Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
67AzzNNioP.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\Desktop\AIO.exe
|
PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\download.jpg
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 236x213, frames
3
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\67AzzNNioP.exe
|
"C:\Users\user\Desktop\67AzzNNioP.exe"
|
||
C:\Users\user\Desktop\AIO.exe
|
"C:\Users\user\Desktop\AIO.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.25.204.244
|
unknown
|
Italy
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
56DD000
|
trusted library allocation
|
page read and write
|
||
C1D0000
|
trusted library allocation
|
page read and write
|
||
EB627FE000
|
stack
|
page read and write
|
||
F30000
|
unkown
|
page readonly
|
||
56D9000
|
trusted library allocation
|
page read and write
|
||
C1D0000
|
trusted library allocation
|
page read and write
|
||
C1D2000
|
trusted library allocation
|
page read and write
|
||
B7C1000
|
trusted library allocation
|
page read and write
|
||
1EF36629000
|
heap
|
page read and write
|
||
12FE8AC0000
|
trusted library allocation
|
page read and write
|
||
5926000
|
trusted library allocation
|
page read and write
|
||
2A17B002000
|
trusted library allocation
|
page read and write
|
||
21E000
|
unkown
|
page write copy
|
||
12FE7053000
|
heap
|
page read and write
|
||
C000102000
|
direct allocation
|
page read and write
|
||
12FE7048000
|
heap
|
page read and write
|
||
189239E0000
|
trusted library allocation
|
page read and write
|
||
56D9000
|
trusted library allocation
|
page read and write
|
||
56E1000
|
trusted library allocation
|
page read and write
|
||
1668C478000
|
heap
|
page read and write
|
||
C1E1000
|
trusted library allocation
|
page read and write
|
||
ABAE000
|
stack
|
page read and write
|
||
1668C42A000
|
heap
|
page read and write
|
||
CFF1EFF000
|
stack
|
page read and write
|
||
1668C469000
|
heap
|
page read and write
|
||
C1B5000
|
trusted library allocation
|
page read and write
|
||
C00006E000
|
direct allocation
|
page read and write
|
||
C215000
|
trusted library allocation
|
page read and write
|
||
C1DF000
|
trusted library allocation
|
page read and write
|
||
EB629FF000
|
stack
|
page read and write
|
||
56F7000
|
trusted library allocation
|
page read and write
|
||
12FE7118000
|
heap
|
page read and write
|
||
C381C7D000
|
stack
|
page read and write
|
||
130C000
|
unkown
|
page write copy
|
||
56F5000
|
trusted library allocation
|
page read and write
|
||
19E5F313000
|
heap
|
page read and write
|
||
1E0000
|
unkown
|
page readonly
|
||
2DD5000
|
heap
|
page read and write
|
||
570D000
|
trusted library allocation
|
page read and write
|
||
26C3DA89000
|
heap
|
page read and write
|
||
482A7FB000
|
stack
|
page read and write
|
||
29E7000
|
stack
|
page read and write
|
||
C000035000
|
direct allocation
|
page read and write
|
||
1060000
|
unkown
|
page readonly
|
||
5706000
|
trusted library allocation
|
page read and write
|
||
C1C5000
|
trusted library allocation
|
page read and write
|
||
B883000
|
trusted library allocation
|
page read and write
|
||
C1E1000
|
trusted library allocation
|
page read and write
|
||
120A000
|
unkown
|
page readonly
|
||
2DF6000
|
heap
|
page read and write
|
||
F30000
|
unkown
|
page readonly
|
||
CFF21FF000
|
stack
|
page read and write
|
||
C1C5000
|
trusted library allocation
|
page read and write
|
||
C1D2000
|
trusted library allocation
|
page read and write
|
||
5924000
|
trusted library allocation
|
page read and write
|
||
4DD0000
|
trusted library allocation
|
page read and write
|
||
B883000
|
trusted library allocation
|
page read and write
|
||
56D9000
|
trusted library allocation
|
page read and write
|
||
C1D0000
|
trusted library allocation
|
page read and write
|
||
2E42000
|
heap
|
page read and write
|
||
C1BA000
|
trusted library allocation
|
page read and write
|
||
520D000
|
stack
|
page read and write
|
||
2E3B000
|
heap
|
page read and write
|
||
11AC000
|
unkown
|
page read and write
|
||
C381D7E000
|
stack
|
page read and write
|
||
56E1000
|
trusted library allocation
|
page read and write
|
||
1668C450000
|
heap
|
page read and write
|
||
56DB000
|
trusted library allocation
|
page read and write
|
||
C1E1000
|
trusted library allocation
|
page read and write
|
||
2E4C000
|
heap
|
page read and write
|
||
B7C0000
|
trusted library allocation
|
page read and write
|
||
56ED000
|
trusted library allocation
|
page read and write
|
||
282DD7E000
|
stack
|
page read and write
|
||
C1CA000
|
trusted library allocation
|
page read and write
|
||
19E5F202000
|
heap
|
page read and write
|
||
C000027000
|
direct allocation
|
page read and write
|
||
C1B1000
|
trusted library allocation
|
page read and write
|
||
C1CA000
|
trusted library allocation
|
page read and write
|
||
56C0000
|
trusted library allocation
|
page read and write
|
||
B915000
|
trusted library allocation
|
page read and write
|
||
26C3D960000
|
trusted library allocation
|
page read and write
|
||
C00012A000
|
direct allocation
|
page read and write
|
||
26C3E302000
|
heap
|
page read and write
|
||
C1E1000
|
trusted library allocation
|
page read and write
|
||
56FE000
|
trusted library allocation
|
page read and write
|
||
50B7000
|
trusted library allocation
|
page read and write
|
||
C1D2000
|
trusted library allocation
|
page read and write
|
||
19E5F1F0000
|
heap
|
page read and write
|
||
31FE000
|
stack
|
page read and write
|
||
26C3DBE5000
|
heap
|
page read and write
|
||
CFF1B7B000
|
stack
|
page read and write
|
||
22F9918D000
|
direct allocation
|
page read and write
|
||
C48C000
|
trusted library allocation
|
page read and write
|
||
12FE8A70000
|
trusted library allocation
|
page read and write
|
||
2A17AA50000
|
heap
|
page read and write
|
||
56DE000
|
trusted library allocation
|
page read and write
|
||
2A17AB13000
|
heap
|
page read and write
|
||
2E24000
|
heap
|
page read and write
|
||
EA6C0FD000
|
stack
|
page read and write
|
||
56C0000
|
trusted library allocation
|
page read and write
|
||
C1D2000
|
trusted library allocation
|
page read and write
|
||
26C3DA50000
|
heap
|
page read and write
|
||
5526000
|
heap
|
page read and write
|
||
2E85000
|
heap
|
page read and write
|
||
C1D0000
|
trusted library allocation
|
page read and write
|
||
B917000
|
trusted library allocation
|
page read and write
|
||
22F98EC0000
|
heap
|
page read and write
|
||
1668C44A000
|
heap
|
page read and write
|
||
C1BA000
|
trusted library allocation
|
page read and write
|
||
263000
|
unkown
|
page readonly
|
||
CFF170B000
|
stack
|
page read and write
|
||
C1AB000
|
trusted library allocation
|
page read and write
|
||
26C3E430000
|
heap
|
page read and write
|
||
56D1000
|
trusted library allocation
|
page read and write
|
||
2E08000
|
heap
|
page read and write
|
||
EB62BFE000
|
stack
|
page read and write
|
||
2E5F000
|
heap
|
page read and write
|
||
282D96E000
|
stack
|
page read and write
|
||
CFF20FF000
|
stack
|
page read and write
|
||
C1B1000
|
trusted library allocation
|
page read and write
|
||
C1DF000
|
trusted library allocation
|
page read and write
|
||
12FE7113000
|
heap
|
page read and write
|
||
2E13000
|
heap
|
page read and write
|
||
2E68000
|
heap
|
page read and write
|
||
22F98F50000
|
heap
|
page read and write
|
||
282DE7E000
|
stack
|
page read and write
|
||
2EA0000
|
heap
|
page read and write
|
||
1668C1E0000
|
heap
|
page read and write
|
||
2E08000
|
heap
|
page read and write
|
||
213000
|
unkown
|
page readonly
|
||
C000004000
|
direct allocation
|
page read and write
|
||
339B000
|
heap
|
page read and write
|
||
2E62000
|
heap
|
page read and write
|
||
C1CA000
|
trusted library allocation
|
page read and write
|
||
2E32000
|
heap
|
page read and write
|
||
5060000
|
heap
|
page read and write
|
||
1EF366CA000
|
heap
|
page read and write
|
||
C1DF000
|
trusted library allocation
|
page read and write
|
||
C0000A8000
|
direct allocation
|
page read and write
|
||
2A17AA00000
|
heap
|
page read and write
|
||
56B2000
|
trusted library allocation
|
page read and write
|
||
C1D2000
|
trusted library allocation
|
page read and write
|
||
56C0000
|
trusted library allocation
|
page read and write
|
||
213000
|
unkown
|
page readonly
|
||
B883000
|
trusted library allocation
|
page read and write
|
||
2E24000
|
heap
|
page read and write
|
||
26C3DA29000
|
heap
|
page read and write
|
||
505A000
|
trusted library allocation
|
page read and write
|
||
12FE704D000
|
heap
|
page read and write
|
||
12FE7057000
|
heap
|
page read and write
|
||
CFF23FE000
|
stack
|
page read and write
|
||
26C3DA70000
|
heap
|
page read and write
|
||
56D1000
|
trusted library allocation
|
page read and write
|
||
56D1000
|
trusted library allocation
|
page read and write
|
||
56D9000
|
trusted library allocation
|
page read and write
|
||
C0000A0000
|
direct allocation
|
page read and write
|
||
C1DA000
|
trusted library allocation
|
page read and write
|
||
19E5FA02000
|
trusted library allocation
|
page read and write
|
||
12FE6F70000
|
heap
|
page read and write
|
||
C225000
|
trusted library allocation
|
page read and write
|
||
772E000
|
stack
|
page read and write
|
||
ADD2CFA000
|
stack
|
page read and write
|
||
56D5000
|
trusted library allocation
|
page read and write
|
||
56D1000
|
trusted library allocation
|
page read and write
|
||
2ADBDD02000
|
heap
|
page read and write
|
||
CFF1CFF000
|
stack
|
page read and write
|
||
C00000E000
|
direct allocation
|
page read and write
|
||
2E4F000
|
heap
|
page read and write
|
||
19E5F27B000
|
heap
|
page read and write
|
||
4F00000
|
trusted library allocation
|
page read and write
|
||
56DF000
|
trusted library allocation
|
page read and write
|
||
EA6C37D000
|
stack
|
page read and write
|
||
56B8000
|
trusted library allocation
|
page read and write
|
||
1EF366B9000
|
heap
|
page read and write
|
||
56D1000
|
trusted library allocation
|
page read and write
|
||
56C4000
|
trusted library allocation
|
page read and write
|
||
C000104000
|
direct allocation
|
page read and write
|
||
570E000
|
trusted library allocation
|
page read and write
|
||
C1D0000
|
trusted library allocation
|
page read and write
|
||
56D9000
|
trusted library allocation
|
page read and write
|
||
56D9000
|
trusted library allocation
|
page read and write
|
||
244000
|
unkown
|
page readonly
|
||
26C3E423000
|
heap
|
page read and write
|
||
56AB000
|
trusted library allocation
|
page read and write
|
||
C215000
|
trusted library allocation
|
page read and write
|
||
B8E5000
|
trusted library allocation
|
page read and write
|
||
C1DF000
|
trusted library allocation
|
page read and write
|
||
2ADBDBD0000
|
remote allocation
|
page read and write
|
||
2B71C7F000
|
stack
|
page read and write
|
||
C1CA000
|
trusted library allocation
|
page read and write
|
||
3398000
|
heap
|
page read and write
|
||
56E1000
|
trusted library allocation
|
page read and write
|
||
C1D0000
|
trusted library allocation
|
page read and write
|
||
548E000
|
stack
|
page read and write
|
||
C1D2000
|
trusted library allocation
|
page read and write
|
||
12FE7047000
|
heap
|
page read and write
|
||
C1CA000
|
trusted library allocation
|
page read and write
|
||
2E4D000
|
heap
|
page read and write
|
||
C1D7000
|
trusted library allocation
|
page read and write
|
||
2D90000
|
heap
|
page read and write
|
||
2E40000
|
heap
|
page read and write
|
||
C3F8000
|
trusted library allocation
|
page read and write
|
||
56D1000
|
trusted library allocation
|
page read and write
|
||
2DF9000
|
heap
|
page read and write
|
||
2E24000
|
heap
|
page read and write
|
||
12FE7058000
|
heap
|
page read and write
|
||
C1C5000
|
trusted library allocation
|
page read and write
|
||
2E87000
|
heap
|
page read and write
|
||
1EF36E02000
|
heap
|
page read and write
|
||
C000096000
|
direct allocation
|
page read and write
|
||
11AA000
|
unkown
|
page read and write
|
||
1EF3663D000
|
heap
|
page read and write
|
||
30BE000
|
stack
|
page read and write
|
||
2E87000
|
heap
|
page read and write
|
||
C1D2000
|
trusted library allocation
|
page read and write
|
||
C1DF000
|
trusted library allocation
|
page read and write
|
||
282D9EE000
|
stack
|
page read and write
|
||
2EA5000
|
heap
|
page read and write
|
||
56D9000
|
trusted library allocation
|
page read and write
|
||
26C3DB13000
|
heap
|
page read and write
|
||
120A000
|
unkown
|
page readonly
|
||
CFF1DFB000
|
stack
|
page read and write
|
||
1EF36F00000
|
heap
|
page read and write
|
||
19E5F200000
|
heap
|
page read and write
|
||
12FE706E000
|
heap
|
page read and write
|
||
C5E8000
|
trusted library allocation
|
page read and write
|
||
26C3DB98000
|
heap
|
page read and write
|
||
22F98FB0000
|
heap
|
page read and write
|
||
B821000
|
trusted library allocation
|
page read and write
|
||
12FE711C000
|
heap
|
page read and write
|
||
26C3DA43000
|
heap
|
page read and write
|
||
C1BF000
|
trusted library allocation
|
page read and write
|
||
56EF000
|
trusted library allocation
|
page read and write
|
||
C1E1000
|
trusted library allocation
|
page read and write
|
||
2E42000
|
heap
|
page read and write
|
||
B822000
|
trusted library allocation
|
page read and write
|
||
2E87000
|
heap
|
page read and write
|
||
56E4000
|
trusted library allocation
|
page read and write
|
||
56DD000
|
trusted library allocation
|
page read and write
|
||
2E24000
|
heap
|
page read and write
|
||
2E69000
|
heap
|
page read and write
|
||
2CCB000
|
stack
|
page read and write
|
||
56E1000
|
trusted library allocation
|
page read and write
|
||
1668C46D000
|
heap
|
page read and write
|
||
C270000
|
trusted library allocation
|
page read and write
|
||
C215000
|
trusted library allocation
|
page read and write
|
||
1668C448000
|
heap
|
page read and write
|
||
12FE7048000
|
heap
|
page read and write
|
||
C1DF000
|
trusted library allocation
|
page read and write
|
||
544E000
|
stack
|
page read and write
|
||
C1BF000
|
trusted library allocation
|
page read and write
|
||
C000020000
|
direct allocation
|
page read and write
|
||
18923A02000
|
heap
|
page read and write
|
||
C1DF000
|
trusted library allocation
|
page read and write
|
||
56D1000
|
trusted library allocation
|
page read and write
|
||
18923A46000
|
heap
|
page read and write
|
||
2E3F000
|
heap
|
page read and write
|
||
56DE000
|
trusted library allocation
|
page read and write
|
||
C000116000
|
direct allocation
|
page read and write
|
||
2A17AB02000
|
heap
|
page read and write
|
||
2B719FC000
|
stack
|
page read and write
|
||
C000018000
|
direct allocation
|
page read and write
|
||
C1E1000
|
trusted library allocation
|
page read and write
|
||
C1B1000
|
trusted library allocation
|
page read and write
|
||
5920000
|
trusted library allocation
|
page read and write
|
||
26C3E300000
|
heap
|
page read and write
|
||
56E6000
|
trusted library allocation
|
page read and write
|
||
482A9FE000
|
stack
|
page read and write
|
||
56E8000
|
trusted library allocation
|
page read and write
|
||
2E3E000
|
heap
|
page read and write
|
||
570F000
|
trusted library allocation
|
page read and write
|
||
C000140000
|
direct allocation
|
page read and write
|
||
26C3E427000
|
heap
|
page read and write
|
||
EA6BC7F000
|
stack
|
page read and write
|
||
2E85000
|
heap
|
page read and write
|
||
56AB000
|
trusted library allocation
|
page read and write
|
||
1668C47F000
|
heap
|
page read and write
|
||
56D1000
|
trusted library allocation
|
page read and write
|
||
C000100000
|
direct allocation
|
page read and write
|
||
56D9000
|
trusted library allocation
|
page read and write
|
||
C1B1000
|
trusted library allocation
|
page read and write
|
||
26C3DA00000
|
heap
|
page read and write
|
||
ADD267B000
|
stack
|
page read and write
|
||
EA6BEFF000
|
stack
|
page read and write
|
||
56D9000
|
trusted library allocation
|
page read and write
|
||
2E00000
|
heap
|
page read and write
|
||
56E7000
|
trusted library allocation
|
page read and write
|
||
56D1000
|
trusted library allocation
|
page read and write
|
||
B7F0000
|
trusted library allocation
|
page read and write
|
||
1204000
|
unkown
|
page read and write
|
||
2ADBDC13000
|
heap
|
page read and write
|
||
C1B1000
|
trusted library allocation
|
page read and write
|
||
C1CB000
|
trusted library allocation
|
page read and write
|
||
2E5E000
|
heap
|
page read and write
|
||
6CC0000
|
trusted library allocation
|
page read and write
|
||
75F0000
|
heap
|
page read and write
|
||
26C3DA57000
|
heap
|
page read and write
|
||
2A17A9D0000
|
trusted library allocation
|
page read and write
|
||
26C3E202000
|
heap
|
page read and write
|
||
C1E1000
|
trusted library allocation
|
page read and write
|
||
56D5000
|
trusted library allocation
|
page read and write
|
||
C1D0000
|
trusted library allocation
|
page read and write
|
||
C2CE000
|
trusted library allocation
|
page read and write
|
||
2CF2000
|
stack
|
page read and write
|
||
C1C5000
|
trusted library allocation
|
page read and write
|
||
56CF000
|
trusted library allocation
|
page read and write
|
||
22F99180000
|
direct allocation
|
page read and write
|
||
56CE000
|
trusted library allocation
|
page read and write
|
||
2E46000
|
heap
|
page read and write
|
||
C1E5000
|
trusted library allocation
|
page read and write
|
||
C1E1000
|
trusted library allocation
|
page read and write
|
||
2E8C000
|
heap
|
page read and write
|
||
26C3E402000
|
heap
|
page read and write
|
||
5040000
|
trusted library allocation
|
page read and write
|
||
56D9000
|
trusted library allocation
|
page read and write
|
||
1668C447000
|
heap
|
page read and write
|
||
B7F1000
|
trusted library allocation
|
page read and write
|
||
56D9000
|
trusted library allocation
|
page read and write
|
||
EB62DFF000
|
stack
|
page read and write
|
||
2ADBDBA0000
|
trusted library allocation
|
page read and write
|
||
5684000
|
trusted library allocation
|
page read and write
|
||
22F98F60000
|
heap
|
page read and write
|
||
C1C5000
|
trusted library allocation
|
page read and write
|
||
56E5000
|
trusted library allocation
|
page read and write
|
||
C000060000
|
direct allocation
|
page read and write
|
||
2A17A7A0000
|
heap
|
page read and write
|
||
26C3DA5A000
|
heap
|
page read and write
|
||
11AB000
|
unkown
|
page write copy
|
||
12FE8B80000
|
remote allocation
|
page read and write
|
||
26C3E36D000
|
heap
|
page read and write
|
||
18923B02000
|
heap
|
page read and write
|
||
2DE5000
|
heap
|
page read and write
|
||
C280000
|
trusted library allocation
|
page read and write
|
||
2E30000
|
heap
|
page read and write
|
||
1E1000
|
unkown
|
page execute read
|
||
C38167B000
|
stack
|
page read and write
|
||
1668C502000
|
heap
|
page read and write
|
||
C67D000
|
trusted library allocation
|
page read and write
|
||
1668C466000
|
heap
|
page read and write
|
||
2E3D000
|
heap
|
page read and write
|
||
2CD8000
|
stack
|
page read and write
|
||
2E6D000
|
heap
|
page read and write
|
||
56D0000
|
trusted library allocation
|
page read and write
|
||
C1A3000
|
trusted library allocation
|
page read and write
|
||
C1B1000
|
trusted library allocation
|
page read and write
|
||
506B6AC000
|
stack
|
page read and write
|
||
C1C5000
|
trusted library allocation
|
page read and write
|
||
26C3E343000
|
heap
|
page read and write
|
||
2E6D000
|
heap
|
page read and write
|
||
56CD000
|
trusted library allocation
|
page read and write
|
||
56DE000
|
trusted library allocation
|
page read and write
|
||
C00005D000
|
direct allocation
|
page read and write
|
||
1060000
|
unkown
|
page readonly
|
||
2E4C000
|
heap
|
page read and write
|
||
2E87000
|
heap
|
page read and write
|
||
56AD000
|
trusted library allocation
|
page read and write
|
||
56D1000
|
trusted library allocation
|
page read and write
|
||
56E4000
|
trusted library allocation
|
page read and write
|
||
2E3D000
|
heap
|
page read and write
|
||
2ADBDB70000
|
heap
|
page read and write
|
||
2E51000
|
heap
|
page read and write
|
||
50BE000
|
stack
|
page read and write
|
||
C1D2000
|
trusted library allocation
|
page read and write
|
||
56D9000
|
trusted library allocation
|
page read and write
|
||
2E2D000
|
heap
|
page read and write
|
||
286000
|
unkown
|
page readonly
|
||
4D90000
|
heap
|
page read and write
|
||
2A17AA3D000
|
heap
|
page read and write
|
||
56DF000
|
trusted library allocation
|
page read and write
|
||
2E4D000
|
heap
|
page read and write
|
||
18923A13000
|
heap
|
page read and write
|
||
56E4000
|
trusted library allocation
|
page read and write
|
||
2E69000
|
heap
|
page read and write
|
||
C1D7000
|
trusted library allocation
|
page read and write
|
||
C1DF000
|
trusted library allocation
|
page read and write
|
||
18923A00000
|
heap
|
page read and write
|
||
56E4000
|
trusted library allocation
|
page read and write
|
||
2DC7000
|
heap
|
page read and write
|
||
56D5000
|
trusted library allocation
|
page read and write
|
||
2E2E000
|
heap
|
page read and write
|
||
56D1000
|
trusted library allocation
|
page read and write
|
||
26C3D8D0000
|
heap
|
page read and write
|
||
56DF000
|
trusted library allocation
|
page read and write
|
||
C218000
|
trusted library allocation
|
page read and write
|
||
C1E3000
|
trusted library allocation
|
page read and write
|
||
1EF36613000
|
heap
|
page read and write
|
||
C215000
|
trusted library allocation
|
page read and write
|
||
C00003A000
|
direct allocation
|
page read and write
|
||
19E5F268000
|
heap
|
page read and write
|
||
2E31000
|
heap
|
page read and write
|
||
56D5000
|
trusted library allocation
|
page read and write
|
||
50DA000
|
trusted library allocation
|
page read and write
|
||
C1AB000
|
trusted library allocation
|
page read and write
|
||
2E62000
|
heap
|
page read and write
|
||
C648000
|
trusted library allocation
|
page read and write
|
||
56E7000
|
trusted library allocation
|
page read and write
|
||
EA6C17E000
|
stack
|
page read and write
|
||
56B0000
|
trusted library allocation
|
page read and write
|
||
C1D2000
|
trusted library allocation
|
page read and write
|
||
C1D0000
|
trusted library allocation
|
page read and write
|
||
12FE7100000
|
heap
|
page read and write
|
||
1668C44F000
|
heap
|
page read and write
|
||
26C3E3D2000
|
heap
|
page read and write
|
||
56D9000
|
trusted library allocation
|
page read and write
|
||
56B5000
|
trusted library allocation
|
page read and write
|
||
56AD000
|
trusted library allocation
|
page read and write
|
||
2E3E000
|
heap
|
page read and write
|
||
12FE7089000
|
heap
|
page read and write
|
||
2D50000
|
trusted library allocation
|
page readonly
|
||
C1DF000
|
trusted library allocation
|
page read and write
|
||
2B715CB000
|
stack
|
page read and write
|
||
124E000
|
unkown
|
page readonly
|
||
2E51000
|
heap
|
page read and write
|
||
22F98FB8000
|
heap
|
page read and write
|
||
1668C475000
|
heap
|
page read and write
|
||
56E1000
|
trusted library allocation
|
page read and write
|
||
56E7000
|
trusted library allocation
|
page read and write
|
||
2A17AA73000
|
heap
|
page read and write
|
||
5670000
|
trusted library allocation
|
page read and write
|
||
2ADBDB00000
|
heap
|
page read and write
|
||
2A17AA70000
|
heap
|
page read and write
|
||
26C3E390000
|
heap
|
page read and write
|
||
C1DF000
|
trusted library allocation
|
page read and write
|
||
26C3DA2F000
|
heap
|
page read and write
|
||
2CCD000
|
stack
|
page read and write
|
||
56FE000
|
trusted library allocation
|
page read and write
|
||
2A17A790000
|
heap
|
page read and write
|
||
26C3DA13000
|
heap
|
page read and write
|
||
C161000
|
trusted library allocation
|
page read and write
|
||
570D000
|
trusted library allocation
|
page read and write
|
||
C38197E000
|
stack
|
page read and write
|
||
19E5F264000
|
heap
|
page read and write
|
||
26C3D980000
|
trusted library allocation
|
page read and write
|
||
56E7000
|
trusted library allocation
|
page read and write
|
||
2E00000
|
heap
|
page read and write
|
||
5696000
|
trusted library allocation
|
page read and write
|
||
1EF365C0000
|
trusted library allocation
|
page read and write
|
||
BBEF000
|
stack
|
page read and write
|
||
C1D2000
|
trusted library allocation
|
page read and write
|
||
1668C47C000
|
heap
|
page read and write
|
||
56DB000
|
trusted library allocation
|
page read and write
|
||
1668C47E000
|
heap
|
page read and write
|
||
26C3E322000
|
heap
|
page read and write
|
||
C00003C000
|
direct allocation
|
page read and write
|
||
ADD2AF9000
|
stack
|
page read and write
|
||
282DF7E000
|
stack
|
page read and write
|
||
1EF36688000
|
heap
|
page read and write
|
||
56C0000
|
trusted library allocation
|
page read and write
|
||
C381F7E000
|
stack
|
page read and write
|
||
56B8000
|
trusted library allocation
|
page read and write
|
||
2A17AA25000
|
heap
|
page read and write
|
||
5523000
|
heap
|
page read and write
|
||
2E24000
|
heap
|
page read and write
|
||
56DD000
|
trusted library allocation
|
page read and write
|
||
2E44000
|
heap
|
page read and write
|
||
56AB000
|
trusted library allocation
|
page read and write
|
||
19E5F213000
|
heap
|
page read and write
|
||
56D9000
|
trusted library allocation
|
page read and write
|
||
56D5000
|
trusted library allocation
|
page read and write
|
||
56DF000
|
trusted library allocation
|
page read and write
|
||
C1BA000
|
trusted library allocation
|
page read and write
|
||
56B8000
|
trusted library allocation
|
page read and write
|
||
1668C476000
|
heap
|
page read and write
|
||
56DB000
|
trusted library allocation
|
page read and write
|
||
2E89000
|
heap
|
page read and write
|
||
CFF22FF000
|
stack
|
page read and write
|
||
C000025000
|
direct allocation
|
page read and write
|
||
2A17AA13000
|
heap
|
page read and write
|
||
22F98F30000
|
heap
|
page read and write
|
||
EA6BFFF000
|
stack
|
page read and write
|
||
18923A43000
|
heap
|
page read and write
|
||
56D9000
|
trusted library allocation
|
page read and write
|
||
2DD1000
|
heap
|
page read and write
|
||
2E8C000
|
heap
|
page read and write
|
||
56D9000
|
trusted library allocation
|
page read and write
|
||
C224000
|
trusted library allocation
|
page read and write
|
||
12F9000
|
unkown
|
page readonly
|
||
22FBEBF0000
|
direct allocation
|
page read and write
|
||
12FE7000000
|
heap
|
page read and write
|
||
56DE000
|
trusted library allocation
|
page read and write
|
||
56DD000
|
trusted library allocation
|
page read and write
|
||
26C3E354000
|
heap
|
page read and write
|
||
1192000
|
unkown
|
page read and write
|
||
3390000
|
heap
|
page read and write
|
||
2E27000
|
heap
|
page read and write
|
||
C1E1000
|
trusted library allocation
|
page read and write
|
||
2E4C000
|
heap
|
page read and write
|
||
C00013E000
|
direct allocation
|
page read and write
|
||
C00009C000
|
direct allocation
|
page read and write
|
||
5050000
|
trusted library allocation
|
page read and write
|
||
C000022000
|
direct allocation
|
page read and write
|
||
C000002000
|
direct allocation
|
page read and write
|
||
56DD000
|
trusted library allocation
|
page read and write
|
||
26C3DA3D000
|
heap
|
page read and write
|
||
ADD297F000
|
stack
|
page read and write
|
||
2E6D000
|
heap
|
page read and write
|
||
263000
|
unkown
|
page readonly
|
||
1EF36520000
|
heap
|
page read and write
|
||
18923A29000
|
heap
|
page read and write
|
||
2E3D000
|
heap
|
page read and write
|
||
C225000
|
trusted library allocation
|
page read and write
|
||
2E4C000
|
heap
|
page read and write
|
||
1EF36665000
|
heap
|
page read and write
|
||
56CD000
|
trusted library allocation
|
page read and write
|
||
2B71F7D000
|
stack
|
page read and write
|
||
C1DF000
|
trusted library allocation
|
page read and write
|
||
C000016000
|
direct allocation
|
page read and write
|
||
2E62000
|
heap
|
page read and write
|
||
C000076000
|
direct allocation
|
page read and write
|
||
2E8C000
|
heap
|
page read and write
|
||
2ADBDC02000
|
heap
|
page read and write
|
||
22F98FBF000
|
heap
|
page read and write
|
||
2E6D000
|
heap
|
page read and write
|
||
1668C42E000
|
heap
|
page read and write
|
||
C00001A000
|
direct allocation
|
page read and write
|
||
C1C5000
|
trusted library allocation
|
page read and write
|
||
2DFA000
|
heap
|
page read and write
|
||
18923A30000
|
heap
|
page read and write
|
||
56D1000
|
trusted library allocation
|
page read and write
|
||
26C3E322000
|
heap
|
page read and write
|
||
19E5F25E000
|
heap
|
page read and write
|
||
56D9000
|
trusted library allocation
|
page read and write
|
||
56E1000
|
trusted library allocation
|
page read and write
|
||
C400000
|
trusted library allocation
|
page read and write
|
||
130D000
|
unkown
|
page readonly
|
||
1668C413000
|
heap
|
page read and write
|
||
2E40000
|
heap
|
page read and write
|
||
C000134000
|
direct allocation
|
page read and write
|
||
12FE8B00000
|
trusted library allocation
|
page read and write
|
||
505D000
|
trusted library allocation
|
page read and write
|
||
2E24000
|
heap
|
page read and write
|
||
19E5F302000
|
heap
|
page read and write
|
||
1EF36F32000
|
heap
|
page read and write
|
||
2DB8000
|
heap
|
page read and write
|
||
2ADBDC29000
|
heap
|
page read and write
|
||
C218000
|
trusted library allocation
|
page read and write
|
||
2DD1000
|
heap
|
page read and write
|
||
2E42000
|
heap
|
page read and write
|
||
C00011C000
|
direct allocation
|
page read and write
|
||
ADD287B000
|
stack
|
page read and write
|
||
56D1000
|
trusted library allocation
|
page read and write
|
||
56DE000
|
trusted library allocation
|
page read and write
|
||
B842000
|
trusted library allocation
|
page read and write
|
||
C1D0000
|
trusted library allocation
|
page read and write
|
||
2E8D000
|
heap
|
page read and write
|
||
56B4000
|
trusted library allocation
|
page read and write
|
||
570D000
|
trusted library allocation
|
page read and write
|
||
C000126000
|
direct allocation
|
page read and write
|
||
2DE3000
|
heap
|
page read and write
|
||
482AAFB000
|
stack
|
page read and write
|
||
30FD000
|
stack
|
page read and write
|
||
B8E4000
|
trusted library allocation
|
page read and write
|
||
2FBE000
|
stack
|
page read and write
|
||
12FE7013000
|
heap
|
page read and write
|
||
C1BF000
|
trusted library allocation
|
page read and write
|
||
C000050000
|
direct allocation
|
page read and write
|
||
19E5F180000
|
heap
|
page read and write
|
||
2ADBDB10000
|
heap
|
page read and write
|
||
12FE7002000
|
heap
|
page read and write
|
||
2E32000
|
heap
|
page read and write
|
||
C00012E000
|
direct allocation
|
page read and write
|
||
BD5D000
|
stack
|
page read and write
|
||
56DD000
|
trusted library allocation
|
page read and write
|
||
26C3E3BD000
|
heap
|
page read and write
|
||
19E5F228000
|
heap
|
page read and write
|
||
B8B3000
|
trusted library allocation
|
page read and write
|
||
7FE31000
|
trusted library allocation
|
page execute read
|
||
EA6B98C000
|
stack
|
page read and write
|
||
C000030000
|
direct allocation
|
page read and write
|
||
12FE8B80000
|
remote allocation
|
page read and write
|
||
C5F8000
|
trusted library allocation
|
page read and write
|
||
99FC000
|
stack
|
page read and write
|
||
2E32000
|
heap
|
page read and write
|
||
C00009A000
|
direct allocation
|
page read and write
|
||
C381AFD000
|
stack
|
page read and write
|
||
56D1000
|
trusted library allocation
|
page read and write
|
||
EB625FF000
|
stack
|
page read and write
|
||
18924002000
|
trusted library allocation
|
page read and write
|
||
189237C0000
|
heap
|
page read and write
|
||
26C3DA85000
|
heap
|
page read and write
|
||
506BCFE000
|
stack
|
page read and write
|
||
B840000
|
trusted library allocation
|
page read and write
|
||
56DE000
|
trusted library allocation
|
page read and write
|
||
242000
|
unkown
|
page read and write
|
||
C1BF000
|
trusted library allocation
|
page read and write
|
||
12FE8B80000
|
remote allocation
|
page read and write
|
||
C1BF000
|
trusted library allocation
|
page read and write
|
||
2E2E000
|
heap
|
page read and write
|
||
534C000
|
stack
|
page read and write
|
||
C1DF000
|
trusted library allocation
|
page read and write
|
||
56D5000
|
trusted library allocation
|
page read and write
|
||
26C3DA91000
|
heap
|
page read and write
|
||
56CD000
|
trusted library allocation
|
page read and write
|
||
482A2CB000
|
stack
|
page read and write
|
||
124E000
|
unkown
|
page readonly
|
||
C1DF000
|
trusted library allocation
|
page read and write
|
||
26C3E413000
|
heap
|
page read and write
|
||
C000037000
|
direct allocation
|
page read and write
|
||
56D1000
|
trusted library allocation
|
page read and write
|
||
26C3DA90000
|
heap
|
page read and write
|
||
22FBEAC8000
|
direct allocation
|
page read and write
|
||
C1BF000
|
trusted library allocation
|
page read and write
|
||
2E51000
|
heap
|
page read and write
|
||
2E44000
|
heap
|
page read and write
|
||
2E62000
|
heap
|
page read and write
|
||
2E44000
|
heap
|
page read and write
|
||
1668C484000
|
heap
|
page read and write
|
||
22FBEAE0000
|
direct allocation
|
page read and write
|
||
CFF24FF000
|
stack
|
page read and write
|
||
2E00000
|
heap
|
page read and write
|
||
5696000
|
trusted library allocation
|
page read and write
|
||
C000124000
|
direct allocation
|
page read and write
|
||
C1D0000
|
trusted library allocation
|
page read and write
|
||
5701000
|
trusted library allocation
|
page read and write
|
||
1668C441000
|
heap
|
page read and write
|
||
2E47000
|
heap
|
page read and write
|
||
2DF7000
|
heap
|
page read and write
|
||
B7C0000
|
trusted library allocation
|
page read and write
|
||
2E62000
|
heap
|
page read and write
|
||
26C3DA77000
|
heap
|
page read and write
|
||
56D1000
|
trusted library allocation
|
page read and write
|
||
18923A3C000
|
heap
|
page read and write
|
||
C1E1000
|
trusted library allocation
|
page read and write
|
||
22F98F54000
|
heap
|
page read and write
|
||
26C3DBB9000
|
heap
|
page read and write
|
||
EB621FD000
|
stack
|
page read and write
|
||
2ADBDBD0000
|
remote allocation
|
page read and write
|
||
2DCB000
|
heap
|
page read and write
|
||
56AE000
|
trusted library allocation
|
page read and write
|
||
C1D7000
|
trusted library allocation
|
page read and write
|
||
1EF3666D000
|
heap
|
page read and write
|
||
1EF366C4000
|
heap
|
page read and write
|
||
56D1000
|
trusted library allocation
|
page read and write
|
||
C0000AA000
|
direct allocation
|
page read and write
|
||
1668C446000
|
heap
|
page read and write
|
||
56D9000
|
trusted library allocation
|
page read and write
|
||
2E8C000
|
heap
|
page read and write
|
||
282E07F000
|
stack
|
page read and write
|
||
1192000
|
unkown
|
page write copy
|
||
2DE6000
|
heap
|
page read and write
|
||
2E6D000
|
heap
|
page read and write
|
||
1668CC02000
|
trusted library allocation
|
page read and write
|
||
C1D2000
|
trusted library allocation
|
page read and write
|
||
566F000
|
stack
|
page read and write
|
||
ABC4000
|
trusted library allocation
|
page read and write
|
||
C00010E000
|
direct allocation
|
page read and write
|
||
2E40000
|
heap
|
page read and write
|
||
26C3E3B1000
|
heap
|
page read and write
|
||
56DD000
|
trusted library allocation
|
page read and write
|
||
1668C42F000
|
heap
|
page read and write
|
||
B917000
|
trusted library allocation
|
page read and write
|
||
56ED000
|
trusted library allocation
|
page read and write
|
||
56D1000
|
trusted library allocation
|
page read and write
|
||
56E3000
|
trusted library allocation
|
page read and write
|
||
56DF000
|
trusted library allocation
|
page read and write
|
||
592F000
|
trusted library allocation
|
page read and write
|
||
2E42000
|
heap
|
page read and write
|
||
50DC000
|
trusted library allocation
|
page read and write
|
||
ADD2E7E000
|
stack
|
page read and write
|
||
C265000
|
trusted library allocation
|
page read and write
|
||
18923810000
|
heap
|
page read and write
|
||
1668C43B000
|
heap
|
page read and write
|
||
2A17A800000
|
heap
|
page read and write
|
||
2E00000
|
heap
|
page read and write
|
||
26C3E400000
|
heap
|
page read and write
|
||
56E0000
|
trusted library allocation
|
page read and write
|
||
2E87000
|
heap
|
page read and write
|
||
21E000
|
unkown
|
page read and write
|
||
1E0000
|
unkown
|
page readonly
|
||
4DF0000
|
heap
|
page read and write
|
||
4DF4000
|
heap
|
page read and write
|
||
1EF36624000
|
heap
|
page read and write
|
||
C000136000
|
direct allocation
|
page read and write
|
||
C160000
|
trusted library allocation
|
page read and write
|
||
2E4D000
|
heap
|
page read and write
|
||
EB623FF000
|
stack
|
page read and write
|
||
C5F5000
|
trusted library allocation
|
page read and write
|
||
56B8000
|
trusted library allocation
|
page read and write
|
||
56E1000
|
trusted library allocation
|
page read and write
|
||
2B71D7E000
|
stack
|
page read and write
|
||
C000054000
|
direct allocation
|
page read and write
|
||
288000
|
unkown
|
page readonly
|
||
130D000
|
unkown
|
page readonly
|
||
C1E1000
|
trusted library allocation
|
page read and write
|
||
130C000
|
unkown
|
page write copy
|
||
C00000C000
|
direct allocation
|
page read and write
|
||
56ED000
|
trusted library allocation
|
page read and write
|
||
1E1000
|
unkown
|
page execute read
|
||
11DD000
|
unkown
|
page read and write
|
||
2E42000
|
heap
|
page read and write
|
||
C00013A000
|
direct allocation
|
page read and write
|
||
1EF36702000
|
heap
|
page read and write
|
||
C1D7000
|
trusted library allocation
|
page read and write
|
||
C1C0000
|
trusted library allocation
|
page read and write
|
||
2E44000
|
heap
|
page read and write
|
||
2E30000
|
heap
|
page read and write
|
||
56D1000
|
trusted library allocation
|
page read and write
|
||
C1A8000
|
trusted library allocation
|
page read and write
|
||
2E30000
|
heap
|
page read and write
|
||
2E10000
|
heap
|
page read and write
|
||
12FE6F60000
|
heap
|
page read and write
|
||
1668C400000
|
heap
|
page read and write
|
||
12FE7062000
|
heap
|
page read and write
|
||
C407000
|
trusted library allocation
|
page read and write
|
||
12FE8A90000
|
trusted library allocation
|
page read and write
|
||
11A7000
|
unkown
|
page write copy
|
||
12FE702A000
|
heap
|
page read and write
|
||
26C3D930000
|
heap
|
page read and write
|
||
56D9000
|
trusted library allocation
|
page read and write
|
||
C161000
|
trusted library allocation
|
page read and write
|
||
56E0000
|
trusted library allocation
|
page read and write
|
||
1668C1F0000
|
heap
|
page read and write
|
||
19E5F240000
|
heap
|
page read and write
|
||
56AB000
|
trusted library allocation
|
page read and write
|
||
243000
|
unkown
|
page write copy
|
||
5673000
|
trusted library allocation
|
page read and write
|
||
19E5F190000
|
heap
|
page read and write
|
||
12FE6FD0000
|
heap
|
page read and write
|
||
B7F0000
|
trusted library allocation
|
page read and write
|
||
12FE7058000
|
heap
|
page read and write
|
||
56E1000
|
trusted library allocation
|
page read and write
|
||
56E4000
|
trusted library allocation
|
page read and write
|
||
56EE000
|
trusted library allocation
|
page read and write
|
||
1EF36713000
|
heap
|
page read and write
|
||
19E5F950000
|
trusted library allocation
|
page read and write
|
||
243000
|
unkown
|
page readonly
|
||
56B8000
|
trusted library allocation
|
page read and write
|
||
56E1000
|
trusted library allocation
|
page read and write
|
||
22F99189000
|
direct allocation
|
page read and write
|
||
C000108000
|
direct allocation
|
page read and write
|
||
2CDE000
|
stack
|
page read and write
|
||
26C3D8C0000
|
heap
|
page read and write
|
||
B853000
|
trusted library allocation
|
page read and write
|
||
2ADBDC3C000
|
heap
|
page read and write
|
||
2ADBDC51000
|
heap
|
page read and write
|
||
2E3B000
|
heap
|
page read and write
|
||
C000045000
|
direct allocation
|
page read and write
|
||
2B71B7F000
|
stack
|
page read and write
|
||
2E51000
|
heap
|
page read and write
|
||
C000012000
|
direct allocation
|
page read and write
|
||
506BDFF000
|
stack
|
page read and write
|
||
12FE8C02000
|
trusted library allocation
|
page read and write
|
||
56B5000
|
trusted library allocation
|
page read and write
|
||
56B8000
|
trusted library allocation
|
page read and write
|
||
2DCB000
|
heap
|
page read and write
|
||
C16D000
|
trusted library allocation
|
page read and write
|
||
288000
|
unkown
|
page readonly
|
||
2ADBDBD0000
|
remote allocation
|
page read and write
|
||
C1DF000
|
trusted library allocation
|
page read and write
|
||
56AD000
|
trusted library allocation
|
page read and write
|
||
2D60000
|
trusted library allocation
|
page read and write
|
||
7FE50000
|
trusted library allocation
|
page execute read
|
||
1668C46E000
|
heap
|
page read and write
|
||
22F99184000
|
direct allocation
|
page read and write
|
||
C000006000
|
direct allocation
|
page read and write
|
||
2E4C000
|
heap
|
page read and write
|
||
2980000
|
heap
|
page read and write
|
||
2A17AA29000
|
heap
|
page read and write
|
||
2DB5000
|
heap
|
page read and write
|
||
2E6D000
|
heap
|
page read and write
|
||
1668C470000
|
heap
|
page read and write
|
||
12FE703D000
|
heap
|
page read and write
|
||
56FE000
|
trusted library allocation
|
page read and write
|
||
2D97000
|
heap
|
page read and write
|
||
C19F000
|
trusted library allocation
|
page read and write
|
||
22F9918B000
|
direct allocation
|
page read and write
|
||
26C3DA79000
|
heap
|
page read and write
|
||
C260000
|
trusted library allocation
|
page read and write
|
||
F31000
|
unkown
|
page execute read
|
||
C290000
|
trusted library allocation
|
page read and write
|
||
56D9000
|
trusted library allocation
|
page read and write
|
||
56D1000
|
trusted library allocation
|
page read and write
|
||
BC5C000
|
stack
|
page read and write
|
||
2E6D000
|
heap
|
page read and write
|
||
2E8C000
|
heap
|
page read and write
|
||
C1E1000
|
trusted library allocation
|
page read and write
|
||
C1E1000
|
trusted library allocation
|
page read and write
|
||
2E00000
|
heap
|
page read and write
|
||
56DE000
|
trusted library allocation
|
page read and write
|
||
56E7000
|
trusted library allocation
|
page read and write
|
||
B8B4000
|
trusted library allocation
|
page read and write
|
||
C000112000
|
direct allocation
|
page read and write
|
||
2E6D000
|
heap
|
page read and write
|
||
ADD2A7C000
|
stack
|
page read and write
|
||
C403000
|
trusted library allocation
|
page read and write
|
||
C1E1000
|
trusted library allocation
|
page read and write
|
||
56E4000
|
trusted library allocation
|
page read and write
|
||
C38147C000
|
stack
|
page read and write
|
||
56D9000
|
trusted library allocation
|
page read and write
|
||
51BE000
|
stack
|
page read and write
|
||
C1B1000
|
trusted library allocation
|
page read and write
|
||
C1C5000
|
trusted library allocation
|
page read and write
|
||
11D6000
|
unkown
|
page read and write
|
||
ADD2DFE000
|
stack
|
page read and write
|
||
56E3000
|
trusted library allocation
|
page read and write
|
||
56D5000
|
trusted library allocation
|
page read and write
|
||
C1A8000
|
trusted library allocation
|
page read and write
|
||
C1BA000
|
trusted library allocation
|
page read and write
|
||
ABE2000
|
trusted library allocation
|
page read and write
|
||
56D9000
|
trusted library allocation
|
page read and write
|
||
C215000
|
trusted library allocation
|
page read and write
|
||
482A8FB000
|
stack
|
page read and write
|
||
2E4D000
|
heap
|
page read and write
|
||
56CE000
|
trusted library allocation
|
page read and write
|
||
ADD2F7E000
|
stack
|
page read and write
|
||
56FE000
|
trusted library allocation
|
page read and write
|
||
2B71E7C000
|
stack
|
page read and write
|
||
C1D0000
|
trusted library allocation
|
page read and write
|
||
1668C463000
|
heap
|
page read and write
|
||
C1DF000
|
trusted library allocation
|
page read and write
|
||
282D8EB000
|
stack
|
page read and write
|
||
2DB8000
|
heap
|
page read and write
|
||
C1AB000
|
trusted library allocation
|
page read and write
|
||
19E5F257000
|
heap
|
page read and write
|
||
26C3DA6D000
|
heap
|
page read and write
|
||
5520000
|
heap
|
page read and write
|
||
C160000
|
trusted library allocation
|
page read and write
|
||
26C3E3CD000
|
heap
|
page read and write
|
||
1668C44C000
|
heap
|
page read and write
|
||
570D000
|
trusted library allocation
|
page read and write
|
||
2E2D000
|
heap
|
page read and write
|
||
C000072000
|
direct allocation
|
page read and write
|
||
12FE7102000
|
heap
|
page read and write
|
||
1EF36600000
|
heap
|
page read and write
|
||
1EF36530000
|
heap
|
page read and write
|
||
12F9000
|
unkown
|
page readonly
|
||
1668C443000
|
heap
|
page read and write
|
||
C1A8000
|
trusted library allocation
|
page read and write
|
||
C3819FC000
|
stack
|
page read and write
|
||
506BBF9000
|
stack
|
page read and write
|
||
56D9000
|
trusted library allocation
|
page read and write
|
||
2E51000
|
heap
|
page read and write
|
||
C1CA000
|
trusted library allocation
|
page read and write
|
||
7608000
|
trusted library allocation
|
page read and write
|
||
C000010000
|
direct allocation
|
page read and write
|
||
F31000
|
unkown
|
page execute read
|
||
2E28000
|
heap
|
page read and write
|
||
2CF6000
|
stack
|
page read and write
|
||
56D1000
|
trusted library allocation
|
page read and write
|
||
C1CA000
|
trusted library allocation
|
page read and write
|
||
570E000
|
trusted library allocation
|
page read and write
|
||
C1BA000
|
trusted library allocation
|
page read and write
|
||
C000041000
|
direct allocation
|
page read and write
|
||
2E4D000
|
heap
|
page read and write
|
||
2ADBE402000
|
trusted library allocation
|
page read and write
|
||
C000148000
|
direct allocation
|
page read and write
|
||
18923A52000
|
heap
|
page read and write
|
||
2ADBDC00000
|
heap
|
page read and write
|
||
C225000
|
trusted library allocation
|
page read and write
|
||
C1BF000
|
trusted library allocation
|
page read and write
|
||
56B8000
|
trusted library allocation
|
page read and write
|
||
18923A2C000
|
heap
|
page read and write
|
||
5684000
|
trusted library allocation
|
page read and write
|
||
221000
|
unkown
|
page read and write
|
||
56E7000
|
trusted library allocation
|
page read and write
|
||
C215000
|
trusted library allocation
|
page read and write
|
||
2E3B000
|
heap
|
page read and write
|
||
2E30000
|
heap
|
page read and write
|
||
C1D0000
|
trusted library allocation
|
page read and write
|
||
56D9000
|
trusted library allocation
|
page read and write
|
||
56B8000
|
trusted library allocation
|
page read and write
|
||
56E4000
|
trusted library allocation
|
page read and write
|
||
B852000
|
trusted library allocation
|
page read and write
|
||
19E5F300000
|
heap
|
page read and write
|
||
2A17AA76000
|
heap
|
page read and write
|
||
C280000
|
trusted library allocation
|
page read and write
|
||
C381E7C000
|
stack
|
page read and write
|
||
56AD000
|
trusted library allocation
|
page read and write
|
||
C224000
|
trusted library allocation
|
page read and write
|
||
C1DF000
|
trusted library allocation
|
page read and write
|
||
11A6000
|
unkown
|
page read and write
|
||
1668C462000
|
heap
|
page read and write
|
||
26C3E3C5000
|
heap
|
page read and write
|
||
56D1000
|
trusted library allocation
|
page read and write
|
||
C1D7000
|
trusted library allocation
|
page read and write
|
||
C1D7000
|
trusted library allocation
|
page read and write
|
||
2A17AA6A000
|
heap
|
page read and write
|
||
EA6C27D000
|
stack
|
page read and write
|
||
56AB000
|
trusted library allocation
|
page read and write
|
||
C00001C000
|
direct allocation
|
page read and write
|
||
C1CA000
|
trusted library allocation
|
page read and write
|
||
C225000
|
trusted library allocation
|
page read and write
|
||
22FBEAC0000
|
direct allocation
|
page read and write
|
||
2E62000
|
heap
|
page read and write
|
||
1197000
|
unkown
|
page write copy
|
||
7FE41000
|
trusted library allocation
|
page execute read
|
||
2A17AA02000
|
heap
|
page read and write
|
||
56DF000
|
trusted library allocation
|
page read and write
|
||
2E51000
|
heap
|
page read and write
|
||
C38187E000
|
stack
|
page read and write
|
||
530D000
|
stack
|
page read and write
|
||
2B7207E000
|
stack
|
page read and write
|
||
56D9000
|
trusted library allocation
|
page read and write
|
||
1668C47B000
|
heap
|
page read and write
|
||
EA6BE7E000
|
stack
|
page read and write
|
||
1668C350000
|
trusted library allocation
|
page read and write
|
||
C1D7000
|
trusted library allocation
|
page read and write
|
||
5696000
|
trusted library allocation
|
page read and write
|
||
2E44000
|
heap
|
page read and write
|
||
189237B0000
|
heap
|
page read and write
|
||
B81D000
|
trusted library allocation
|
page read and write
|
||
56D5000
|
trusted library allocation
|
page read and write
|
||
1668C43A000
|
heap
|
page read and write
|
||
C1CA000
|
trusted library allocation
|
page read and write
|
||
26C3E3D0000
|
heap
|
page read and write
|
||
C1CA000
|
trusted library allocation
|
page read and write
|
||
C000086000
|
direct allocation
|
page read and write
|
||
C000098000
|
direct allocation
|
page read and write
|
||
C000128000
|
direct allocation
|
page read and write
|
||
1668C250000
|
heap
|
page read and write
|
||
CFF1FFD000
|
stack
|
page read and write
|
||
1EF36590000
|
heap
|
page read and write
|
||
C381B7B000
|
stack
|
page read and write
|
||
22FC0420000
|
direct allocation
|
page read and write
|
||
C1E1000
|
trusted library allocation
|
page read and write
|
||
C1D3000
|
trusted library allocation
|
page read and write
|
||
C1D0000
|
trusted library allocation
|
page read and write
|
||
C1B1000
|
trusted library allocation
|
page read and write
|
||
1668C431000
|
heap
|
page read and write
|
||
2E07000
|
heap
|
page read and write
|
||
ADD2BFF000
|
stack
|
page read and write
|
||
C1D2000
|
trusted library allocation
|
page read and write
|
||
C1D2000
|
trusted library allocation
|
page read and write
|
||
2E62000
|
heap
|
page read and write
|
||
56D5000
|
trusted library allocation
|
page read and write
|
||
C1CA000
|
trusted library allocation
|
page read and write
|
||
1199000
|
unkown
|
page write copy
|
||
22F98ED0000
|
direct allocation
|
page read and write
|
||
56E5000
|
trusted library allocation
|
page read and write
|
||
2A17AA62000
|
heap
|
page read and write
|
||
1198000
|
unkown
|
page read and write
|
||
286000
|
unkown
|
page readonly
|
||
C1E1000
|
trusted library allocation
|
page read and write
|
||
C1C5000
|
trusted library allocation
|
page read and write
|
||
1668C43E000
|
heap
|
page read and write
|
||
B884000
|
trusted library allocation
|
page read and write
|
||
56E4000
|
trusted library allocation
|
page read and write
|
||
2E08000
|
heap
|
page read and write
|
||
4D60000
|
trusted library allocation
|
page read and write
|
||
56E0000
|
trusted library allocation
|
page read and write
|
There are 930 hidden memdumps, click here to show them.