Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
TRANSFER.EXE
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\TRANSFER.EXE.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\C79A3B\B52B3F.lck
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3853321935-2125563209-4053062332-1002\21c8026919fd094ab07ec3c180a9f210_d06ed635-68f6-4e9a-955c-4899f5f57b9a
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\TRANSFER.EXE
|
"C:\Users\user\Desktop\TRANSFER.EXE"
|
||
C:\Windows\SysWOW64\cmdkey.exe
|
C:\Windows\SysWOW64\cmdkey.exe
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://kbfvzoboss.bid/alien/fre.php
|
|||
http://alphastand.win/alien/fre.php
|
|||
http://alphastand.trade/alien/fre.php
|
|||
http://alphastand.top/alien/fre.php
|
|||
http://sempersim.su/gi4/fre.php
|
45.11.26.144
|
||
http://www.ibsensoftware.com/
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
sempersim.su
|
45.11.26.144
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
45.11.26.144
|
sempersim.su
|
Russian Federation
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
3C25000
|
trusted library allocation
|
page read and write
|
||
3B05000
|
trusted library allocation
|
page read and write
|
||
3BBC000
|
trusted library allocation
|
page read and write
|
||
3B88000
|
trusted library allocation
|
page read and write
|
||
2D84000
|
trusted library allocation
|
page read and write
|
||
4510000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
3B1F000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
3AE1000
|
trusted library allocation
|
page read and write
|
||
3BF1000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
3B53000
|
trusted library allocation
|
page read and write
|
||
1CD143C0000
|
trusted library allocation
|
page read and write
|
||
29AADF84000
|
heap
|
page read and write
|
||
29AAD470000
|
heap
|
page read and write
|
||
3011000
|
heap
|
page read and write
|
||
2C19000
|
trusted library allocation
|
page read and write
|
||
2B50000
|
remote allocation
|
page read and write
|
||
300F000
|
heap
|
page read and write
|
||
304F000
|
heap
|
page read and write
|
||
2B5E000
|
trusted library allocation
|
page read and write
|
||
F608D7B000
|
stack
|
page read and write
|
||
30D0000
|
heap
|
page read and write
|
||
1CD154C0000
|
trusted library allocation
|
page read and write
|
||
2D1C000
|
trusted library allocation
|
page read and write
|
||
2D50000
|
trusted library allocation
|
page read and write
|
||
2B51000
|
trusted library allocation
|
page read and write
|
||
2B32000
|
trusted library allocation
|
page read and write
|
||
2CE2000
|
trusted library allocation
|
page read and write
|
||
3036000
|
heap
|
page read and write
|
||
2D1A000
|
trusted library allocation
|
page read and write
|
||
3032000
|
heap
|
page read and write
|
||
F9219FF000
|
stack
|
page read and write
|
||
302F000
|
heap
|
page read and write
|
||
29AADF82000
|
heap
|
page read and write
|
||
29AADF8B000
|
heap
|
page read and write
|
||
2DBD000
|
trusted library allocation
|
page read and write
|
||
2BD9000
|
trusted library allocation
|
page read and write
|
||
2C08000
|
trusted library allocation
|
page read and write
|
||
2D3D000
|
trusted library allocation
|
page read and write
|
||
50B0000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
20D9707B000
|
heap
|
page read and write
|
||
F921AF8000
|
stack
|
page read and write
|
||
302A000
|
heap
|
page read and write
|
||
29AAD648000
|
heap
|
page read and write
|
||
1A81464E000
|
heap
|
page read and write
|
||
2DA0DCE0000
|
heap
|
page read and write
|
||
50C0000
|
trusted library allocation
|
page read and write
|
||
2B34000
|
trusted library allocation
|
page read and write
|
||
1A814675000
|
heap
|
page read and write
|
||
29AAD702000
|
heap
|
page read and write
|
||
2AE1000
|
trusted library allocation
|
page read and write
|
||
2C1D000
|
trusted library allocation
|
page read and write
|
||
2B66000
|
trusted library allocation
|
page read and write
|
||
2B50000
|
remote allocation
|
page read and write
|
||
4D10000
|
heap
|
page read and write
|
||
29AAD6F9000
|
heap
|
page read and write
|
||
4D954FE000
|
stack
|
page read and write
|
||
50B0000
|
trusted library allocation
|
page read and write
|
||
520E000
|
stack
|
page read and write
|
||
2B50000
|
remote allocation
|
page read and write
|
||
FAE000
|
stack
|
page read and write
|
||
2B71000
|
trusted library allocation
|
page read and write
|
||
2D6F000
|
trusted library allocation
|
page read and write
|
||
2BB3000
|
trusted library allocation
|
page read and write
|
||
5250000
|
trusted library allocation
|
page read and write
|
||
23C2965E000
|
heap
|
page read and write
|
||
23C295E0000
|
trusted library allocation
|
page read and write
|
||
1A81462E000
|
heap
|
page read and write
|
||
29AAE402000
|
heap
|
page read and write
|
||
50B0000
|
trusted library allocation
|
page read and write
|
||
230DEF90000
|
heap
|
page read and write
|
||
29AADFBE000
|
heap
|
page read and write
|
||
302A000
|
heap
|
page read and write
|
||
3019000
|
heap
|
page read and write
|
||
302A000
|
heap
|
page read and write
|
||
2B50000
|
remote allocation
|
page read and write
|
||
4CAE000
|
stack
|
page read and write
|
||
304F000
|
heap
|
page read and write
|
||
29AAD716000
|
heap
|
page read and write
|
||
2DA0DE7F000
|
heap
|
page read and write
|
||
304B000
|
heap
|
page read and write
|
||
2AEC000
|
stack
|
page read and write
|
||
4A2000
|
remote allocation
|
page execute and read and write
|
||
F92115B000
|
stack
|
page read and write
|
||
3050000
|
heap
|
page read and write
|
||
2B7B000
|
trusted library allocation
|
page read and write
|
||
3013000
|
heap
|
page read and write
|
||
2C17000
|
trusted library allocation
|
page read and write
|
||
2CF9000
|
trusted library allocation
|
page read and write
|
||
3011000
|
heap
|
page read and write
|
||
3033000
|
heap
|
page read and write
|
||
3036000
|
heap
|
page read and write
|
||
2B96000
|
trusted library allocation
|
page read and write
|
||
50B0000
|
trusted library allocation
|
page read and write
|
||
2CB5000
|
trusted library allocation
|
page read and write
|
||
3036000
|
heap
|
page read and write
|
||
2CEA000
|
trusted library allocation
|
page read and write
|
||
29AADF7C000
|
heap
|
page read and write
|
||
2CC5000
|
trusted library allocation
|
page read and write
|
||
91AB9FC000
|
stack
|
page read and write
|
||
29AADF79000
|
heap
|
page read and write
|
||
230DF054000
|
heap
|
page read and write
|
||
7D84B7F000
|
stack
|
page read and write
|
||
29AADF00000
|
heap
|
page read and write
|
||
1A814600000
|
heap
|
page read and write
|
||
4C6E000
|
stack
|
page read and write
|
||
50A0000
|
trusted library allocation
|
page read and write
|
||
29AADF82000
|
heap
|
page read and write
|
||
302A000
|
heap
|
page read and write
|
||
230DF108000
|
heap
|
page read and write
|
||
5A4B27F000
|
stack
|
page read and write
|
||
302F000
|
heap
|
page read and write
|
||
2B4F000
|
trusted library allocation
|
page read and write
|
||
2CC3000
|
trusted library allocation
|
page read and write
|
||
29AADF1F000
|
heap
|
page read and write
|
||
2B8C000
|
trusted library allocation
|
page read and write
|
||
23C29600000
|
heap
|
page read and write
|
||
2D67000
|
trusted library allocation
|
page read and write
|
||
3034000
|
heap
|
page read and write
|
||
50B0000
|
trusted library allocation
|
page read and write
|
||
29AADF82000
|
heap
|
page read and write
|
||
FD4000
|
trusted library allocation
|
page read and write
|
||
20D97098000
|
heap
|
page read and write
|
||
20D97087000
|
heap
|
page read and write
|
||
E57117F000
|
stack
|
page read and write
|
||
3019000
|
heap
|
page read and write
|
||
230DF05B000
|
heap
|
page read and write
|
||
2F60000
|
heap
|
page read and write
|
||
29AADFA7000
|
heap
|
page read and write
|
||
3019000
|
heap
|
page read and write
|
||
29AADF8D000
|
heap
|
page read and write
|
||
20D970A0000
|
heap
|
page read and write
|
||
2C41000
|
trusted library allocation
|
page read and write
|
||
29AAD651000
|
heap
|
page read and write
|
||
1A815002000
|
trusted library allocation
|
page read and write
|
||
230DF022000
|
heap
|
page read and write
|
||
2DA0DE3D000
|
heap
|
page read and write
|
||
2CC9000
|
trusted library allocation
|
page read and write
|
||
20D9707D000
|
heap
|
page read and write
|
||
1CD1460C000
|
heap
|
page read and write
|
||
29AADFD6000
|
heap
|
page read and write
|
||
3033000
|
heap
|
page read and write
|
||
7D8477E000
|
stack
|
page read and write
|
||
1CD1460C000
|
heap
|
page read and write
|
||
4A2000
|
remote allocation
|
page execute and read and write
|
||
1015000
|
trusted library allocation
|
page execute and read and write
|
||
2C3C000
|
trusted library allocation
|
page read and write
|
||
302F000
|
heap
|
page read and write
|
||
2B8E000
|
trusted library allocation
|
page read and write
|
||
1A814700000
|
heap
|
page read and write
|
||
2C70000
|
trusted library allocation
|
page read and write
|
||
29AAD6AC000
|
heap
|
page read and write
|
||
2FCE000
|
stack
|
page read and write
|
||
3019000
|
heap
|
page read and write
|
||
2D16000
|
trusted library allocation
|
page read and write
|
||
300E000
|
heap
|
page read and write
|
||
29AADFC1000
|
heap
|
page read and write
|
||
29AAD636000
|
heap
|
page read and write
|
||
230DF05F000
|
heap
|
page read and write
|
||
29AADF72000
|
heap
|
page read and write
|
||
29AADF7A000
|
heap
|
page read and write
|
||
29AAE402000
|
heap
|
page read and write
|
||
20D970B3000
|
heap
|
page read and write
|
||
29AAD6C6000
|
heap
|
page read and write
|
||
1CD14604000
|
heap
|
page read and write
|
||
C8E000
|
heap
|
page read and write
|
||
2D31000
|
trusted library allocation
|
page read and write
|
||
302F000
|
heap
|
page read and write
|
||
300D000
|
heap
|
page read and write
|
||
5210000
|
trusted library allocation
|
page read and write
|
||
29AADF82000
|
heap
|
page read and write
|
||
2C91000
|
trusted library allocation
|
page read and write
|
||
3032000
|
heap
|
page read and write
|
||
5230000
|
trusted library allocation
|
page read and write
|
||
20D96FC0000
|
heap
|
page read and write
|
||
29AAD64A000
|
heap
|
page read and write
|
||
302D000
|
heap
|
page read and write
|
||
23C29713000
|
heap
|
page read and write
|
||
2C43000
|
trusted library allocation
|
page read and write
|
||
2D5B000
|
trusted library allocation
|
page read and write
|
||
2D03000
|
trusted library allocation
|
page read and write
|
||
101B000
|
trusted library allocation
|
page execute and read and write
|
||
4A0000
|
remote allocation
|
page execute and read and write
|
||
1A81465B000
|
heap
|
page read and write
|
||
2BCE000
|
trusted library allocation
|
page read and write
|
||
50B0000
|
trusted library allocation
|
page read and write
|
||
23C29470000
|
heap
|
page read and write
|
||
50C0000
|
trusted library allocation
|
page read and write
|
||
2CFF000
|
trusted library allocation
|
page read and write
|
||
230DF02A000
|
heap
|
page read and write
|
||
2C21000
|
trusted library allocation
|
page read and write
|
||
E570DFC000
|
stack
|
page read and write
|
||
2CF3000
|
trusted library allocation
|
page read and write
|
||
2DA0DF00000
|
heap
|
page read and write
|
||
3050000
|
heap
|
page read and write
|
||
230DF100000
|
heap
|
page read and write
|
||
CEF000
|
heap
|
page read and write
|
||
2BC8000
|
trusted library allocation
|
page read and write
|
||
2D74000
|
trusted library allocation
|
page read and write
|
||
29AADF82000
|
heap
|
page read and write
|
||
1CD14590000
|
trusted library allocation
|
page read and write
|
||
1A8144D0000
|
heap
|
page read and write
|
||
29AAE402000
|
heap
|
page read and write
|
||
304F000
|
heap
|
page read and write
|
||
1A81464A000
|
heap
|
page read and write
|
||
E570C7E000
|
stack
|
page read and write
|
||
2ED5000
|
heap
|
page read and write
|
||
20D970A2000
|
heap
|
page read and write
|
||
2D33000
|
trusted library allocation
|
page read and write
|
||
29AADF86000
|
heap
|
page read and write
|
||
2C74000
|
trusted library allocation
|
page read and write
|
||
2C53000
|
trusted library allocation
|
page read and write
|
||
23C29629000
|
heap
|
page read and write
|
||
E571077000
|
stack
|
page read and write
|
||
29AADDF0000
|
remote allocation
|
page read and write
|
||
4AE8000
|
trusted library allocation
|
page read and write
|
||
5A4ACFF000
|
stack
|
page read and write
|
||
29AADF7A000
|
heap
|
page read and write
|
||
91AB57E000
|
stack
|
page read and write
|
||
4AE0000
|
trusted library allocation
|
page read and write
|
||
29AAE420000
|
heap
|
page read and write
|
||
2BA5000
|
trusted library allocation
|
page read and write
|
||
3054000
|
heap
|
page read and write
|
||
1CD14520000
|
heap
|
page read and write
|
||
2BFC000
|
trusted library allocation
|
page read and write
|
||
3054000
|
heap
|
page read and write
|
||
91AB97F000
|
stack
|
page read and write
|
||
2B9A000
|
trusted library allocation
|
page read and write
|
||
290000
|
unkown
|
page readonly
|
||
FD3000
|
trusted library allocation
|
page execute and read and write
|
||
3012000
|
heap
|
page read and write
|
||
29AAE402000
|
heap
|
page read and write
|
||
FE0000
|
trusted library allocation
|
page read and write
|
||
1000000
|
heap
|
page read and write
|
||
2B54000
|
trusted library allocation
|
page read and write
|
||
29AADFA0000
|
heap
|
page read and write
|
||
29AADF95000
|
heap
|
page read and write
|
||
29AADF72000
|
heap
|
page read and write
|
||
29AADF8D000
|
heap
|
page read and write
|
||
2DA0E802000
|
trusted library allocation
|
page read and write
|
||
29AADF9A000
|
heap
|
page read and write
|
||
3032000
|
heap
|
page read and write
|
||
2C3A000
|
trusted library allocation
|
page read and write
|
||
2BB7000
|
trusted library allocation
|
page read and write
|
||
29AADF76000
|
heap
|
page read and write
|
||
2C57000
|
trusted library allocation
|
page read and write
|
||
300D000
|
heap
|
page read and write
|
||
4D953FE000
|
stack
|
page read and write
|
||
20D970B4000
|
heap
|
page read and write
|
||
50B0000
|
trusted library allocation
|
page read and write
|
||
302C000
|
heap
|
page read and write
|
||
29AADF79000
|
heap
|
page read and write
|
||
2BBC000
|
trusted library allocation
|
page read and write
|
||
29AADFAA000
|
heap
|
page read and write
|
||
3032000
|
heap
|
page read and write
|
||
29AAD629000
|
heap
|
page read and write
|
||
2D18000
|
trusted library allocation
|
page read and write
|
||
3011000
|
heap
|
page read and write
|
||
29AADF86000
|
heap
|
page read and write
|
||
300E000
|
heap
|
page read and write
|
||
CEF000
|
heap
|
page read and write
|
||
302F000
|
heap
|
page read and write
|
||
2B49000
|
trusted library allocation
|
page read and write
|
||
302A000
|
heap
|
page read and write
|
||
FEF40000
|
trusted library allocation
|
page execute and read and write
|
||
5A4AE7B000
|
stack
|
page read and write
|
||
29AAD689000
|
heap
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
29AADFA8000
|
heap
|
page read and write
|
||
20D97070000
|
heap
|
page read and write
|
||
5A4B17F000
|
stack
|
page read and write
|
||
6A0000
|
unkown
|
page readonly
|
||
F9211DE000
|
stack
|
page read and write
|
||
F9216FB000
|
stack
|
page read and write
|
||
29AADDF0000
|
remote allocation
|
page read and write
|
||
29AADF99000
|
heap
|
page read and write
|
||
5A4AD7E000
|
stack
|
page read and write
|
||
50B0000
|
trusted library allocation
|
page read and write
|
||
20D970A0000
|
heap
|
page read and write
|
||
1CD15470000
|
trusted library allocation
|
page read and write
|
||
300E000
|
heap
|
page read and write
|
||
2B50000
|
remote allocation
|
page read and write
|
||
29AADF84000
|
heap
|
page read and write
|
||
50A0000
|
trusted library allocation
|
page read and write
|
||
3038000
|
heap
|
page read and write
|
||
230DF102000
|
heap
|
page read and write
|
||
295000
|
unkown
|
page readonly
|
||
29AAE402000
|
heap
|
page read and write
|
||
5A4AC7B000
|
stack
|
page read and write
|
||
29AADF82000
|
heap
|
page read and write
|
||
50D0000
|
trusted library allocation
|
page read and write
|
||
29AAD713000
|
heap
|
page read and write
|
||
3012000
|
heap
|
page read and write
|
||
29AADF82000
|
heap
|
page read and write
|
||
2D44000
|
trusted library allocation
|
page read and write
|
||
5220000
|
trusted library allocation
|
page read and write
|
||
FDD000
|
trusted library allocation
|
page execute and read and write
|
||
2C6C000
|
trusted library allocation
|
page read and write
|
||
29AADDF0000
|
remote allocation
|
page read and write
|
||
75F0000
|
heap
|
page read and write
|
||
1CD145C0000
|
heap
|
page read and write
|
||
2D01000
|
trusted library allocation
|
page read and write
|
||
2CA0000
|
trusted library allocation
|
page read and write
|
||
E570CFD000
|
stack
|
page read and write
|
||
29AAD6AA000
|
heap
|
page read and write
|
||
302F000
|
heap
|
page read and write
|
||
2A6E000
|
stack
|
page read and write
|
||
300E000
|
heap
|
page read and write
|
||
2D23000
|
trusted library allocation
|
page read and write
|
||
2BFE000
|
trusted library allocation
|
page read and write
|
||
2B50000
|
remote allocation
|
page read and write
|
||
29AADF89000
|
heap
|
page read and write
|
||
1CD1460C000
|
heap
|
page read and write
|
||
F9215FE000
|
stack
|
page read and write
|
||
1CD145C8000
|
heap
|
page read and write
|
||
20D970A2000
|
heap
|
page read and write
|
||
2DA0DF02000
|
heap
|
page read and write
|
||
29AADF97000
|
heap
|
page read and write
|
||
29AAE403000
|
heap
|
page read and write
|
||
3054000
|
heap
|
page read and write
|
||
2C5B000
|
trusted library allocation
|
page read and write
|
||
E5709FB000
|
stack
|
page read and write
|
||
1CD14525000
|
heap
|
page read and write
|
||
50C0000
|
trusted library allocation
|
page read and write
|
||
2BAB000
|
trusted library allocation
|
page read and write
|
||
2B64000
|
trusted library allocation
|
page read and write
|
||
2D39000
|
trusted library allocation
|
page read and write
|
||
29AAE402000
|
heap
|
page read and write
|
||
23C29661000
|
heap
|
page read and write
|
||
4D94FBE000
|
stack
|
page read and write
|
||
50C0000
|
trusted library allocation
|
page read and write
|
||
29AADFBE000
|
heap
|
page read and write
|
||
20D96F90000
|
heap
|
page read and write
|
||
302D000
|
heap
|
page read and write
|
||
230DF067000
|
heap
|
page read and write
|
||
1CD146C0000
|
trusted library allocation
|
page read and write
|
||
301C000
|
heap
|
page read and write
|
||
4D952F9000
|
stack
|
page read and write
|
||
2CDE000
|
trusted library allocation
|
page read and write
|
||
23C2965B000
|
heap
|
page read and write
|
||
29AAE419000
|
heap
|
page read and write
|
||
2C4D000
|
trusted library allocation
|
page read and write
|
||
230DFA02000
|
trusted library allocation
|
page read and write
|
||
2DB4000
|
trusted library allocation
|
page read and write
|
||
2C38000
|
trusted library allocation
|
page read and write
|
||
1CD1462F000
|
heap
|
page read and write
|
||
1CD145B0000
|
trusted library allocation
|
page read and write
|
||
7D846FE000
|
stack
|
page read and write
|
||
2AAE000
|
stack
|
page read and write
|
||
23C29700000
|
heap
|
page read and write
|
||
2CB0000
|
trusted library allocation
|
page read and write
|
||
300E000
|
heap
|
page read and write
|
||
29AADF84000
|
heap
|
page read and write
|
||
F608F7E000
|
stack
|
page read and write
|
||
10A0000
|
trusted library allocation
|
page read and write
|
||
C81000
|
heap
|
page read and write
|
||
2B98000
|
trusted library allocation
|
page read and write
|
||
5210000
|
trusted library allocation
|
page read and write
|
||
2FD0000
|
heap
|
page read and write
|
||
FFA000
|
trusted library allocation
|
page execute and read and write
|
||
2CA8000
|
trusted library allocation
|
page read and write
|
||
2B47000
|
trusted library allocation
|
page read and write
|
||
2B26000
|
trusted library allocation
|
page read and write
|
||
2B2B000
|
stack
|
page read and write
|
||
300F000
|
heap
|
page read and write
|
||
2AB0000
|
heap
|
page read and write
|
||
29AADF82000
|
heap
|
page read and write
|
||
29AADF86000
|
heap
|
page read and write
|
||
1A814708000
|
heap
|
page read and write
|
||
304F000
|
heap
|
page read and write
|
||
3020000
|
heap
|
page read and write
|
||
1A814613000
|
heap
|
page read and write
|
||
2DA0DCD0000
|
heap
|
page read and write
|
||
5A4B077000
|
stack
|
page read and write
|
||
304F000
|
heap
|
page read and write
|
||
297000
|
unkown
|
page readonly
|
||
2C2E000
|
trusted library allocation
|
page read and write
|
||
73C0000
|
trusted library allocation
|
page read and write
|
||
510E000
|
stack
|
page read and write
|
||
4A0000
|
remote allocation
|
page execute and read and write
|
||
300D000
|
heap
|
page read and write
|
||
300D000
|
heap
|
page read and write
|
||
29AADF98000
|
heap
|
page read and write
|
||
2C93000
|
trusted library allocation
|
page read and write
|
||
302A000
|
heap
|
page read and write
|
||
10C0000
|
heap
|
page read and write
|
||
302D000
|
heap
|
page read and write
|
||
2D6D000
|
trusted library allocation
|
page read and write
|
||
91AB4FA000
|
stack
|
page read and write
|
||
2B6A000
|
trusted library allocation
|
page read and write
|
||
2CE8000
|
trusted library allocation
|
page read and write
|
||
300D000
|
heap
|
page read and write
|
||
29AAD655000
|
heap
|
page read and write
|
||
300D000
|
heap
|
page read and write
|
||
4A0000
|
remote allocation
|
page execute and read and write
|
||
29AAD6E2000
|
heap
|
page read and write
|
||
2C1B000
|
trusted library allocation
|
page read and write
|
||
300F000
|
heap
|
page read and write
|
||
302D000
|
heap
|
page read and write
|
||
2B50000
|
remote allocation
|
page read and write
|
||
230DF063000
|
heap
|
page read and write
|
||
1CD145D0000
|
heap
|
page read and write
|
||
23C2962D000
|
heap
|
page read and write
|
||
2CBB000
|
trusted library allocation
|
page read and write
|
||
1A814681000
|
heap
|
page read and write
|
||
300D000
|
heap
|
page read and write
|
||
3033000
|
heap
|
page read and write
|
||
2B90000
|
trusted library allocation
|
page read and write
|
||
2BE3000
|
trusted library allocation
|
page read and write
|
||
2D71000
|
trusted library allocation
|
page read and write
|
||
2C06000
|
trusted library allocation
|
page read and write
|
||
3033000
|
heap
|
page read and write
|
||
29AADF9A000
|
heap
|
page read and write
|
||
840000
|
trusted library allocation
|
page read and write
|
||
2BE5000
|
trusted library allocation
|
page read and write
|
||
3050000
|
heap
|
page read and write
|
||
29AAE403000
|
heap
|
page read and write
|
||
2B90000
|
trusted library allocation
|
page readonly
|
||
91AB8F8000
|
stack
|
page read and write
|
||
29AADFAA000
|
heap
|
page read and write
|
||
2C32000
|
trusted library allocation
|
page read and write
|
||
3036000
|
heap
|
page read and write
|
||
300F000
|
heap
|
page read and write
|
||
2C02000
|
trusted library allocation
|
page read and write
|
||
3019000
|
heap
|
page read and write
|
||
2B50000
|
remote allocation
|
page read and write
|
||
29AAE400000
|
heap
|
page read and write
|
||
20D97097000
|
heap
|
page read and write
|
||
29AAD5E0000
|
trusted library allocation
|
page read and write
|
||
2C1F000
|
trusted library allocation
|
page read and write
|
||
2B30000
|
trusted library allocation
|
page read and write
|
||
300F000
|
heap
|
page read and write
|
||
F60879C000
|
stack
|
page read and write
|
||
1012000
|
trusted library allocation
|
page read and write
|
||
2C6A000
|
trusted library allocation
|
page read and write
|
||
5250000
|
trusted library allocation
|
page read and write
|
||
2C04000
|
trusted library allocation
|
page read and write
|
||
2D65000
|
trusted library allocation
|
page read and write
|
||
2F90000
|
direct allocation
|
page read and write
|
||
20D97093000
|
heap
|
page read and write
|
||
302A000
|
heap
|
page read and write
|
||
230DF082000
|
heap
|
page read and write
|
||
2CE0000
|
trusted library allocation
|
page read and write
|
||
300F000
|
heap
|
page read and write
|
||
2CA6000
|
trusted library allocation
|
page read and write
|
||
7D84A77000
|
stack
|
page read and write
|
||
2D58000
|
trusted library allocation
|
page read and write
|
||
3038000
|
heap
|
page read and write
|
||
30E0000
|
heap
|
page read and write
|
||
3050000
|
heap
|
page read and write
|
||
304F000
|
heap
|
page read and write
|
||
2C0A000
|
trusted library allocation
|
page read and write
|
||
304F000
|
heap
|
page read and write
|
||
2CC1000
|
trusted library allocation
|
page read and write
|
||
1017000
|
trusted library allocation
|
page execute and read and write
|
||
2DA0DE53000
|
heap
|
page read and write
|
||
29AADF76000
|
heap
|
page read and write
|
||
1A81464C000
|
heap
|
page read and write
|
||
2C23000
|
trusted library allocation
|
page read and write
|
||
2C87000
|
trusted library allocation
|
page read and write
|
||
2B2C000
|
trusted library allocation
|
page read and write
|
||
3030000
|
heap
|
page read and write
|
||
2CCD000
|
trusted library allocation
|
page read and write
|
||
300F000
|
heap
|
page read and write
|
||
230DF03C000
|
heap
|
page read and write
|
||
11CE000
|
stack
|
page read and write
|
||
2BC6000
|
trusted library allocation
|
page read and write
|
||
20D970B0000
|
heap
|
page read and write
|
||
2B28000
|
trusted library allocation
|
page read and write
|
||
2DA0DE02000
|
heap
|
page read and write
|
||
2C78000
|
trusted library allocation
|
page read and write
|
||
2C55000
|
trusted library allocation
|
page read and write
|
||
3011000
|
heap
|
page read and write
|
||
F92147E000
|
stack
|
page read and write
|
||
20D970A0000
|
heap
|
page read and write
|
||
3019000
|
heap
|
page read and write
|
||
1A81464D000
|
heap
|
page read and write
|
||
7D8497B000
|
stack
|
page read and write
|
||
302A000
|
heap
|
page read and write
|
||
3011000
|
heap
|
page read and write
|
||
2CE6000
|
trusted library allocation
|
page read and write
|
||
23C29655000
|
heap
|
page read and write
|
||
29AAD647000
|
heap
|
page read and write
|
||
1A8144C0000
|
heap
|
page read and write
|
||
2D37000
|
trusted library allocation
|
page read and write
|
||
3054000
|
heap
|
page read and write
|
||
50B0000
|
trusted library allocation
|
page read and write
|
||
300F000
|
heap
|
page read and write
|
||
1A814713000
|
heap
|
page read and write
|
||
29AADF8B000
|
heap
|
page read and write
|
||
29AADF9C000
|
heap
|
page read and write
|
||
50C0000
|
trusted library allocation
|
page read and write
|
||
29AADF79000
|
heap
|
page read and write
|
||
23C29480000
|
heap
|
page read and write
|
||
300F000
|
heap
|
page read and write
|
||
3AFF000
|
trusted library allocation
|
page read and write
|
||
29AAD653000
|
heap
|
page read and write
|
||
FED000
|
trusted library allocation
|
page execute and read and write
|
||
50B0000
|
trusted library allocation
|
page execute and read and write
|
||
29AADF7A000
|
heap
|
page read and write
|
||
2D56000
|
trusted library allocation
|
page read and write
|
||
29AAD613000
|
heap
|
page read and write
|
||
1A814530000
|
heap
|
page read and write
|
||
2DA0DD70000
|
trusted library allocation
|
page read and write
|
||
1CD15450000
|
heap
|
page readonly
|
||
1A814702000
|
heap
|
page read and write
|
||
2D20000
|
trusted library allocation
|
page read and write
|
||
3050000
|
heap
|
page read and write
|
||
3019000
|
heap
|
page read and write
|
||
1050000
|
heap
|
page read and write
|
||
300F000
|
heap
|
page read and write
|
||
302F000
|
heap
|
page read and write
|
||
3032000
|
heap
|
page read and write
|
||
29AAD6C0000
|
heap
|
page read and write
|
||
2D3B000
|
trusted library allocation
|
page read and write
|
||
50B1000
|
trusted library allocation
|
page read and write
|
||
29AADF53000
|
heap
|
page read and write
|
||
2C89000
|
trusted library allocation
|
page read and write
|
||
2C7F000
|
trusted library allocation
|
page read and write
|
||
3020000
|
heap
|
page read and write
|
||
1CD14529000
|
heap
|
page read and write
|
||
2B2E000
|
trusted library allocation
|
page read and write
|
||
2B62000
|
trusted library allocation
|
page read and write
|
||
300D000
|
heap
|
page read and write
|
||
4D9537D000
|
stack
|
page read and write
|
||
29AAD6F6000
|
heap
|
page read and write
|
||
20D96F95000
|
heap
|
page read and write
|
||
304F000
|
heap
|
page read and write
|
||
2B92000
|
trusted library allocation
|
page read and write
|
||
2C76000
|
trusted library allocation
|
page read and write
|
||
300D000
|
heap
|
page read and write
|
||
2BE9000
|
trusted library allocation
|
page read and write
|
||
23C29E02000
|
trusted library allocation
|
page read and write
|
||
302C000
|
heap
|
page read and write
|
||
E570F7E000
|
stack
|
page read and write
|
||
8AC000
|
stack
|
page read and write
|
||
2C3E000
|
trusted library allocation
|
page read and write
|
||
29AAD480000
|
heap
|
page read and write
|
||
1040000
|
trusted library allocation
|
page execute and read and write
|
||
50C5000
|
trusted library allocation
|
page read and write
|
||
1CD14530000
|
heap
|
page read and write
|
||
3034000
|
heap
|
page read and write
|
||
2D78000
|
trusted library allocation
|
page read and write
|
||
2BD0000
|
trusted library allocation
|
page read and write
|
||
F6F000
|
stack
|
page read and write
|
||
C8C000
|
heap
|
page read and write
|
||
2C0D000
|
trusted library allocation
|
page read and write
|
||
F608AFE000
|
stack
|
page read and write
|
||
3034000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
29AADF86000
|
heap
|
page read and write
|
||
F60907B000
|
stack
|
page read and write
|
||
F608E7B000
|
stack
|
page read and write
|
||
302A000
|
heap
|
page read and write
|
||
29AADF76000
|
heap
|
page read and write
|
||
3012000
|
heap
|
page read and write
|
||
300E000
|
heap
|
page read and write
|
||
3050000
|
heap
|
page read and write
|
||
C5B000
|
heap
|
page read and write
|
||
91AB5FE000
|
stack
|
page read and write
|
||
50A0000
|
trusted library allocation
|
page read and write
|
||
29AAD6EB000
|
heap
|
page read and write
|
||
2B60000
|
trusted library allocation
|
page read and write
|
||
75F1000
|
heap
|
page read and write
|
||
302F000
|
heap
|
page read and write
|
||
FF6000
|
trusted library allocation
|
page execute and read and write
|
||
2CA2000
|
trusted library allocation
|
page read and write
|
||
300E000
|
heap
|
page read and write
|
||
29AADF89000
|
heap
|
page read and write
|
||
3036000
|
heap
|
page read and write
|
||
1CD143B0000
|
heap
|
page read and write
|
||
29AADF64000
|
heap
|
page read and write
|
||
29AADF82000
|
heap
|
page read and write
|
||
2CAA000
|
trusted library allocation
|
page read and write
|
||
2B2A000
|
trusted library allocation
|
page read and write
|
||
3019000
|
heap
|
page read and write
|
||
2BEC000
|
trusted library allocation
|
page read and write
|
||
23C29686000
|
heap
|
page read and write
|
||
29AADFCE000
|
heap
|
page read and write
|
||
5210000
|
trusted library allocation
|
page read and write
|
||
29AADF82000
|
heap
|
page read and write
|
||
3038000
|
heap
|
page read and write
|
||
2D69000
|
trusted library allocation
|
page read and write
|
||
50B0000
|
trusted library allocation
|
page read and write
|
||
300C000
|
heap
|
page read and write
|
||
50B0000
|
trusted library allocation
|
page read and write
|
||
29AADF8B000
|
heap
|
page read and write
|
||
20D970A2000
|
heap
|
page read and write
|
||
2CCB000
|
trusted library allocation
|
page read and write
|
||
3032000
|
heap
|
page read and write
|
||
7D84C7F000
|
stack
|
page read and write
|
||
5210000
|
trusted library allocation
|
page read and write
|
||
2B43000
|
trusted library allocation
|
page read and write
|
||
4D95479000
|
stack
|
page read and write
|
||
29AADF8D000
|
heap
|
page read and write
|
||
29AAD708000
|
heap
|
page read and write
|
||
20D970AF000
|
heap
|
page read and write
|
||
29AADF84000
|
heap
|
page read and write
|
||
3034000
|
heap
|
page read and write
|
||
2CAC000
|
trusted library allocation
|
page read and write
|
||
FF0000
|
trusted library allocation
|
page read and write
|
||
2B45000
|
trusted library allocation
|
page read and write
|
||
29AADF84000
|
heap
|
page read and write
|
||
515F000
|
stack
|
page read and write
|
||
3011000
|
heap
|
page read and write
|
||
3036000
|
heap
|
page read and write
|
||
230DF000000
|
heap
|
page read and write
|
||
3050000
|
heap
|
page read and write
|
||
304F000
|
heap
|
page read and write
|
||
2C9A000
|
trusted library allocation
|
page read and write
|
||
2B68000
|
trusted library allocation
|
page read and write
|
||
3011000
|
heap
|
page read and write
|
||
2C36000
|
trusted library allocation
|
page read and write
|
||
D8E000
|
stack
|
page read and write
|
||
29AAD6B4000
|
heap
|
page read and write
|
||
2AD0000
|
heap
|
page execute and read and write
|
||
FC0000
|
trusted library allocation
|
page read and write
|
||
20D97087000
|
heap
|
page read and write
|
||
29AADF82000
|
heap
|
page read and write
|
||
29AADF8D000
|
heap
|
page read and write
|
||
2ED0000
|
heap
|
page read and write
|
||
300E000
|
heap
|
page read and write
|
||
3C5A000
|
trusted library allocation
|
page read and write
|
||
FF2000
|
trusted library allocation
|
page read and write
|
||
29AAE402000
|
heap
|
page read and write
|
||
23C29708000
|
heap
|
page read and write
|
||
23C294E0000
|
heap
|
page read and write
|
||
D95000
|
heap
|
page read and write
|
||
20D96FA0000
|
heap
|
page read and write
|
||
230DF113000
|
heap
|
page read and write
|
||
29AADFAF000
|
heap
|
page read and write
|
||
302A000
|
heap
|
page read and write
|
||
2C8F000
|
trusted library allocation
|
page read and write
|
||
4A2000
|
remote allocation
|
page execute and read and write
|
||
2C51000
|
trusted library allocation
|
page read and write
|
||
302A000
|
heap
|
page read and write
|
||
29AADF94000
|
heap
|
page read and write
|
||
1030000
|
trusted library allocation
|
page read and write
|
||
2C25000
|
trusted library allocation
|
page read and write
|
||
F921B7F000
|
stack
|
page read and write
|
||
4D94F3B000
|
stack
|
page read and write
|
||
2CFD000
|
trusted library allocation
|
page read and write
|
||
3034000
|
heap
|
page read and write
|
||
29AADF86000
|
heap
|
page read and write
|
||
2B6C000
|
trusted library allocation
|
page read and write
|
||
1A814560000
|
trusted library allocation
|
page read and write
|
||
29AAD4E0000
|
heap
|
page read and write
|
||
2BE0000
|
trusted library allocation
|
page read and write
|
||
7D8487C000
|
stack
|
page read and write
|
||
300C000
|
heap
|
page read and write
|
||
230DF013000
|
heap
|
page read and write
|
||
302A000
|
heap
|
page read and write
|
||
4CB0000
|
direct allocation
|
page read and write
|
||
29AADF8D000
|
heap
|
page read and write
|
||
1CD15460000
|
trusted library allocation
|
page read and write
|
||
1CD14629000
|
heap
|
page read and write
|
||
1A81465C000
|
heap
|
page read and write
|
||
2C6E000
|
trusted library allocation
|
page read and write
|
||
2CE4000
|
trusted library allocation
|
page read and write
|
||
1CD15200000
|
trusted library allocation
|
page read and write
|
||
2D35000
|
trusted library allocation
|
page read and write
|
||
2DA0DE74000
|
heap
|
page read and write
|
||
29AAD64D000
|
heap
|
page read and write
|
||
2D6B000
|
trusted library allocation
|
page read and write
|
||
2D2F000
|
trusted library allocation
|
page read and write
|
||
2CFB000
|
trusted library allocation
|
page read and write
|
||
3034000
|
heap
|
page read and write
|
||
5260000
|
heap
|
page execute and read and write
|
||
2A80000
|
heap
|
page read and write
|
||
50B0000
|
trusted library allocation
|
page read and write
|
||
91AB87F000
|
stack
|
page read and write
|
||
5210000
|
trusted library allocation
|
page read and write
|
||
2BD3000
|
trusted library allocation
|
page read and write
|
||
2BCC000
|
trusted library allocation
|
page read and write
|
||
29AAD64E000
|
heap
|
page read and write
|
||
2D05000
|
trusted library allocation
|
page read and write
|
||
10B0000
|
trusted library allocation
|
page read and write
|
||
2B4D000
|
trusted library allocation
|
page read and write
|
||
29AAD649000
|
heap
|
page read and write
|
||
302A000
|
heap
|
page read and write
|
||
230DF890000
|
trusted library allocation
|
page read and write
|
||
29AADF84000
|
heap
|
page read and write
|
||
230DEFF0000
|
heap
|
page read and write
|
||
29AAD656000
|
heap
|
page read and write
|
||
300C000
|
heap
|
page read and write
|
||
2BCA000
|
trusted library allocation
|
page read and write
|
||
29AAD63C000
|
heap
|
page read and write
|
||
1CD145A0000
|
trusted library allocation
|
page read and write
|
||
E570EFB000
|
stack
|
page read and write
|
||
29AADE02000
|
heap
|
page read and write
|
||
3054000
|
heap
|
page read and write
|
||
3050000
|
heap
|
page read and write
|
||
1A814629000
|
heap
|
page read and write
|
||
2C00000
|
trusted library allocation
|
page read and write
|
||
291000
|
unkown
|
page execute read
|
||
2B4B000
|
trusted library allocation
|
page read and write
|
||
2B9C000
|
trusted library allocation
|
page read and write
|
||
29AADFB0000
|
heap
|
page read and write
|
||
2F97000
|
direct allocation
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
50C0000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
2C72000
|
trusted library allocation
|
page read and write
|
||
2C59000
|
trusted library allocation
|
page read and write
|
||
2D52000
|
trusted library allocation
|
page read and write
|
||
49F000
|
remote allocation
|
page execute and read and write
|
||
3036000
|
heap
|
page read and write
|
||
9A8000
|
stack
|
page read and write
|
||
2D4C000
|
trusted library allocation
|
page read and write
|
||
2BB1000
|
trusted library allocation
|
page read and write
|
||
29AADF8B000
|
heap
|
page read and write
|
||
300E000
|
heap
|
page read and write
|
||
3011000
|
heap
|
page read and write
|
||
29AADFA8000
|
heap
|
page read and write
|
||
3011000
|
heap
|
page read and write
|
||
29AADF7A000
|
heap
|
page read and write
|
||
29AADFB0000
|
heap
|
page read and write
|
||
2CAE000
|
trusted library allocation
|
page read and write
|
||
50A0000
|
trusted library allocation
|
page read and write
|
||
3036000
|
heap
|
page read and write
|
||
2C34000
|
trusted library allocation
|
page read and write
|
||
29AADF76000
|
heap
|
page read and write
|
||
302F000
|
heap
|
page read and write
|
||
302D000
|
heap
|
page read and write
|
||
2FD8000
|
heap
|
page read and write
|
||
2BA9000
|
trusted library allocation
|
page read and write
|
||
1A81466D000
|
heap
|
page read and write
|
||
4D9527F000
|
stack
|
page read and write
|
||
230DEF80000
|
heap
|
page read and write
|
||
2C96000
|
trusted library allocation
|
page read and write
|
||
2CCF000
|
trusted library allocation
|
page read and write
|
||
23C2963C000
|
heap
|
page read and write
|
||
2D7A000
|
trusted library allocation
|
page read and write
|
||
2B84000
|
trusted library allocation
|
page read and write
|
||
109E000
|
stack
|
page read and write
|
||
20D97095000
|
heap
|
page read and write
|
||
2D54000
|
trusted library allocation
|
page read and write
|
||
2DA0DF13000
|
heap
|
page read and write
|
||
23C2967A000
|
heap
|
page read and write
|
||
7D8467B000
|
stack
|
page read and write
|
||
5A4AF7B000
|
stack
|
page read and write
|
||
230DF05A000
|
heap
|
page read and write
|
||
3019000
|
heap
|
page read and write
|
||
2B94000
|
trusted library allocation
|
page read and write
|
||
302A000
|
heap
|
page read and write
|
||
29AADF83000
|
heap
|
page read and write
|
||
29AADF8F000
|
heap
|
page read and write
|
||
300E000
|
heap
|
page read and write
|
||
4C7D000
|
stack
|
page read and write
|
||
29AADF19000
|
heap
|
page read and write
|
||
3011000
|
heap
|
page read and write
|
||
2CC7000
|
trusted library allocation
|
page read and write
|
||
29AADF76000
|
heap
|
page read and write
|
||
2C8B000
|
trusted library allocation
|
page read and write
|
||
2B3D000
|
trusted library allocation
|
page read and write
|
||
2BB5000
|
trusted library allocation
|
page read and write
|
||
29AADFB0000
|
heap
|
page read and write
|
||
F9217F7000
|
stack
|
page read and write
|
||
300F000
|
heap
|
page read and write
|
||
50E0000
|
trusted library allocation
|
page read and write
|
||
2D12000
|
trusted library allocation
|
page read and write
|
||
3019000
|
heap
|
page read and write
|
||
1CD15440000
|
trusted library allocation
|
page read and write
|
||
29AAD64B000
|
heap
|
page read and write
|
||
3019000
|
heap
|
page read and write
|
||
2BB9000
|
trusted library allocation
|
page read and write
|
||
2DA0DE28000
|
heap
|
page read and write
|
||
2CDC000
|
trusted library allocation
|
page read and write
|
||
2BAD000
|
trusted library allocation
|
page read and write
|
||
3036000
|
heap
|
page read and write
|
||
2BDB000
|
trusted library allocation
|
page read and write
|
||
29AADF88000
|
heap
|
page read and write
|
||
5210000
|
trusted library allocation
|
page read and write
|
||
29AADFB0000
|
heap
|
page read and write
|
||
2B50000
|
remote allocation
|
page read and write
|
||
29AAD635000
|
heap
|
page read and write
|
||
1A81463C000
|
heap
|
page read and write
|
||
E57127E000
|
stack
|
page read and write
|
||
F9218F7000
|
stack
|
page read and write
|
||
302A000
|
heap
|
page read and write
|
||
29AAD670000
|
heap
|
page read and write
|
||
302A000
|
heap
|
page read and write
|
||
2DA0DD40000
|
heap
|
page read and write
|
||
3019000
|
heap
|
page read and write
|
||
304F000
|
heap
|
page read and write
|
||
29AADF86000
|
heap
|
page read and write
|
||
2CA4000
|
trusted library allocation
|
page read and write
|
||
29AADF17000
|
heap
|
page read and write
|
||
4FC0000
|
trusted library section
|
page read and write
|
||
3011000
|
heap
|
page read and write
|
||
300F000
|
heap
|
page read and write
|
||
2DA0DE00000
|
heap
|
page read and write
|
||
50C0000
|
trusted library allocation
|
page read and write
|
||
302F000
|
heap
|
page read and write
|
||
23C29613000
|
heap
|
page read and write
|
||
302F000
|
heap
|
page read and write
|
||
2BAF000
|
trusted library allocation
|
page read and write
|
||
50D0000
|
trusted library allocation
|
page read and write
|
||
3050000
|
heap
|
page read and write
|
||
2B50000
|
remote allocation
|
page read and write
|
||
20D96E50000
|
heap
|
page read and write
|
||
29AAD650000
|
heap
|
page read and write
|
||
2C8D000
|
trusted library allocation
|
page read and write
|
||
50D0000
|
trusted library allocation
|
page read and write
|
||
29AADF62000
|
heap
|
page read and write
|
||
FEA000
|
trusted library allocation
|
page read and write
|
||
2D4E000
|
trusted library allocation
|
page read and write
|
||
2CEC000
|
trusted library allocation
|
page read and write
|
||
1CD144F0000
|
heap
|
page read and write
|
||
29AAD600000
|
heap
|
page read and write
|
||
302D000
|
heap
|
page read and write
|
||
2B73000
|
trusted library allocation
|
page read and write
|
||
2B1C000
|
trusted library allocation
|
page read and write
|
||
23C29658000
|
heap
|
page read and write
|
||
FD0000
|
trusted library allocation
|
page read and write
|
||
3019000
|
heap
|
page read and write
|
||
2D08000
|
trusted library allocation
|
page read and write
|
||
6A2000
|
unkown
|
page readonly
|
||
2DA0DE13000
|
heap
|
page read and write
|
||
23C29702000
|
heap
|
page read and write
|
||
2D10000
|
trusted library allocation
|
page read and write
|
||
5210000
|
trusted library allocation
|
page execute and read and write
|
||
23C29666000
|
heap
|
page read and write
|
||
2B7D000
|
trusted library allocation
|
page read and write
|
||
20D97082000
|
heap
|
page read and write
|
||
300E000
|
heap
|
page read and write
|
||
29AADF74000
|
heap
|
page read and write
|
||
301C000
|
heap
|
page read and write
|
There are 824 hidden memdumps, click here to show them.