
|
||
3570000
|
heap
|
page read and write
|
||
10096000
|
unkown
|
page read and write
|
||
16904260000
|
remote allocation
|
page read and write
|
||
2C73000
|
heap
|
page read and write
|
||
1EB1FE3C000
|
heap
|
page read and write
|
||
15C89EB3000
|
heap
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
34CE000
|
stack
|
page read and write
|
||
6C0000
|
heap
|
page read and write
|
||
1D38E3A0000
|
trusted library allocation
|
page read and write
|
||
850D6FC000
|
stack
|
page read and write
|
||
2C1D000
|
heap
|
page read and write
|
||
176037A000
|
stack
|
page read and write
|
||
4490000
|
trusted library allocation
|
page read and write
|
||
16904100000
|
trusted library allocation
|
page read and write
|
||
16900000000
|
trusted library allocation
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
169041F0000
|
trusted library allocation
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
20E5823D000
|
heap
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
2C0B000
|
heap
|
page read and write
|
||
45E0000
|
heap
|
page read and write
|
||
1ECDFA13000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
A10000
|
heap
|
page read and write
|
||
24B7A810000
|
heap
|
page read and write
|
||
5101000
|
trusted library allocation
|
page read and write
|
||
35C0000
|
heap
|
page read and write
|
||
4E81000
|
trusted library allocation
|
page read and write
|
||
25B79150000
|
heap
|
page read and write
|
||
15C8A773000
|
heap
|
page read and write
|
||
20E58200000
|
heap
|
page read and write
|
||
355AEFE000
|
stack
|
page read and write
|
||
15C8AC20000
|
heap
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
15C8A750000
|
heap
|
page read and write
|
||
1F917210000
|
heap
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
1AAEC061000
|
heap
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
2970000
|
heap
|
page read and write
|
||
556F000
|
stack
|
page read and write
|
||
1697FDE0000
|
trusted library allocation
|
page read and write
|
||
18D56100000
|
heap
|
page read and write
|
||
7E3987E000
|
stack
|
page read and write
|
||
45F0000
|
heap
|
page read and write
|
||
18D5602A000
|
heap
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
914A8FC000
|
stack
|
page read and write
|
||
1FFE3CF000
|
stack
|
page read and write
|
||
1AAEC802000
|
trusted library allocation
|
page read and write
|
||
25B79395000
|
heap
|
page read and write
|
||
1D38E320000
|
heap
|
page read and write
|
||
F5AF37E000
|
stack
|
page read and write
|
||
82E000
|
stack
|
page read and write
|
||
330E000
|
stack
|
page read and write
|
||
18D56073000
|
heap
|
page read and write
|
||
1D38E44D000
|
heap
|
page read and write
|
||
15C8A779000
|
heap
|
page read and write
|
||
4E5347C000
|
stack
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
68E000
|
stack
|
page read and write
|
||
5101000
|
trusted library allocation
|
page read and write
|
||
15C8A775000
|
heap
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
1697FE1E000
|
heap
|
page read and write
|
||
1697E902000
|
heap
|
page read and write
|
||
100A2000
|
unkown
|
page readonly
|
||
15C8A771000
|
heap
|
page read and write
|
||
2EAA000
|
stack
|
page read and write
|
||
276B2C50000
|
heap
|
page read and write
|
||
15C8A779000
|
heap
|
page read and write
|
||
15C89EE1000
|
heap
|
page read and write
|
||
5019000
|
trusted library allocation
|
page read and write
|
||
10096000
|
unkown
|
page read and write
|
||
10096000
|
unkown
|
page read and write
|
||
2C1F000
|
heap
|
page read and write
|
||
1697F318000
|
heap
|
page read and write
|
||
643E9FE000
|
stack
|
page read and write
|
||
4D40000
|
trusted library allocation
|
page read and write
|
||
20E58213000
|
heap
|
page read and write
|
||
2C2A000
|
heap
|
page read and write
|
||
50BE000
|
stack
|
page read and write
|
||
2E9C000
|
stack
|
page read and write
|
||
15C8A792000
|
heap
|
page read and write
|
||
1F917513000
|
heap
|
page read and write
|
||
16904120000
|
trusted library allocation
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
2C1D000
|
heap
|
page read and write
|
||
1697E825000
|
heap
|
page read and write
|
||
1009F000
|
unkown
|
page write copy
|
||
15C8A77A000
|
heap
|
page read and write
|
||
2720646F000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
3445000
|
heap
|
page read and write
|
||
276B2F02000
|
heap
|
page read and write
|
||
20E58A02000
|
trusted library allocation
|
page read and write
|
||
1697E892000
|
heap
|
page read and write
|
||
1697FEFA000
|
heap
|
page read and write
|
||
6B2000
|
heap
|
page read and write
|
||
1AAEC113000
|
heap
|
page read and write
|
||
10057000
|
unkown
|
page execute read
|
||
507F000
|
stack
|
page read and write
|
||
961A13B000
|
stack
|
page read and write
|
||
472D000
|
stack
|
page read and write
|
||
1697FEF9000
|
heap
|
page read and write
|
||
2C1D000
|
heap
|
page read and write
|
||
10096000
|
unkown
|
page read and write
|
||
47BE000
|
stack
|
page read and write
|
||
33BE000
|
stack
|
page read and write
|
||
276B2EC4000
|
heap
|
page read and write
|
||
1697E926000
|
heap
|
page read and write
|
||
24B7A970000
|
trusted library allocation
|
page read and write
|
||
27206487000
|
heap
|
page read and write
|
||
15C8A77E000
|
heap
|
page read and write
|
||
65D0000
|
trusted library allocation
|
page read and write
|
||
15C8A774000
|
heap
|
page read and write
|
||
1ECDFA63000
|
heap
|
page read and write
|
||
4237000
|
trusted library allocation
|
page read and write
|
||
F5AEF7E000
|
stack
|
page read and write
|
||
15C8A792000
|
heap
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
1F91744F000
|
heap
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
1D38E473000
|
heap
|
page read and write
|
||
24B7AA64000
|
heap
|
page read and write
|
||
352D000
|
heap
|
page read and write
|
||
1D38E340000
|
heap
|
page read and write
|
||
503E000
|
stack
|
page read and write
|
||
1D38E500000
|
trusted library allocation
|
page read and write
|
||
276B3712000
|
heap
|
page read and write
|
||
4EEC000
|
trusted library allocation
|
page read and write
|
||
10015000
|
unkown
|
page execute read
|
There are 1073 hidden memdumps, click here to show them.