Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\bP5g4FsSJk.exe
|
"C:\Users\user\Desktop\bP5g4FsSJk.exe"
|
||
C:\Users\user\Desktop\bP5g4FsSJk.exe
|
"C:\Users\user\Desktop\bP5g4FsSJk.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://acacaca.org/test2/get.php
|
|||
http://https://ns1.kriston.ugns2.chalekin.ugns3.unalelath.ugns4.andromath.ug/Error
|
unknown
|
||
https://api.2ip.ua/geo.jsonY
|
unknown
|
||
https://api.2ip.ua/
|
unknown
|
||
https://api.2ip.ua/geo.jsont
|
unknown
|
||
https://api.2ip.ua/geo.json
|
162.0.217.254
|
||
https://api.2ip.ua/geo.jsong
|
unknown
|
||
https://api.2ip.ua/geo.json6
|
unknown
|
||
http://www.openssl.org/support/faq.html
|
unknown
|
||
https://api.2ip.ua/geo.jsons
|
unknown
|
||
https://api.2ip.ua/Y%
|
unknown
|
There are 1 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
api.2ip.ua
|
162.0.217.254
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
162.0.217.254
|
api.2ip.ua
|
Canada
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
400000
|
remote allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
42D0000
|
direct allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
1EF58626000
|
heap
|
page read and write
|
||
18F20E7B000
|
heap
|
page read and write
|
||
1EF5846C000
|
heap
|
page read and write
|
||
83737FD000
|
stack
|
page read and write
|
||
1EF51FA3000
|
heap
|
page read and write
|
||
83735F5000
|
stack
|
page read and write
|
||
1EF583D2000
|
heap
|
page read and write
|
||
1FE548A0000
|
heap
|
page read and write
|
||
1B0000
|
remote allocation
|
page read and write
|
||
1C52525C000
|
heap
|
page read and write
|
||
1EF56CD0000
|
trusted library allocation
|
page read and write
|
||
1EF56EC0000
|
trusted library allocation
|
page read and write
|
||
1C5251D0000
|
trusted library allocation
|
page read and write
|
||
1EF56E30000
|
trusted library allocation
|
page read and write
|
||
1EF5863C000
|
heap
|
page read and write
|
||
2B9E000
|
stack
|
page read and write
|
||
21795D58000
|
heap
|
page read and write
|
||
2B2E2A3C000
|
heap
|
page read and write
|
||
1EF583EA000
|
heap
|
page read and write
|
||
18F20E02000
|
heap
|
page read and write
|
||
4235000
|
trusted library allocation
|
page execute and read and write
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
2C9F000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
F77727B000
|
stack
|
page read and write
|
||
1EF56E34000
|
trusted library allocation
|
page read and write
|
||
1EF51290000
|
heap
|
page read and write
|
||
1EF58433000
|
heap
|
page read and write
|
||
1EF51FBF000
|
heap
|
page read and write
|
||
12F2F3E0000
|
remote allocation
|
page read and write
|
||
258AAD80000
|
unkown
|
page readonly
|
||
2179AB00000
|
remote allocation
|
page read and write
|
||
1EF56CD4000
|
trusted library allocation
|
page read and write
|
||
1EF5845D000
|
heap
|
page read and write
|
||
1EF56CD0000
|
trusted library allocation
|
page read and write
|
||
1EF5825B000
|
heap
|
page read and write
|
||
1EF56CC5000
|
trusted library allocation
|
page read and write
|
||
18F20E41000
|
heap
|
page read and write
|
||
1A97AC62000
|
heap
|
page read and write
|
||
1EF5836E000
|
heap
|
page read and write
|
||
1EF56CDC000
|
trusted library allocation
|
page read and write
|
||
1C525A02000
|
trusted library allocation
|
page read and write
|
||
1EF58392000
|
heap
|
page read and write
|
||
1EF5861F000
|
heap
|
page read and write
|
||
1EF584E2000
|
heap
|
page read and write
|
||
1FE54A00000
|
heap
|
page read and write
|
||
1EF58239000
|
heap
|
page read and write
|
||
2E5E000
|
stack
|
page read and write
|
||
18F20E3A000
|
heap
|
page read and write
|
||
2179AD04000
|
heap
|
page read and write
|
||
1EF56ED0000
|
trusted library allocation
|
page read and write
|
||
682FFF7000
|
stack
|
page read and write
|
||
46DE5F9000
|
stack
|
page read and write
|
||
1EF586A7000
|
heap
|
page read and write
|
||
4220000
|
heap
|
page read and write
|
||
3FB6BF7000
|
stack
|
page read and write
|
||
2179AC4C000
|
heap
|
page read and write
|
||
21795C00000
|
heap
|
page read and write
|
||
12F2F402000
|
heap
|
page read and write
|
||
1EF51FDF000
|
heap
|
page read and write
|
||
2179A9A0000
|
trusted library allocation
|
page read and write
|
||
93D000
|
heap
|
page read and write
|
||
1EF56CE0000
|
trusted library allocation
|
page read and write
|
||
81D807C000
|
stack
|
page read and write
|
||
1EF5845E000
|
heap
|
page read and write
|
||
7618277000
|
stack
|
page read and write
|
||
1EF5837C000
|
heap
|
page read and write
|
||
1EF58444000
|
heap
|
page read and write
|
||
1EF583CD000
|
heap
|
page read and write
|
||
1EF51DC8000
|
heap
|
page read and write
|
||
23BE2A82000
|
heap
|
page read and write
|
||
23BE2A8F000
|
heap
|
page read and write
|
||
2B2E2A4F000
|
heap
|
page read and write
|
||
1EF58636000
|
heap
|
page read and write
|
||
1EF584CF000
|
heap
|
page read and write
|
||
1EF58689000
|
heap
|
page read and write
|
||
1C525070000
|
heap
|
page read and write
|
||
1EF58226000
|
heap
|
page read and write
|
||
21796800000
|
trusted library allocation
|
page read and write
|
||
258AAE89000
|
heap
|
page read and write
|
||
2B2E2A13000
|
heap
|
page read and write
|
||
1EF58604000
|
heap
|
page read and write
|
||
18F20E62000
|
heap
|
page read and write
|
||
1A97AC65000
|
heap
|
page read and write
|
||
84E000
|
stack
|
page read and write
|
||
1EF58606000
|
heap
|
page read and write
|
||
1EF51FFC000
|
heap
|
page read and write
|
||
64E000
|
stack
|
page read and write
|
||
1EF584D8000
|
heap
|
page read and write
|
||
2F70000
|
heap
|
page read and write
|
||
80E000
|
stack
|
page read and write
|
||
682FEFB000
|
stack
|
page read and write
|
||
21795D13000
|
heap
|
page read and write
|
||
1EF56CD6000
|
trusted library allocation
|
page read and write
|
||
258AAE81000
|
heap
|
page read and write
|
||
1EF58480000
|
heap
|
page read and write
|
||
1A97AC3C000
|
heap
|
page read and write
|
||
1EF58226000
|
heap
|
page read and write
|
||
1EF5865A000
|
heap
|
page read and write
|
||
1EF584A1000
|
heap
|
page read and write
|
||
23BE29D0000
|
trusted library allocation
|
page read and write
|
||
1FE54ABA000
|
heap
|
page read and write
|
||
1EF584BE000
|
heap
|
page read and write
|
||
1EF56E10000
|
trusted library allocation
|
page read and write
|
||
1EF58696000
|
heap
|
page read and write
|
||
1EF58620000
|
heap
|
page read and write
|
||
1EF58485000
|
heap
|
page read and write
|
||
1EF56CE2000
|
trusted library allocation
|
page read and write
|
||
1EF5864E000
|
heap
|
page read and write
|
||
1EF58433000
|
heap
|
page read and write
|
||
1EF584F1000
|
heap
|
page read and write
|
||
1EF5863E000
|
heap
|
page read and write
|
||
1EF5843B000
|
heap
|
page read and write
|
||
258AAE00000
|
heap
|
page read and write
|
||
6C5000
|
heap
|
page read and write
|
||
12F2F3E0000
|
remote allocation
|
page read and write
|
||
83732FD000
|
stack
|
page read and write
|
||
1A97AC5C000
|
heap
|
page read and write
|
||
18F20E77000
|
heap
|
page read and write
|
||
13BB2646000
|
heap
|
page read and write
|
||
1C525313000
|
heap
|
page read and write
|
||
C7A267F000
|
stack
|
page read and write
|
||
1EF52B00000
|
trusted library allocation
|
page read and write
|
||
1EF58337000
|
heap
|
page read and write
|
||
1EF5868B000
|
heap
|
page read and write
|
||
1A97AD13000
|
heap
|
page read and write
|
||
B63427E000
|
stack
|
page read and write
|
||
83736FF000
|
stack
|
page read and write
|
||
1EF58417000
|
heap
|
page read and write
|
||
1EF56F10000
|
trusted library allocation
|
page read and write
|
||
1EF5838A000
|
heap
|
page read and write
|
||
1EF5861D000
|
heap
|
page read and write
|
||
1A97AC13000
|
heap
|
page read and write
|
||
1EF51FD5000
|
heap
|
page read and write
|
||
1EF58438000
|
heap
|
page read and write
|
||
5AEA37C000
|
stack
|
page read and write
|
||
1EF584DE000
|
heap
|
page read and write
|
||
1EF58120000
|
trusted library allocation
|
page read and write
|
||
1EF51461000
|
heap
|
page read and write
|
||
217954A6000
|
heap
|
page read and write
|
||
2B2E2A50000
|
heap
|
page read and write
|
||
18F20E00000
|
heap
|
page read and write
|
||
18F20D60000
|
heap
|
page read and write
|
||
C7A26FF000
|
stack
|
page read and write
|
||
1EF5838F000
|
heap
|
page read and write
|
||
1B0000
|
remote allocation
|
page read and write
|
||
1EF58680000
|
heap
|
page read and write
|
||
269BB428000
|
heap
|
page read and write
|
||
5AEA87E000
|
stack
|
page read and write
|
||
5AEA77F000
|
stack
|
page read and write
|
||
1EF58360000
|
heap
|
page read and write
|
||
1EF584D1000
|
heap
|
page read and write
|
||
1EF58462000
|
heap
|
page read and write
|
||
1EF583D2000
|
heap
|
page read and write
|
||
1EF51D5C000
|
heap
|
page read and write
|
||
1EF56CBC000
|
trusted library allocation
|
page read and write
|
||
12F2F400000
|
heap
|
page read and write
|
||
1EF5148D000
|
heap
|
page read and write
|
||
1EF584AE000
|
heap
|
page read and write
|
||
1EF56E20000
|
trusted library allocation
|
page read and write
|
||
13BB263C000
|
heap
|
page read and write
|
||
161DDFD000
|
stack
|
page read and write
|
||
18F20E31000
|
heap
|
page read and write
|
||
2B2E2A81000
|
heap
|
page read and write
|
||
1EF583D4000
|
heap
|
page read and write
|
||
217952E0000
|
heap
|
page read and write
|
||
18F20E79000
|
heap
|
page read and write
|
||
B63437B000
|
stack
|
page read and write
|
||
1EF58691000
|
heap
|
page read and write
|
||
1A6C7A3E000
|
heap
|
page read and write
|
||
161DB7E000
|
stack
|
page read and write
|
||
21795513000
|
heap
|
page read and write
|
||
18F20E40000
|
heap
|
page read and write
|
||
1FE55070000
|
trusted library allocation
|
page read and write
|
||
1EF58434000
|
heap
|
page read and write
|
||
1EF5847C000
|
heap
|
page read and write
|
||
2B2E2990000
|
trusted library allocation
|
page read and write
|
||
1A6C7940000
|
heap
|
page read and write
|
||
1EF56F30000
|
trusted library allocation
|
page read and write
|
||
5AE9D4B000
|
stack
|
page read and write
|
||
1EF584B6000
|
heap
|
page read and write
|
||
1A6C7A5C000
|
heap
|
page read and write
|
||
1EF56D25000
|
trusted library allocation
|
page read and write
|
||
21795BD0000
|
trusted library section
|
page readonly
|
||
28DF000
|
stack
|
page read and write
|
||
1EF58210000
|
heap
|
page read and write
|
||
26BC8F40000
|
heap
|
page read and write
|
||
1EF58495000
|
heap
|
page read and write
|
||
1EF51DB0000
|
heap
|
page read and write
|
||
1EF584D6000
|
heap
|
page read and write
|
||
1EF58417000
|
heap
|
page read and write
|
||
1EF52748000
|
trusted library allocation
|
page read and write
|
||
1EF58382000
|
heap
|
page read and write
|
||
46DE7FB000
|
stack
|
page read and write
|
||
1EF583D1000
|
heap
|
page read and write
|
||
196000
|
stack
|
page read and write
|
||
1EF584E8000
|
heap
|
page read and write
|
||
1EF58255000
|
heap
|
page read and write
|
||
1EF56CD0000
|
trusted library allocation
|
page read and write
|
||
1EF56CCE000
|
trusted library allocation
|
page read and write
|
||
1EF56F40000
|
trusted library allocation
|
page read and write
|
||
161DEFD000
|
stack
|
page read and write
|
||
1EF56D0E000
|
trusted library allocation
|
page read and write
|
||
1EF5832E000
|
heap
|
page read and write
|
||
81D82FC000
|
stack
|
page read and write
|
||
23BE2A54000
|
heap
|
page read and write
|
||
1EF51E0A000
|
heap
|
page read and write
|
||
3FB65DB000
|
stack
|
page read and write
|
||
1EF5837D000
|
heap
|
page read and write
|
||
81D84FD000
|
stack
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
1A97AC5D000
|
heap
|
page read and write
|
||
1C52528D000
|
heap
|
page read and write
|
||
1EF51F86000
|
heap
|
page read and write
|
||
1EF5845C000
|
heap
|
page read and write
|
||
1EF5837C000
|
heap
|
page read and write
|
||
837317F000
|
stack
|
page read and write
|
||
1EF51FD8000
|
heap
|
page read and write
|
||
1EF58610000
|
heap
|
page read and write
|
||
F77737F000
|
stack
|
page read and write
|
||
1EF58495000
|
heap
|
page read and write
|
||
1B0000
|
remote allocation
|
page read and write
|
||
1B0000
|
remote allocation
|
page read and write
|
||
269BBA02000
|
trusted library allocation
|
page read and write
|
||
1EF5863F000
|
heap
|
page read and write
|
||
81D7FFF000
|
stack
|
page read and write
|
||
1EF584CA000
|
heap
|
page read and write
|
||
13BB2653000
|
heap
|
page read and write
|
||
1EF56CC8000
|
trusted library allocation
|
page read and write
|
||
258AAE71000
|
heap
|
page read and write
|
||
1EF58269000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
1EF56CDC000
|
trusted library allocation
|
page read and write
|
||
46DE3F7000
|
stack
|
page read and write
|
||
2179A9C0000
|
trusted library allocation
|
page read and write
|
||
1FE54A29000
|
heap
|
page read and write
|
||
1EF58436000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
1EF5866C000
|
heap
|
page read and write
|
||
939000
|
heap
|
page read and write
|
||
1EF5843B000
|
heap
|
page read and write
|
||
1EF5867E000
|
heap
|
page read and write
|
||
81D7CFB000
|
stack
|
page read and write
|
||
1EF584EA000
|
heap
|
page read and write
|
||
18F20E75000
|
heap
|
page read and write
|
||
26BC8D70000
|
heap
|
page read and write
|
||
2B2E2A4D000
|
heap
|
page read and write
|
||
1005FE000
|
stack
|
page read and write
|
||
2E5ABFE000
|
stack
|
page read and write
|
||
1EF51D26000
|
heap
|
page read and write
|
||
1EF56EC0000
|
trusted library allocation
|
page read and write
|
||
1EF58485000
|
heap
|
page read and write
|
||
A6F5D77000
|
stack
|
page read and write
|
||
1FE54A86000
|
heap
|
page read and write
|
||
1A97AC81000
|
heap
|
page read and write
|
||
1EF58494000
|
heap
|
page read and write
|
||
269BB468000
|
heap
|
page read and write
|
||
1C525060000
|
heap
|
page read and write
|
||
1EF56CCE000
|
trusted library allocation
|
page read and write
|
||
C7A287E000
|
stack
|
page read and write
|
||
1EF58474000
|
heap
|
page read and write
|
||
1EF58409000
|
heap
|
page read and write
|
||
3FB6DFF000
|
stack
|
page read and write
|
||
1EF58256000
|
heap
|
page read and write
|
||
1EF58667000
|
heap
|
page read and write
|
||
23BE2800000
|
heap
|
page read and write
|
||
46DEE7C000
|
stack
|
page read and write
|
||
1A97AC69000
|
heap
|
page read and write
|
||
2179547B000
|
heap
|
page read and write
|
||
2B2E2A29000
|
heap
|
page read and write
|
||
1EF56E10000
|
trusted library allocation
|
page read and write
|
||
1EF56E3C000
|
trusted library allocation
|
page read and write
|
||
1EF5848C000
|
heap
|
page read and write
|
||
1EF58651000
|
heap
|
page read and write
|
||
1EF51F75000
|
heap
|
page read and write
|
||
1EF58419000
|
heap
|
page read and write
|
||
1B0000
|
remote allocation
|
page read and write
|
||
1EF56CC0000
|
trusted library allocation
|
page read and write
|
||
26BC8F60000
|
heap
|
page read and write
|
||
A6F570B000
|
stack
|
page read and write
|
||
1EF58080000
|
remote allocation
|
page read and write
|
||
1EF58441000
|
heap
|
page read and write
|
||
2B2E2A77000
|
heap
|
page read and write
|
||
1EF58442000
|
heap
|
page read and write
|
||
1EF51454000
|
heap
|
page read and write
|
||
1A6C7A29000
|
heap
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
1EF58660000
|
heap
|
page read and write
|
||
1EF5824D000
|
heap
|
page read and write
|
||
1EF5838C000
|
heap
|
page read and write
|
||
1EF56CD8000
|
trusted library allocation
|
page read and write
|
||
23BE2A00000
|
heap
|
page read and write
|
||
1EF5846F000
|
heap
|
page read and write
|
||
1EF58648000
|
heap
|
page read and write
|
||
2179AAC0000
|
trusted library allocation
|
page read and write
|
||
18F20E5E000
|
heap
|
page read and write
|
||
1A6C79B0000
|
heap
|
page read and write
|
||
21795413000
|
heap
|
page read and write
|
||
52B000
|
remote allocation
|
page execute and read and write
|
||
2179ACE8000
|
heap
|
page read and write
|
||
21795380000
|
trusted library section
|
page read and write
|
||
1C5250D0000
|
heap
|
page read and write
|
||
1C525282000
|
heap
|
page read and write
|
||
18F20E61000
|
heap
|
page read and write
|
||
1EF58656000
|
heap
|
page read and write
|
||
1EF5831D000
|
heap
|
page read and write
|
||
3FB687D000
|
stack
|
page read and write
|
||
18F20F02000
|
heap
|
page read and write
|
||
1EF56E30000
|
trusted library allocation
|
page read and write
|
||
C7A23BA000
|
stack
|
page read and write
|
||
2179AAF0000
|
trusted library allocation
|
page read and write
|
||
12F2F43D000
|
heap
|
page read and write
|
||
12F2F320000
|
heap
|
page read and write
|
||
1EF51429000
|
heap
|
page read and write
|
||
1EF56F90000
|
trusted library allocation
|
page read and write
|
||
18F20D90000
|
trusted library allocation
|
page read and write
|
||
2B2E2A70000
|
heap
|
page read and write
|
||
1EF5833F000
|
heap
|
page read and write
|
||
18F20E58000
|
heap
|
page read and write
|
||
2179AA70000
|
trusted library allocation
|
page read and write
|
||
1EF58472000
|
heap
|
page read and write
|
||
1EF583CF000
|
heap
|
page read and write
|
||
1EF584AA000
|
heap
|
page read and write
|
||
1EF51400000
|
heap
|
page read and write
|
||
2B2E2B08000
|
heap
|
page read and write
|
||
21795BA0000
|
trusted library section
|
page readonly
|
||
1EF58253000
|
heap
|
page read and write
|
||
1EF5845F000
|
heap
|
page read and write
|
||
1EF58615000
|
heap
|
page read and write
|
||
2B2E28F0000
|
heap
|
page read and write
|
||
1EF56D25000
|
trusted library allocation
|
page read and write
|
||
7618577000
|
stack
|
page read and write
|
||
1A97A990000
|
heap
|
page read and write
|
||
1EF56E30000
|
trusted library allocation
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
2179A9E4000
|
trusted library allocation
|
page read and write
|
||
1B0000
|
remote allocation
|
page read and write
|
||
18F20E3C000
|
heap
|
page read and write
|
||
2179A880000
|
trusted library allocation
|
page read and write
|
||
1EF56CC0000
|
trusted library allocation
|
page read and write
|
||
1EF5832D000
|
heap
|
page read and write
|
||
21795441000
|
heap
|
page read and write
|
||
1EF584DC000
|
heap
|
page read and write
|
||
1EF58628000
|
heap
|
page read and write
|
||
2179ACDC000
|
heap
|
page read and write
|
||
1EF51F54000
|
heap
|
page read and write
|
||
1EF583A1000
|
heap
|
page read and write
|
||
880000
|
heap
|
page read and write
|
||
1EF584A8000
|
heap
|
page read and write
|
||
1EF56D60000
|
trusted library allocation
|
page read and write
|
||
1EF51D25000
|
heap
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
46DE6FE000
|
stack
|
page read and write
|
||
1EF51D0A000
|
heap
|
page read and write
|
||
1EF56CD8000
|
trusted library allocation
|
page read and write
|
||
12F2F3E0000
|
remote allocation
|
page read and write
|
||
1EF56CDE000
|
trusted library allocation
|
page read and write
|
||
F7775FB000
|
stack
|
page read and write
|
||
1EF56E30000
|
trusted library allocation
|
page read and write
|
||
1FE55300000
|
heap
|
page read and write
|
||
1EF58395000
|
heap
|
page read and write
|
||
21795429000
|
heap
|
page read and write
|
||
1EF51488000
|
heap
|
page read and write
|
||
2179A9C1000
|
trusted library allocation
|
page read and write
|
||
1EF56E3C000
|
trusted library allocation
|
page read and write
|
||
161DC7D000
|
stack
|
page read and write
|
||
23BE2A3C000
|
heap
|
page read and write
|
||
1EF56E20000
|
trusted library allocation
|
page read and write
|
||
1EF58258000
|
heap
|
page read and write
|
||
1EF584A5000
|
heap
|
page read and write
|
||
2E5ADF9000
|
stack
|
page read and write
|
||
1A6C7A02000
|
heap
|
page read and write
|
||
13BB2629000
|
heap
|
page read and write
|
||
269BB479000
|
heap
|
page read and write
|
||
1EF5844A000
|
heap
|
page read and write
|
||
46DDFAC000
|
stack
|
page read and write
|
||
258AABF0000
|
heap
|
page read and write
|
||
8372D7F000
|
stack
|
page read and write
|
||
1EF58617000
|
heap
|
page read and write
|
||
1B0000
|
remote allocation
|
page read and write
|
||
1EF584F3000
|
heap
|
page read and write
|
||
282A000
|
heap
|
page read and write
|
||
2179548E000
|
heap
|
page read and write
|
||
1EF584E0000
|
heap
|
page read and write
|
||
1EF584F4000
|
heap
|
page read and write
|
||
13BB2590000
|
heap
|
page read and write
|
||
258AAF02000
|
heap
|
page read and write
|
||
18F21602000
|
trusted library allocation
|
page read and write
|
||
269BB500000
|
heap
|
page read and write
|
||
1EF51DF4000
|
heap
|
page read and write
|
||
269BB9A0000
|
trusted library allocation
|
page read and write
|
||
529000
|
remote allocation
|
page execute and read and write
|
||
46DF07E000
|
stack
|
page read and write
|
||
1EF5822F000
|
heap
|
page read and write
|
||
12F2FC02000
|
trusted library allocation
|
page read and write
|
||
1EF5860E000
|
heap
|
page read and write
|
||
ABF000
|
stack
|
page read and write
|
||
21795458000
|
heap
|
page read and write
|
||
1EF56CDC000
|
trusted library allocation
|
page read and write
|
||
1EF56CC0000
|
trusted library allocation
|
page read and write
|
||
18F20D00000
|
heap
|
page read and write
|
||
1A6C7A00000
|
heap
|
page read and write
|
||
1EF5839D000
|
heap
|
page read and write
|
||
18F20E63000
|
heap
|
page read and write
|
||
1B0000
|
remote allocation
|
page read and write
|
||
1EF5843D000
|
heap
|
page read and write
|
||
1EF56CBC000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1EF58441000
|
heap
|
page read and write
|
||
1EF51E23000
|
heap
|
page read and write
|
||
1EF58237000
|
heap
|
page read and write
|
||
1EF56F60000
|
trusted library allocation
|
page read and write
|
||
41BF000
|
stack
|
page read and write
|
||
46DEBFE000
|
stack
|
page read and write
|
||
13BB2637000
|
heap
|
page read and write
|
||
258AAF00000
|
heap
|
page read and write
|
||
1EF584EF000
|
heap
|
page read and write
|
||
1EF58358000
|
heap
|
page read and write
|
||
1EF52AB0000
|
trusted library section
|
page readonly
|
||
1EF583D1000
|
heap
|
page read and write
|
||
1C525276000
|
heap
|
page read and write
|
||
1EF5867B000
|
heap
|
page read and write
|
||
1EF524C0000
|
trusted library allocation
|
page read and write
|
||
258AAD50000
|
trusted library allocation
|
page read and write
|
||
21795493000
|
heap
|
page read and write
|
||
2179AC2D000
|
heap
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
1EF5860A000
|
heap
|
page read and write
|
||
1FE54A13000
|
heap
|
page read and write
|
||
21795340000
|
heap
|
page read and write
|
||
1EF58365000
|
heap
|
page read and write
|
||
2CDE000
|
stack
|
page read and write
|
||
1EF5848F000
|
heap
|
page read and write
|
||
1EF51513000
|
heap
|
page read and write
|
||
1A97AC52000
|
heap
|
page read and write
|
||
1EF584BD000
|
heap
|
page read and write
|
||
21795D02000
|
heap
|
page read and write
|
||
1EF58318000
|
heap
|
page read and write
|
||
93A000
|
heap
|
page read and write
|
||
1EF5849B000
|
heap
|
page read and write
|
||
1EF56CD2000
|
trusted library allocation
|
page read and write
|
||
1EF584F7000
|
heap
|
page read and write
|
||
12F2F380000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
2179AC0E000
|
heap
|
page read and write
|
||
1EF584A6000
|
heap
|
page read and write
|
||
1EF584AC000
|
heap
|
page read and write
|
||
1EF584D1000
|
heap
|
page read and write
|
||
1EF58437000
|
heap
|
page read and write
|
||
91A000
|
heap
|
page read and write
|
||
18F20E57000
|
heap
|
page read and write
|
||
1EF5839B000
|
heap
|
page read and write
|
||
269BB1E0000
|
heap
|
page read and write
|
||
1EF52AF0000
|
trusted library allocation
|
page read and write
|
||
1EF583F6000
|
heap
|
page read and write
|
||
1EF58444000
|
heap
|
page read and write
|
||
269BB1D0000
|
heap
|
page read and write
|
||
1FE54AE1000
|
heap
|
page read and write
|
||
6C7000
|
heap
|
page read and write
|
||
21795BE0000
|
trusted library section
|
page readonly
|
||
1EF52A90000
|
trusted library section
|
page readonly
|
||
1A97AC56000
|
heap
|
page read and write
|
||
C7A2779000
|
stack
|
page read and write
|
||
269BB402000
|
heap
|
page read and write
|
||
1A6C7A72000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
2E5ACFF000
|
stack
|
page read and write
|
||
F7776F7000
|
stack
|
page read and write
|
||
1EF52A80000
|
trusted library section
|
page readonly
|
||
1EF56CA0000
|
trusted library allocation
|
page read and write
|
||
1EF5832F000
|
heap
|
page read and write
|
||
761807C000
|
stack
|
page read and write
|
||
1EF51443000
|
heap
|
page read and write
|
||
23BE2B02000
|
heap
|
page read and write
|
||
1EF58419000
|
heap
|
page read and write
|
||
1EF583ED000
|
heap
|
page read and write
|
||
1EF5860C000
|
heap
|
page read and write
|
||
1C525276000
|
heap
|
page read and write
|
||
5AEA67E000
|
stack
|
page read and write
|
||
252E000
|
unkown
|
page readonly
|
||
46DED7F000
|
stack
|
page read and write
|
||
1EF58692000
|
heap
|
page read and write
|
||
23BE2790000
|
heap
|
page read and write
|
||
1EF56E20000
|
trusted library allocation
|
page read and write
|
||
1EF58444000
|
heap
|
page read and write
|
||
21795370000
|
trusted library allocation
|
page read and write
|
||
7617E7C000
|
stack
|
page read and write
|
||
1EF5843B000
|
heap
|
page read and write
|
||
1EF56E3C000
|
trusted library allocation
|
page read and write
|
||
1EF56F00000
|
trusted library allocation
|
page read and write
|
||
93D000
|
heap
|
page read and write
|
||
81D81FB000
|
stack
|
page read and write
|
||
1EF58243000
|
heap
|
page read and write
|
||
26BC8F65000
|
heap
|
page read and write
|
||
1EF5843D000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1EF56CE2000
|
trusted library allocation
|
page read and write
|
||
1A6C7A78000
|
heap
|
page read and write
|
||
46DECFD000
|
stack
|
page read and write
|
||
13BB2D40000
|
trusted library allocation
|
page read and write
|
||
2179A9C4000
|
trusted library allocation
|
page read and write
|
||
1EF5864F000
|
heap
|
page read and write
|
||
252E000
|
unkown
|
page readonly
|
||
1EF51D33000
|
heap
|
page read and write
|
||
46DEB7D000
|
stack
|
page read and write
|
||
1EF52990000
|
trusted library allocation
|
page read and write
|
||
1EF58439000
|
heap
|
page read and write
|
||
1EF58433000
|
heap
|
page read and write
|
||
1EF56E3C000
|
trusted library allocation
|
page read and write
|
||
258AAC50000
|
heap
|
page read and write
|
||
1EF586DB000
|
heap
|
page read and write
|
||
18F20E55000
|
heap
|
page read and write
|
||
258AABE0000
|
heap
|
page read and write
|
||
1EF5830E000
|
heap
|
page read and write
|
||
1EF58672000
|
heap
|
page read and write
|
||
21795C15000
|
heap
|
page read and write
|
||
1EF5849E000
|
heap
|
page read and write
|
||
1EF51D73000
|
heap
|
page read and write
|
||
1EF5146E000
|
heap
|
page read and write
|
||
931000
|
heap
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
1EF5841D000
|
heap
|
page read and write
|
||
1EF56CDA000
|
trusted library allocation
|
page read and write
|
||
2179ACFD000
|
heap
|
page read and write
|
||
1A6C7B02000
|
heap
|
page read and write
|
||
6C0000
|
heap
|
page read and write
|
||
2820000
|
heap
|
page read and write
|
||
1C525200000
|
heap
|
page read and write
|
||
13BB2625000
|
heap
|
page read and write
|
||
1EF51DC3000
|
heap
|
page read and write
|
||
1EF56E30000
|
trusted library allocation
|
page read and write
|
||
1EF58319000
|
heap
|
page read and write
|
||
291E000
|
stack
|
page read and write
|
||
1EF51FFF000
|
heap
|
page read and write
|
||
2179AD02000
|
heap
|
page read and write
|
||
1C525261000
|
heap
|
page read and write
|
||
F7777FD000
|
stack
|
page read and write
|
||
1A97AD08000
|
heap
|
page read and write
|
||
18F20E48000
|
heap
|
page read and write
|
||
1A97AD00000
|
heap
|
page read and write
|
||
1EF58675000
|
heap
|
page read and write
|
||
1006FE000
|
stack
|
page read and write
|
||
1EF58302000
|
heap
|
page read and write
|
||
1FE54ACB000
|
heap
|
page read and write
|
||
1EF5833F000
|
heap
|
page read and write
|
||
1C525213000
|
heap
|
page read and write
|
||
B633E7B000
|
stack
|
page read and write
|
||
1EF584AB000
|
heap
|
page read and write
|
||
1EF5867A000
|
heap
|
page read and write
|
||
1EF58323000
|
heap
|
page read and write
|
||
1C525256000
|
heap
|
page read and write
|
||
1EF56B10000
|
trusted library allocation
|
page read and write
|
||
68300FF000
|
stack
|
page read and write
|
||
12F2F502000
|
heap
|
page read and write
|
||
18F20E6B000
|
heap
|
page read and write
|
||
1EF56CC0000
|
trusted library allocation
|
page read and write
|
||
23BE2A70000
|
heap
|
page read and write
|
||
5AEA17A000
|
stack
|
page read and write
|
||
1EF584C1000
|
heap
|
page read and write
|
||
1000FE000
|
stack
|
page read and write
|
||
1EF56CC0000
|
trusted library allocation
|
page read and write
|
||
2A5D000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
1EF584BB000
|
heap
|
page read and write
|
||
2179AC3F000
|
heap
|
page read and write
|
||
1EF5848D000
|
heap
|
page read and write
|
||
264E000
|
stack
|
page read and write
|
||
2179AC8A000
|
heap
|
page read and write
|
||
18F20E59000
|
heap
|
page read and write
|
||
1EF56DF0000
|
trusted library allocation
|
page read and write
|
||
1EF513B0000
|
trusted library allocation
|
page read and write
|
||
1EF52AD1000
|
trusted library allocation
|
page read and write
|
||
23BE2A29000
|
heap
|
page read and write
|
||
682FC7E000
|
stack
|
page read and write
|
||
1EF58658000
|
heap
|
page read and write
|
||
1EF5838E000
|
heap
|
page read and write
|
||
83728FF000
|
stack
|
page read and write
|
||
761817B000
|
stack
|
page read and write
|
||
1EF584C2000
|
heap
|
page read and write
|
||
13BB2613000
|
heap
|
page read and write
|
||
68301FD000
|
stack
|
page read and write
|
||
1A97AA00000
|
heap
|
page read and write
|
||
21795456000
|
heap
|
page read and write
|
||
1EF51E00000
|
heap
|
page read and write
|
||
2B2E2A8E000
|
heap
|
page read and write
|
||
1EF56CD4000
|
trusted library allocation
|
page read and write
|
||
27CF000
|
stack
|
page read and write
|
||
90D000
|
heap
|
page read and write
|
||
7617EFE000
|
stack
|
page read and write
|
||
2179A9D0000
|
trusted library allocation
|
page read and write
|
||
21795400000
|
heap
|
page read and write
|
||
1EF52A70000
|
trusted library section
|
page readonly
|
||
1EF584A2000
|
heap
|
page read and write
|
||
2DDE000
|
stack
|
page read and write
|
||
1EF51E02000
|
heap
|
page read and write
|
||
10017E000
|
stack
|
page read and write
|
||
21795471000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
1EF51390000
|
trusted library allocation
|
page read and write
|
||
1EF51492000
|
heap
|
page read and write
|
||
1EF56CD0000
|
trusted library allocation
|
page read and write
|
||
2179B000000
|
heap
|
page read and write
|
||
18F20E4D000
|
heap
|
page read and write
|
||
1EF56E20000
|
trusted library allocation
|
page read and write
|
||
1EF5866D000
|
heap
|
page read and write
|
||
1A6C8202000
|
trusted library allocation
|
page read and write
|
||
1EF51DB3000
|
heap
|
page read and write
|
||
1001FE000
|
stack
|
page read and write
|
||
3FB6AFB000
|
stack
|
page read and write
|
||
1EF58380000
|
heap
|
page read and write
|
||
23BE3002000
|
trusted library allocation
|
page read and write
|
||
1EF583F9000
|
heap
|
page read and write
|
||
83726FA000
|
stack
|
page read and write
|
||
1EF5822C000
|
heap
|
page read and write
|
||
258AB602000
|
trusted library allocation
|
page read and write
|
||
1EF58613000
|
heap
|
page read and write
|
||
1EF56E3C000
|
trusted library allocation
|
page read and write
|
||
258AAE29000
|
heap
|
page read and write
|
||
3FB68FE000
|
stack
|
page read and write
|
||
2B2E2B00000
|
heap
|
page read and write
|
||
1EF5846A000
|
heap
|
page read and write
|
||
1A97B202000
|
trusted library allocation
|
page read and write
|
||
1EF58470000
|
heap
|
page read and write
|
||
52B000
|
remote allocation
|
page execute and read and write
|
||
21795BF3000
|
trusted library allocation
|
page read and write
|
||
939000
|
heap
|
page read and write
|
||
1EF56E90000
|
trusted library allocation
|
page read and write
|
||
1EF5847E000
|
heap
|
page read and write
|
||
1EF58444000
|
heap
|
page read and write
|
||
1EF56E34000
|
trusted library allocation
|
page read and write
|
||
1EF5843B000
|
heap
|
page read and write
|
||
83727FF000
|
stack
|
page read and write
|
||
3FB69FC000
|
stack
|
page read and write
|
||
44E0000
|
heap
|
page read and write
|
||
46DE97E000
|
stack
|
page read and write
|
||
1EF51DD1000
|
heap
|
page read and write
|
||
1EF51220000
|
heap
|
page read and write
|
||
1EF56CC8000
|
trusted library allocation
|
page read and write
|
||
1EF58200000
|
heap
|
page read and write
|
||
2B2E2A52000
|
heap
|
page read and write
|
||
1EF52740000
|
trusted library allocation
|
page read and write
|
||
1EF51E5A000
|
heap
|
page read and write
|
||
217954FD000
|
heap
|
page read and write
|
||
258AAE3C000
|
heap
|
page read and write
|
||
1EF5822D000
|
heap
|
page read and write
|
||
1EF51F95000
|
heap
|
page read and write
|
||
4A8000
|
unkown
|
page write copy
|
||
1C525278000
|
heap
|
page read and write
|
||
12F2F3B0000
|
trusted library allocation
|
page read and write
|
||
4A8000
|
unkown
|
page write copy
|
||
18F20E42000
|
heap
|
page read and write
|
||
1EF58439000
|
heap
|
page read and write
|
||
1EF58356000
|
heap
|
page read and write
|
||
1EF58380000
|
heap
|
page read and write
|
||
1EF5861C000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1EF57010000
|
heap
|
page read and write
|
||
4A8000
|
unkown
|
page write copy
|
||
83734FE000
|
stack
|
page read and write
|
||
13BB262F000
|
heap
|
page read and write
|
||
F7772FF000
|
stack
|
page read and write
|
||
1EF51F6A000
|
heap
|
page read and write
|
||
1EF56B00000
|
trusted library allocation
|
page read and write
|
||
252B000
|
unkown
|
page read and write
|
||
217953E1000
|
trusted library allocation
|
page read and write
|
||
1A97AC60000
|
heap
|
page read and write
|
||
1EF58439000
|
heap
|
page read and write
|
||
1EF56CD4000
|
trusted library allocation
|
page read and write
|
||
1EF58347000
|
heap
|
page read and write
|
||
1EF5866A000
|
heap
|
page read and write
|
||
F7774FF000
|
stack
|
page read and write
|
||
1EF51E1B000
|
heap
|
page read and write
|
||
1EF5824F000
|
heap
|
page read and write
|
||
1EF57010000
|
heap
|
page read and write
|
||
46DE4FA000
|
stack
|
page read and write
|
||
1EF58448000
|
heap
|
page read and write
|
||
1A6C7950000
|
heap
|
page read and write
|
||
1EF56CD2000
|
trusted library allocation
|
page read and write
|
||
1EF58456000
|
heap
|
page read and write
|
||
1FE54AC1000
|
heap
|
page read and write
|
||
18F20E60000
|
heap
|
page read and write
|
||
1EF58630000
|
heap
|
page read and write
|
||
1EF515C2000
|
heap
|
page read and write
|
||
2179AB00000
|
remote allocation
|
page read and write
|
||
12F2F310000
|
heap
|
page read and write
|
||
1A97AC75000
|
heap
|
page read and write
|
||
1EF51D94000
|
heap
|
page read and write
|
||
1FE55202000
|
heap
|
page read and write
|
||
2179A9D0000
|
trusted library allocation
|
page read and write
|
||
1EF586BA000
|
heap
|
page read and write
|
||
1EF51FC5000
|
heap
|
page read and write
|
||
2B2E2900000
|
heap
|
page read and write
|
||
1EF56E34000
|
trusted library allocation
|
page read and write
|
||
8372E7A000
|
stack
|
page read and write
|
||
1EF584D2000
|
heap
|
page read and write
|
||
1EF58390000
|
heap
|
page read and write
|
||
1EF584D4000
|
heap
|
page read and write
|
||
1EF51425000
|
heap
|
page read and write
|
||
18F20E7A000
|
heap
|
page read and write
|
||
1EF584DA000
|
heap
|
page read and write
|
||
5AEA97F000
|
stack
|
page read and write
|
||
1A97AC61000
|
heap
|
page read and write
|
||
1EF583C3000
|
heap
|
page read and write
|
||
18F20E13000
|
heap
|
page read and write
|
||
1EF58354000
|
heap
|
page read and write
|
||
83729FB000
|
stack
|
page read and write
|
||
1EF584E3000
|
heap
|
page read and write
|
||
21795B90000
|
trusted library section
|
page readonly
|
||
1EF51443000
|
heap
|
page read and write
|
||
A6F578E000
|
stack
|
page read and write
|
||
1EF5848E000
|
heap
|
page read and write
|
||
68E000
|
stack
|
page read and write
|
||
269BB43E000
|
heap
|
page read and write
|
||
21795D18000
|
heap
|
page read and write
|
||
1EF5838A000
|
heap
|
page read and write
|
||
1EF584D1000
|
heap
|
page read and write
|
||
8C7000
|
heap
|
page read and write
|
||
1EF58638000
|
heap
|
page read and write
|
||
1EF58481000
|
heap
|
page read and write
|
||
1EF58497000
|
heap
|
page read and write
|
||
23BE2B00000
|
heap
|
page read and write
|
||
1A97ABD0000
|
trusted library allocation
|
page read and write
|
||
1EF58632000
|
heap
|
page read and write
|
||
252E000
|
unkown
|
page readonly
|
||
2E5A7DC000
|
stack
|
page read and write
|
||
5AEAA7F000
|
stack
|
page read and write
|
||
18F20E7E000
|
heap
|
page read and write
|
||
1A6C7B13000
|
heap
|
page read and write
|
||
1EF58328000
|
heap
|
page read and write
|
||
1EF58130000
|
trusted library allocation
|
page read and write
|
||
1EF56CA1000
|
trusted library allocation
|
page read and write
|
||
2179ACFF000
|
heap
|
page read and write
|
||
23BE27A0000
|
heap
|
page read and write
|
||
1C525229000
|
heap
|
page read and write
|
||
1EF5843F000
|
heap
|
page read and write
|
||
13BB2602000
|
heap
|
page read and write
|
||
1EF58413000
|
heap
|
page read and write
|
||
1EF51FAE000
|
heap
|
page read and write
|
||
1FE55332000
|
heap
|
page read and write
|
||
1EF56E80000
|
trusted library allocation
|
page read and write
|
||
1A6C7A13000
|
heap
|
page read and write
|
||
2179A9AE000
|
trusted library allocation
|
page read and write
|
||
1EF58427000
|
heap
|
page read and write
|
||
1EF5146C000
|
heap
|
page read and write
|
||
1C525300000
|
heap
|
page read and write
|
||
1EF51FB0000
|
heap
|
page read and write
|
||
10007C000
|
stack
|
page read and write
|
||
1EF56D0A000
|
trusted library allocation
|
page read and write
|
||
1EF584F6000
|
heap
|
page read and write
|
||
4480000
|
heap
|
page read and write
|
||
1B0000
|
remote allocation
|
page read and write
|
||
2B2E2A00000
|
heap
|
page read and write
|
||
1EF583D7000
|
heap
|
page read and write
|
||
3FB6CFF000
|
stack
|
page read and write
|
||
23BE2A78000
|
heap
|
page read and write
|
||
217952D0000
|
heap
|
page read and write
|
||
1EF56CC0000
|
trusted library allocation
|
page read and write
|
||
2179AAB0000
|
trusted library allocation
|
page read and write
|
||
1EF584CC000
|
heap
|
page read and write
|
||
1EF5823F000
|
heap
|
page read and write
|
||
1EF583CF000
|
heap
|
page read and write
|
||
1EF58631000
|
heap
|
page read and write
|
||
2179A800000
|
trusted library allocation
|
page read and write
|
||
1EF584C5000
|
heap
|
page read and write
|
||
1EF583F4000
|
heap
|
page read and write
|
||
2B2E2960000
|
heap
|
page read and write
|
||
1EF5832A000
|
heap
|
page read and write
|
||
1EF586A9000
|
heap
|
page read and write
|
||
81D817E000
|
stack
|
page read and write
|
||
1EF58483000
|
heap
|
page read and write
|
||
13BB2580000
|
heap
|
page read and write
|
||
21795BB0000
|
trusted library section
|
page readonly
|
||
1EF58300000
|
heap
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
B63447E000
|
stack
|
page read and write
|
||
2179ACFF000
|
heap
|
page read and write
|
||
23BE2A13000
|
heap
|
page read and write
|
||
1EF56E34000
|
trusted library allocation
|
page read and write
|
||
1EF56CA0000
|
trusted library allocation
|
page read and write
|
||
18F20E2C000
|
heap
|
page read and write
|
||
1EF56CD6000
|
trusted library allocation
|
page read and write
|
||
1EF51C00000
|
heap
|
page read and write
|
||
1EF5866E000
|
heap
|
page read and write
|
||
1EF56CDE000
|
trusted library allocation
|
page read and write
|
||
1EF5864C000
|
heap
|
page read and write
|
||
2179AC2B000
|
heap
|
page read and write
|
||
1A6C7A41000
|
heap
|
page read and write
|
||
2179AC63000
|
heap
|
page read and write
|
||
1EF58646000
|
heap
|
page read and write
|
||
18F20E5D000
|
heap
|
page read and write
|
||
2179AB00000
|
remote allocation
|
page read and write
|
||
269BB464000
|
heap
|
page read and write
|
||
52B000
|
remote allocation
|
page execute and read and write
|
||
1EF58382000
|
heap
|
page read and write
|
||
A6F5F7F000
|
stack
|
page read and write
|
||
1EF51230000
|
heap
|
page read and write
|
||
1EF584B4000
|
heap
|
page read and write
|
||
1EF584AA000
|
heap
|
page read and write
|
||
1EF583FF000
|
heap
|
page read and write
|
||
12F2F429000
|
heap
|
page read and write
|
||
1EF58443000
|
heap
|
page read and write
|
||
2E20000
|
remote allocation
|
page read and write
|
||
1EF58458000
|
heap
|
page read and write
|
||
269BB400000
|
heap
|
page read and write
|
||
1EF56E34000
|
trusted library allocation
|
page read and write
|
||
1A97AC67000
|
heap
|
page read and write
|
||
1EF51458000
|
heap
|
page read and write
|
||
1EF56CC0000
|
trusted library allocation
|
page read and write
|
||
26BC8D50000
|
heap
|
page read and write
|
||
1EF58654000
|
heap
|
page read and write
|
||
2179ACB2000
|
heap
|
page read and write
|
||
18F20E68000
|
heap
|
page read and write
|
||
1C525302000
|
heap
|
page read and write
|
||
1EF58248000
|
heap
|
page read and write
|
||
269BB502000
|
heap
|
page read and write
|
||
46DE8FE000
|
stack
|
page read and write
|
||
269E000
|
stack
|
page read and write
|
||
1EF5862D000
|
heap
|
page read and write
|
||
252E000
|
unkown
|
page readonly
|
||
2F5F000
|
stack
|
page read and write
|
||
1EF583FF000
|
heap
|
page read and write
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
1EF52AC0000
|
trusted library section
|
page readonly
|
||
682FCFE000
|
stack
|
page read and write
|
||
21795502000
|
heap
|
page read and write
|
||
C7A27FD000
|
stack
|
page read and write
|
||
1EF58326000
|
heap
|
page read and write
|
||
13BB2702000
|
heap
|
page read and write
|
||
8372C7C000
|
stack
|
page read and write
|
||
2179A890000
|
trusted library allocation
|
page read and write
|
||
1FE54A6B000
|
heap
|
page read and write
|
||
1EF51FFC000
|
heap
|
page read and write
|
||
1EF584EC000
|
heap
|
page read and write
|
||
1EF56D40000
|
trusted library allocation
|
page read and write
|
||
1EF5843B000
|
heap
|
page read and write
|
||
1EF56CD0000
|
trusted library allocation
|
page read and write
|
||
2179A9A0000
|
trusted library allocation
|
page read and write
|
||
1EF56CA0000
|
trusted library allocation
|
page read and write
|
||
1EF56FC3000
|
trusted library allocation
|
page read and write
|
||
258AADA0000
|
unkown
|
page write copy
|
||
1EF58491000
|
heap
|
page read and write
|
||
1EF58350000
|
heap
|
page read and write
|
||
1EF5825F000
|
heap
|
page read and write
|
||
83730FE000
|
stack
|
page read and write
|
||
1EF584AC000
|
heap
|
page read and write
|
||
1EF56E34000
|
trusted library allocation
|
page read and write
|
||
1EF583AF000
|
heap
|
page read and write
|
||
269BB456000
|
heap
|
page read and write
|
||
161D8FE000
|
stack
|
page read and write
|
||
2179A9A8000
|
trusted library allocation
|
page read and write
|
||
1EF58436000
|
heap
|
page read and write
|
||
1EF58470000
|
heap
|
page read and write
|
||
2F71000
|
heap
|
page read and write
|
||
2179549D000
|
heap
|
page read and write
|
||
2179548C000
|
heap
|
page read and write
|
||
A6F5A7E000
|
stack
|
page read and write
|
||
1EF58653000
|
heap
|
page read and write
|
||
18F20E74000
|
heap
|
page read and write
|
||
1EF5849F000
|
heap
|
page read and write
|
||
1EF58493000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
1EF5148A000
|
heap
|
page read and write
|
||
1EF5143C000
|
heap
|
page read and write
|
||
1EF51D00000
|
heap
|
page read and write
|
||
161D54B000
|
stack
|
page read and write
|
||
1EF58434000
|
heap
|
page read and write
|
||
2E5AEFE000
|
stack
|
page read and write
|
||
8372F7B000
|
stack
|
page read and write
|
||
21795476000
|
heap
|
page read and write
|
||
269F000
|
stack
|
page read and write
|
||
1EF52AA0000
|
trusted library section
|
page readonly
|
||
1EF51FDF000
|
heap
|
page read and write
|
||
8372A79000
|
stack
|
page read and write
|
||
1EF5847A000
|
heap
|
page read and write
|
||
1EF51DCF000
|
heap
|
page read and write
|
||
2B5A000
|
stack
|
page read and write
|
||
1EF5867C000
|
heap
|
page read and write
|
||
18F20E29000
|
heap
|
page read and write
|
||
13BB2600000
|
heap
|
page read and write
|
||
2179ACE2000
|
heap
|
page read and write
|
||
1EF56CCC000
|
trusted library allocation
|
page read and write
|
||
837238B000
|
stack
|
page read and write
|
||
1EF51FFA000
|
heap
|
page read and write
|
||
1EF5846F000
|
heap
|
page read and write
|
||
12F2F413000
|
heap
|
page read and write
|
||
1EF5849D000
|
heap
|
page read and write
|
||
1EF583F6000
|
heap
|
page read and write
|
||
2A1F000
|
stack
|
page read and write
|
||
1EF56CE0000
|
trusted library allocation
|
page read and write
|
||
8372FFE000
|
stack
|
page read and write
|
||
1EF5865E000
|
heap
|
page read and write
|
||
1C52525E000
|
heap
|
page read and write
|
||
4A8000
|
unkown
|
page write copy
|
||
1EF51D31000
|
heap
|
page read and write
|
||
1EF58080000
|
remote allocation
|
page read and write
|
||
1EF56B90000
|
trusted library allocation
|
page read and write
|
||
1EF583C3000
|
heap
|
page read and write
|
||
1A6C7A6B000
|
heap
|
page read and write
|
||
1EF56E20000
|
trusted library allocation
|
page read and write
|
||
1EF58202000
|
heap
|
page read and write
|
||
161DA7E000
|
stack
|
page read and write
|
||
2179AB00000
|
trusted library allocation
|
page read and write
|
||
1EF51FFD000
|
heap
|
page read and write
|
||
1EF56EA0000
|
trusted library allocation
|
page read and write
|
||
83731FE000
|
stack
|
page read and write
|
||
18F20E6A000
|
heap
|
page read and write
|
||
1EF58643000
|
heap
|
page read and write
|
||
1EF583EA000
|
heap
|
page read and write
|
||
2179AC00000
|
heap
|
page read and write
|
||
1EF58400000
|
heap
|
page read and write
|
||
1EF58250000
|
heap
|
page read and write
|
||
7CF000
|
stack
|
page read and write
|
||
1EF58688000
|
heap
|
page read and write
|
||
1A97AC00000
|
heap
|
page read and write
|
||
1EF58484000
|
heap
|
page read and write
|
||
18F20E65000
|
heap
|
page read and write
|
||
1EF58405000
|
heap
|
page read and write
|
||
1EF51D35000
|
heap
|
page read and write
|
||
2B2E3202000
|
trusted library allocation
|
page read and write
|
||
1EF58670000
|
heap
|
page read and write
|
||
1EF58448000
|
heap
|
page read and write
|
||
2179ACFB000
|
heap
|
page read and write
|
||
1EF58499000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1EF56E20000
|
trusted library allocation
|
page read and write
|
||
1EF5158E000
|
heap
|
page read and write
|
||
26BC8D9E000
|
heap
|
page read and write
|
||
1EF5843F000
|
heap
|
page read and write
|
||
1EF58661000
|
heap
|
page read and write
|
||
1EF5862A000
|
heap
|
page read and write
|
||
1EF58633000
|
heap
|
page read and write
|
||
1EF51C15000
|
heap
|
page read and write
|
||
27DE000
|
stack
|
page read and write
|
||
890000
|
heap
|
page read and write
|
||
1A97AC5F000
|
heap
|
page read and write
|
||
1EF584C3000
|
heap
|
page read and write
|
||
1EF58642000
|
heap
|
page read and write
|
||
23BE2B13000
|
heap
|
page read and write
|
||
1EF58472000
|
heap
|
page read and write
|
||
18F20E84000
|
heap
|
page read and write
|
||
23BE2A4B000
|
heap
|
page read and write
|
||
46DE87E000
|
stack
|
page read and write
|
||
252E000
|
unkown
|
page readonly
|
||
21795D00000
|
heap
|
page read and write
|
||
2179AAD0000
|
trusted library allocation
|
page read and write
|
||
2B2E2B13000
|
heap
|
page read and write
|
||
1EF5864B000
|
heap
|
page read and write
|
||
12F2F424000
|
heap
|
page read and write
|
||
1007FF000
|
stack
|
page read and write
|
||
21795BC0000
|
trusted library section
|
page readonly
|
||
2179ACBC000
|
heap
|
page read and write
|
||
1EF58480000
|
heap
|
page read and write
|
||
1EF56D0E000
|
trusted library allocation
|
page read and write
|
||
1EF583D1000
|
heap
|
page read and write
|
||
1EF58213000
|
heap
|
page read and write
|
||
2B2E2A4B000
|
heap
|
page read and write
|
||
21795D18000
|
heap
|
page read and write
|
||
1EF58302000
|
heap
|
page read and write
|
||
1EF58344000
|
heap
|
page read and write
|
||
1EF56E70000
|
trusted library allocation
|
page read and write
|
||
81D7EFE000
|
stack
|
page read and write
|
||
1EF586EC000
|
heap
|
page read and write
|
||
1EF58439000
|
heap
|
page read and write
|
||
2E20000
|
remote allocation
|
page read and write
|
||
1EF51FE9000
|
heap
|
page read and write
|
||
1EF5841D000
|
heap
|
page read and write
|
||
18F20E2F000
|
heap
|
page read and write
|
||
1A6C7A58000
|
heap
|
page read and write
|
||
1EF58663000
|
heap
|
page read and write
|
||
1EF58677000
|
heap
|
page read and write
|
||
1EF56E3C000
|
trusted library allocation
|
page read and write
|
||
1EF58647000
|
heap
|
page read and write
|
||
1EF56E40000
|
trusted library allocation
|
page read and write
|
||
1EF58080000
|
remote allocation
|
page read and write
|
||
1EF584EB000
|
heap
|
page read and write
|
||
1EF5825C000
|
heap
|
page read and write
|
||
193000
|
stack
|
page read and write
|
||
2179A810000
|
trusted library allocation
|
page read and write
|
||
7617F7E000
|
stack
|
page read and write
|
||
1EF51DD3000
|
heap
|
page read and write
|
||
1EF58262000
|
heap
|
page read and write
|
||
252E000
|
unkown
|
page readonly
|
||
23BE2A4E000
|
heap
|
page read and write
|
||
279F000
|
stack
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
18F20E56000
|
heap
|
page read and write
|
||
1EF56D0A000
|
trusted library allocation
|
page read and write
|
||
1FE54B02000
|
heap
|
page read and write
|
||
1FE548B0000
|
heap
|
page read and write
|
||
1EF58621000
|
heap
|
page read and write
|
||
761847D000
|
stack
|
page read and write
|
||
269BB422000
|
heap
|
page read and write
|
||
21795BF0000
|
trusted library allocation
|
page read and write
|
||
21795525000
|
heap
|
page read and write
|
||
4A8000
|
unkown
|
page write copy
|
||
F7778FF000
|
stack
|
page read and write
|
||
1FE54B13000
|
heap
|
page read and write
|
||
1EF5836E000
|
heap
|
page read and write
|
||
1EF5832C000
|
heap
|
page read and write
|
||
1FE54A3E000
|
heap
|
page read and write
|
||
1FE54AE6000
|
heap
|
page read and write
|
||
1EF584E7000
|
heap
|
page read and write
|
||
269BB240000
|
heap
|
page read and write
|
||
18F20E6D000
|
heap
|
page read and write
|
||
81D85FE000
|
stack
|
page read and write
|
||
1EF5823A000
|
heap
|
page read and write
|
||
13BB2E02000
|
trusted library allocation
|
page read and write
|
||
5AEA27F000
|
stack
|
page read and write
|
||
1EF51F8E000
|
heap
|
page read and write
|
||
26BC8CF0000
|
heap
|
page read and write
|
||
1EF58465000
|
heap
|
page read and write
|
||
258AAF13000
|
heap
|
page read and write
|
||
682FDFC000
|
stack
|
page read and write
|
||
52B000
|
remote allocation
|
page execute and read and write
|
||
81D83FF000
|
stack
|
page read and write
|
||
269BB413000
|
heap
|
page read and write
|
||
A6F5E7F000
|
stack
|
page read and write
|
||
258AAE13000
|
heap
|
page read and write
|
||
12F2F451000
|
heap
|
page read and write
|
||
161D9FE000
|
stack
|
page read and write
|
||
2B2E2B02000
|
heap
|
page read and write
|
||
23BE2A51000
|
heap
|
page read and write
|
||
18F20E2D000
|
heap
|
page read and write
|
||
1EF51F43000
|
heap
|
page read and write
|
||
1B0000
|
remote allocation
|
page read and write
|
||
2179A9E0000
|
trusted library allocation
|
page read and write
|
||
1EF583F3000
|
heap
|
page read and write
|
||
1B0000
|
remote allocation
|
page read and write
|
||
1EF5865B000
|
heap
|
page read and write
|
||
F77747B000
|
stack
|
page read and write
|
||
1EF58350000
|
heap
|
page read and write
|
||
1EF56CCC000
|
trusted library allocation
|
page read and write
|
||
1A97AC9B000
|
heap
|
page read and write
|
||
1EF56CDA000
|
trusted library allocation
|
page read and write
|
||
1EF56E30000
|
trusted library allocation
|
page read and write
|
||
B63417B000
|
stack
|
page read and write
|
||
26C0000
|
heap
|
page read and write
|
||
1EF51C02000
|
heap
|
page read and write
|
||
1A6C79E0000
|
trusted library allocation
|
page read and write
|
||
2179AAE0000
|
trusted library allocation
|
page read and write
|
||
1EF5863A000
|
heap
|
page read and write
|
||
1EF56B80000
|
trusted library allocation
|
page read and write
|
||
1EF51FC7000
|
heap
|
page read and write
|
||
C7A28FC000
|
stack
|
page read and write
|
||
1EF56CC5000
|
trusted library allocation
|
page read and write
|
||
1EF58608000
|
heap
|
page read and write
|
||
21795C02000
|
heap
|
page read and write
|
||
1EF5832E000
|
heap
|
page read and write
|
||
1EF58624000
|
heap
|
page read and write
|
||
1EF51F00000
|
heap
|
page read and write
|
||
1C525266000
|
heap
|
page read and write
|
||
1EF56FC0000
|
trusted library allocation
|
page read and write
|
||
1EF583BA000
|
heap
|
page read and write
|
||
1EF51413000
|
heap
|
page read and write
|
||
8372B7A000
|
stack
|
page read and write
|
||
1EF584B0000
|
heap
|
page read and write
|
||
1EF5865F000
|
heap
|
page read and write
|
||
1EF51E58000
|
heap
|
page read and write
|
||
1EF58600000
|
heap
|
page read and write
|
||
1EF58478000
|
heap
|
page read and write
|
||
1A97AC64000
|
heap
|
page read and write
|
||
837277F000
|
stack
|
page read and write
|
||
258AAEA0000
|
heap
|
page read and write
|
||
18F20E5A000
|
heap
|
page read and write
|
||
1EF584A6000
|
heap
|
page read and write
|
||
1EF584CD000
|
heap
|
page read and write
|
||
1EF58234000
|
heap
|
page read and write
|
||
1EF51D25000
|
heap
|
page read and write
|
||
1EF58253000
|
heap
|
page read and write
|
||
1C52523C000
|
heap
|
page read and write
|
||
23BE2B08000
|
heap
|
page read and write
|
||
18F20CF0000
|
heap
|
page read and write
|
||
1EF58669000
|
heap
|
page read and write
|
||
1EF5835C000
|
heap
|
page read and write
|
||
1EF58684000
|
heap
|
page read and write
|
||
761837E000
|
stack
|
page read and write
|
||
217963E0000
|
trusted library allocation
|
page read and write
|
||
5AEA47F000
|
stack
|
page read and write
|
||
1EF58398000
|
heap
|
page read and write
|
||
1EF584B2000
|
heap
|
page read and write
|
||
1EF56E00000
|
trusted library allocation
|
page read and write
|
||
1EF58238000
|
heap
|
page read and write
|
||
8EF000
|
heap
|
page read and write
|
||
1EF584C9000
|
heap
|
page read and write
|
||
1A97AC29000
|
heap
|
page read and write
|
||
1EF584A8000
|
heap
|
page read and write
|
||
1EF5865D000
|
heap
|
page read and write
|
||
5AEA57D000
|
stack
|
page read and write
|
||
A6F5C7B000
|
stack
|
page read and write
|
||
81D789B000
|
stack
|
page read and write
|
||
1EF58324000
|
heap
|
page read and write
|
||
13BB25E0000
|
heap
|
page read and write
|
||
269BB513000
|
heap
|
page read and write
|
||
1A97AD02000
|
heap
|
page read and write
|
||
1EF5843B000
|
heap
|
page read and write
|
||
1EF58604000
|
heap
|
page read and write
|
||
1EF583F3000
|
heap
|
page read and write
|
||
1EF58347000
|
heap
|
page read and write
|
||
1EF515EB000
|
heap
|
page read and write
|
||
1EF584C0000
|
heap
|
page read and write
|
||
1A97AC6A000
|
heap
|
page read and write
|
||
1EF51494000
|
heap
|
page read and write
|
||
1A97A9A0000
|
heap
|
page read and write
|
||
F7779FE000
|
stack
|
page read and write
|
||
1EF58635000
|
heap
|
page read and write
|
||
83733FE000
|
stack
|
page read and write
|
||
1FE54A24000
|
heap
|
page read and write
|
||
1C525308000
|
heap
|
page read and write
|
||
19E000
|
stack
|
page read and write
|
||
217954A0000
|
heap
|
page read and write
|
||
1EF584E6000
|
heap
|
page read and write
|
||
93D000
|
heap
|
page read and write
|
||
1EF58693000
|
heap
|
page read and write
|
||
161DCFE000
|
stack
|
page read and write
|
||
1FE54910000
|
heap
|
page read and write
|
||
4A8000
|
unkown
|
page read and write
|
||
1EF584E4000
|
heap
|
page read and write
|
||
1EF51FC7000
|
heap
|
page read and write
|
||
46DEA7F000
|
stack
|
page read and write
|
||
1EF58368000
|
heap
|
page read and write
|
||
837307F000
|
stack
|
page read and write
|
||
2E20000
|
remote allocation
|
page read and write
|
||
1EF51DCC000
|
heap
|
page read and write
|
||
682F99C000
|
stack
|
page read and write
|
||
1EF56D4C000
|
trusted library allocation
|
page read and write
|
||
1EF56E30000
|
trusted library allocation
|
page read and write
|
||
1EF58476000
|
heap
|
page read and write
|
||
18F20E64000
|
heap
|
page read and write
|
||
1EF58683000
|
heap
|
page read and write
|
There are 1126 hidden memdumps, click here to show them.