Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_19a29c4013ef4dd44ec0ddb13aa79330f349af61_440dec59_0f5aa088\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_5d9419a62ad22f2f3dad8325a855f3b6c07dd93d_440dec59_050a1b5a\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_5d9419a62ad22f2f3dad8325a855f3b6c07dd93d_440dec59_11c5ac93\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_5d9419a62ad22f2f3dad8325a855f3b6c07dd93d_440dec59_12a5b81c\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_5d9419a62ad22f2f3dad8325a855f3b6c07dd93d_440dec59_14656e32\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_5d9419a62ad22f2f3dad8325a855f3b6c07dd93d_440dec59_15d97769\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_5d9419a62ad22f2f3dad8325a855f3b6c07dd93d_440dec59_16118592\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_5d9419a62ad22f2f3dad8325a855f3b6c07dd93d_440dec59_1669c460\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_5d9419a62ad22f2f3dad8325a855f3b6c07dd93d_440dec59_167963e1\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_5d9419a62ad22f2f3dad8325a855f3b6c07dd93d_440dec59_17059f44\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0W10PBUV\soft[1]
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\MEEXW4H4\dll[1]
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\aQULKwbFPdioo894n025t\Bunifu_UI_v1.5.3.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\aQULKwbFPdioo894n025t\Cleaner.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_445db5b1e911895cef210568c60f7d906ed046_440dec59_126996c2\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_aa89147a1632e1dc9dc974cd4d3dc4b44506e_440dec59_0b008542\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_aa89147a1632e1dc9dc974cd4d3dc4b44506e_440dec59_0d406b90\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_aa89147a1632e1dc9dc974cd4d3dc4b44506e_440dec59_0ee88fc2\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_aa89147a1632e1dc9dc974cd4d3dc4b44506e_440dec59_146c4ac9\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_aa89147a1632e1dc9dc974cd4d3dc4b44506e_440dec59_147c56fe\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_aa89147a1632e1dc9dc974cd4d3dc4b44506e_440dec59_14851770\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_aa89147a1632e1dc9dc974cd4d3dc4b44506e_440dec59_160c9d5e\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_aa89147a1632e1dc9dc974cd4d3dc4b44506e_440dec59_1688a9a3\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_aa89147a1632e1dc9dc974cd4d3dc4b44506e_440dec59_1774bb65\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6M6D1PMD\soft[1]
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\VAHFWDJC\dll[1]
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\du2kVBqiTxfv\Bunifu_UI_v1.5.3.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\du2kVBqiTxfv\Cleaner.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1455.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue Oct 4 00:32:51 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER19C5.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1A91.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6095.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue Oct 4 00:32:05 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER62E8.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6385.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6B15.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue Oct 4 00:32:08 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6D39.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6DC6.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER73B0.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue Oct 4 00:32:10 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7632.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER76CF.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7F87.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue Oct 4 00:32:13 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8209.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER83CF.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER99E1.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue Oct 4 00:33:26 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9A91.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue Oct 4 00:32:20 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9D51.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9EAA.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9EF2.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9FBF.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA688.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue Oct 4 00:32:23 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAB3C.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAC08.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB2DC.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue Oct 4 00:32:26 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB696.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB753.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC078.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue Oct 4 00:32:30 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC367.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC3F5.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0W10PBUV\library[1].htm
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\MEEXW4H4\library[1].htm
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\MEEXW4H4\ping[1].htm
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PSUEOSZZ\ping[1].htm
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\fuckingdllENCR[1].dll
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\ping[1].htm
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\Desktop\Cleaner.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Icon
number=0, Archive, ctime=Mon Oct 3 23:32:49 2022, mtime=Mon Oct 3 23:32:49 2022, atime=Mon Oct 3 23:32:49 2022, length=3947920,
window=hide
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER125F.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue Oct 4 00:20:36 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER14F0.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER158E.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER44BE.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue Oct 4 00:19:43 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER477F.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER484B.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5190.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue Oct 4 00:19:47 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER54AE.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER554B.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5D48.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue Oct 4 00:19:50 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5FD9.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6067.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8050.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue Oct 4 00:19:59 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8311.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER83DD.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8B0E.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue Oct 4 00:20:01 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8D32.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8DA1.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER90A7.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue Oct 4 00:21:09 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9490.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER94FF.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER97E0.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue Oct 4 00:20:05 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9AFE.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9B9B.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA51E.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue Oct 4 00:20:08 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA781.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA80E.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB0A7.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue Oct 4 00:20:11 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB55C.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB685.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBD48.tmp.dmp
|
Mini DuMP crash report, 16 streams, Tue Oct 4 00:21:28 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD8A1.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDB03.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\ping[1].htm
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2K7JPOQS\fuckingdllENCR[1].dll
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2K7JPOQS\ping[1].htm
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6M6D1PMD\library[1].htm
|
very short file (no magic)
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\VAHFWDJC\library[1].htm
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\VAHFWDJC\ping[1].htm
|
very short file (no magic)
|
dropped
|
There are 96 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
C:\Users\user\Desktop\file.exe
|
||
C:\Users\user\AppData\Local\Temp\aQULKwbFPdioo894n025t\Cleaner.exe
|
"C:\Users\user\AppData\Local\Temp\aQULKwbFPdioo894n025t\Cleaner.exe"
|
||
C:\Users\user\AppData\Local\Temp\du2kVBqiTxfv\Cleaner.exe
|
"C:\Users\user~1\AppData\Local\Temp\du2kVBqiTxfv\Cleaner.exe"
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 5380 -s 528
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 5380 -s 700
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 5380 -s 732
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 5380 -s 744
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 5380 -s 776
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 5380 -s 900
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 5380 -s 964
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 5380 -s 1152
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 5380 -s 1280
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\user\AppData\Local\Temp\aQULKwbFPdioo894n025t\Cleaner.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 5380 -s 1272
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 5464 -s 528
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 5464 -s 708
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 5464 -s 716
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 5464 -s 724
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 5464 -s 776
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 5464 -s 896
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 5464 -s 908
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 5464 -s 1156
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 5464 -s 1228
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\user~1\AppData\Local\Temp\du2kVBqiTxfv\Cleaner.exe
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 5464 -s 1292
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c taskkill /im "file.exe" /f & erase "C:\Users\user\Desktop\file.exe" & exit
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /im "file.exe" /f
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -u -p 2380 -s 1576
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -u -p 2380 -s 1576
|
There are 20 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://208.67.104.97/powfhxhxcjzx/ping.php?sub=NOSUB&stream=start&substream=mixinte
|
208.67.104.97
|
||
http://208.67.104.97/powfhxhxcjzx/ping.php?sub=NOSUB&stream=mixtwo&substream=mixinte
|
208.67.104.97
|
||
http://85.31.46.167/software.php
|
85.31.46.167
|
||
http://208.67.104.97/powfhxhxcjzx/ping.php?sub=NOSUB&stream=start&subst
|
unknown
|
||
http://171.22.30.106/library.php
|
171.22.30.106
|
||
http://208.67.104.97/powfhxhxcjzx/ping.php?sub=NOSUB&stream=start&substream=mixinte0I/R
|
unknown
|
||
http://208.67.104.97/powfhxhxcjzx/ping.php?sub=NOSUB&stream=start&substream=mixinteS
|
unknown
|
||
http://208.67.104.97/powfhxhxcjzx/ping.php?sub=NOSUB&stream=start&substream=mixinte3
|
unknown
|
||
http://www.fontbureau.com/designersG
|
unknown
|
||
http://www.fontbureau.com/designers/?
|
unknown
|
||
http://www.founder.com.cn/cn/bThe
|
unknown
|
||
http://www.fontbureau.com/designers?
|
unknown
|
||
http://85.31.46.167/software.phpll
|
unknown
|
||
https://take.rdrct-now.online/go/ZWKA?p78705p298845p1174
|
unknown
|
||
http://www.tiro.com
|
unknown
|
||
http://www.fontbureau.com/designers
|
unknown
|
||
http://www.goodfont.co.kr
|
unknown
|
||
http://www.sajatypeworks.com
|
unknown
|
||
http://www.typography.netD
|
unknown
|
||
http://www.founder.com.cn/cn/cThe
|
unknown
|
||
http://www.galapagosdesign.com/staff/dennis.htm
|
unknown
|
||
http://fontfabrik.com
|
unknown
|
||
http://www.fontbureau.com/designersrsivo
|
unknown
|
||
http://www.fontbureau.com/designersers
|
unknown
|
||
http://85.31.46.167/software.phpZ
|
unknown
|
||
http://www.galapagosdesign.com/DPlease
|
unknown
|
||
http://www.fonts.com
|
unknown
|
||
http://www.sandoll.co.kr
|
unknown
|
||
http://www.urwpp.deDPlease
|
unknown
|
||
http://www.zhongyicts.com.cn
|
unknown
|
||
http://107.182.129.235/storage/ping.php
|
107.182.129.235
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://www.fontbureau.com/designersp
|
unknown
|
||
http://www.sakkal.com
|
unknown
|
||
http://85.31.46.167/software.phpP
|
unknown
|
||
http://85.31.46.167/software.phpO
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0
|
unknown
|
||
http://www.fontbureau.com
|
unknown
|
||
http://www.agfamonotype.
|
unknown
|
||
http://107.182.129.235/storage/extension.php
|
107.182.129.235
|
||
http://85.31.46.167/software.phpx
|
unknown
|
||
http://upx.sf.net
|
unknown
|
||
http://85.31.46.167/software.phpstem32
|
unknown
|
||
http://www.ccleaner.comqhttps://take.rdrct-now.online/go/ZWKA?p78705p298845p1174
|
unknown
|
||
https://iplogger.org
|
unknown
|
||
http://en.w
|
unknown
|
||
http://www.ascendercorp.com/typedesigners.htmled.
|
unknown
|
||
https://iplogger.orgx
|
unknown
|
||
http://85.31.46.167/software.phpl
|
unknown
|
||
http://www.carterandcone.coml
|
unknown
|
||
http://www.fontbureau.com/designers/cabarga.htmlN
|
unknown
|
||
http://iplogger.org
|
unknown
|
||
http://www.founder.com.cn/cn
|
unknown
|
||
http://www.fontbureau.com/designers/frere-jones.html
|
unknown
|
||
http://85.31.46.167/software.php$
|
unknown
|
||
https://g-cleanit.hk
|
unknown
|
||
http://www.jiyu-kobo.co.jp/
|
unknown
|
||
http://www.fontbureau.com/designerseK
|
unknown
|
||
http://www.fontbureau.com/designers8
|
unknown
|
||
https://iplogger.org/1Pz8p7
|
148.251.234.83
|
||
http://www.fontbureau.com/designers/
|
unknown
|
||
http://85.31.46.167/software.phpCoo
|
unknown
|
||
http://www.zhongyicts.com.cnC
|
unknown
|
||
http://www.jiyu-kobo.co.jp/G.F
|
unknown
|
||
http://www.fontbureau.comcC
|
unknown
|
||
http://www.jiyu-kobo.co.jp/siv
|
unknown
|
||
http://www.fontbureau.com.TTFh~
|
unknown
|
||
http://www.jiyu-kobo.co.jp/S.TTFC
|
unknown
|
||
http://www.sandoll.co.krrnta
|
unknown
|
||
http://www.jiyu-kobo.co.jp/.TTCo
|
unknown
|
||
http://www.jiyu-kobo.co.jp/co
|
unknown
|
||
http://www.jiyu-kobo.co.jp/jp/Fa
|
unknown
|
||
http://85.31.46.167/software.phpR
|
unknown
|
||
http://www.jiyu-kobo.co.jp/jp/ywa
|
unknown
|
||
http://85.31.46.167/software.phpN
|
unknown
|
||
http://www.jiyu-kobo.co.jp/eC
|
unknown
|
||
http://www.urwpp.de%
|
unknown
|
||
http://www.galapagosdesign.com/
|
unknown
|
||
http://www.jiyu-kobo.co.jp/jp/FC
|
unknown
|
||
http://www.jiyu-kobo.co.jp/Fa
|
unknown
|
||
http://www.jiyu-kobo.co.jp/C
|
unknown
|
||
http://www.zhongyicts.com.cnp.
|
unknown
|
||
http://www.jiyu-kobo.co.jp/jp/
|
unknown
|
||
https://iplogger.org/1
|
unknown
|
||
http://www.jiyu-kobo.co.jp/x
|
unknown
|
||
http://www.sandoll.co.kral
|
unknown
|
||
http://www.fontbureau.com/designers/cabarga.html
|
unknown
|
||
http://www.monotype.
|
unknown
|
||
http://www.jiyu-kobo.co.jp/o
|
unknown
|
||
http://www.jiyu-kobo.co.jp/p
|
unknown
|
||
http://www.zhongyicts.com.cno.
|
unknown
|
||
http://85.31.46.167/software.phpwv
|
unknown
|
||
http://www.fontbureau.com/designers0
|
unknown
|
||
http://www.sajatypeworks.com(
|
unknown
|
There are 84 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
iplogger.org
|
148.251.234.83
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
208.67.104.97
|
unknown
|
United States
|
||
85.31.46.167
|
unknown
|
Germany
|
||
148.251.234.83
|
iplogger.org
|
Germany
|
||
107.182.129.235
|
unknown
|
Reserved
|
||
171.22.30.106
|
unknown
|
Germany
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{be0e8cda-4f56-9499-4bd1-3b6ec2d5a6f1}\Root\InventoryApplicationFile\file.exe|8ba335a3
|
ProgramId
|
||
\REGISTRY\A\{be0e8cda-4f56-9499-4bd1-3b6ec2d5a6f1}\Root\InventoryApplicationFile\file.exe|8ba335a3
|
FileId
|
||
\REGISTRY\A\{be0e8cda-4f56-9499-4bd1-3b6ec2d5a6f1}\Root\InventoryApplicationFile\file.exe|8ba335a3
|
LowerCaseLongPath
|
||
\REGISTRY\A\{be0e8cda-4f56-9499-4bd1-3b6ec2d5a6f1}\Root\InventoryApplicationFile\file.exe|8ba335a3
|
LongPathHash
|
||
\REGISTRY\A\{be0e8cda-4f56-9499-4bd1-3b6ec2d5a6f1}\Root\InventoryApplicationFile\file.exe|8ba335a3
|
Name
|
||
\REGISTRY\A\{be0e8cda-4f56-9499-4bd1-3b6ec2d5a6f1}\Root\InventoryApplicationFile\file.exe|8ba335a3
|
Publisher
|
||
\REGISTRY\A\{be0e8cda-4f56-9499-4bd1-3b6ec2d5a6f1}\Root\InventoryApplicationFile\file.exe|8ba335a3
|
Version
|
||
\REGISTRY\A\{be0e8cda-4f56-9499-4bd1-3b6ec2d5a6f1}\Root\InventoryApplicationFile\file.exe|8ba335a3
|
BinFileVersion
|
||
\REGISTRY\A\{be0e8cda-4f56-9499-4bd1-3b6ec2d5a6f1}\Root\InventoryApplicationFile\file.exe|8ba335a3
|
BinaryType
|
||
\REGISTRY\A\{be0e8cda-4f56-9499-4bd1-3b6ec2d5a6f1}\Root\InventoryApplicationFile\file.exe|8ba335a3
|
ProductName
|
||
\REGISTRY\A\{be0e8cda-4f56-9499-4bd1-3b6ec2d5a6f1}\Root\InventoryApplicationFile\file.exe|8ba335a3
|
ProductVersion
|
||
\REGISTRY\A\{be0e8cda-4f56-9499-4bd1-3b6ec2d5a6f1}\Root\InventoryApplicationFile\file.exe|8ba335a3
|
LinkDate
|
||
\REGISTRY\A\{be0e8cda-4f56-9499-4bd1-3b6ec2d5a6f1}\Root\InventoryApplicationFile\file.exe|8ba335a3
|
BinProductVersion
|
||
\REGISTRY\A\{be0e8cda-4f56-9499-4bd1-3b6ec2d5a6f1}\Root\InventoryApplicationFile\file.exe|8ba335a3
|
Size
|
||
\REGISTRY\A\{be0e8cda-4f56-9499-4bd1-3b6ec2d5a6f1}\Root\InventoryApplicationFile\file.exe|8ba335a3
|
Language
|
||
\REGISTRY\A\{be0e8cda-4f56-9499-4bd1-3b6ec2d5a6f1}\Root\InventoryApplicationFile\file.exe|8ba335a3
|
IsPeFile
|
||
\REGISTRY\A\{be0e8cda-4f56-9499-4bd1-3b6ec2d5a6f1}\Root\InventoryApplicationFile\file.exe|8ba335a3
|
IsOsComponent
|
||
\REGISTRY\A\{b2b1fbe6-f438-be8d-2f47-922cd070b7dd}\Root\InventoryApplicationFile\file.exe|8c8dee0a
|
ProgramId
|
||
\REGISTRY\A\{b2b1fbe6-f438-be8d-2f47-922cd070b7dd}\Root\InventoryApplicationFile\file.exe|8c8dee0a
|
FileId
|
||
\REGISTRY\A\{b2b1fbe6-f438-be8d-2f47-922cd070b7dd}\Root\InventoryApplicationFile\file.exe|8c8dee0a
|
LowerCaseLongPath
|
||
\REGISTRY\A\{b2b1fbe6-f438-be8d-2f47-922cd070b7dd}\Root\InventoryApplicationFile\file.exe|8c8dee0a
|
LongPathHash
|
||
\REGISTRY\A\{b2b1fbe6-f438-be8d-2f47-922cd070b7dd}\Root\InventoryApplicationFile\file.exe|8c8dee0a
|
Name
|
||
\REGISTRY\A\{b2b1fbe6-f438-be8d-2f47-922cd070b7dd}\Root\InventoryApplicationFile\file.exe|8c8dee0a
|
Publisher
|
||
\REGISTRY\A\{b2b1fbe6-f438-be8d-2f47-922cd070b7dd}\Root\InventoryApplicationFile\file.exe|8c8dee0a
|
Version
|
||
\REGISTRY\A\{b2b1fbe6-f438-be8d-2f47-922cd070b7dd}\Root\InventoryApplicationFile\file.exe|8c8dee0a
|
BinFileVersion
|
||
\REGISTRY\A\{b2b1fbe6-f438-be8d-2f47-922cd070b7dd}\Root\InventoryApplicationFile\file.exe|8c8dee0a
|
BinaryType
|
||
\REGISTRY\A\{b2b1fbe6-f438-be8d-2f47-922cd070b7dd}\Root\InventoryApplicationFile\file.exe|8c8dee0a
|
ProductName
|
||
\REGISTRY\A\{b2b1fbe6-f438-be8d-2f47-922cd070b7dd}\Root\InventoryApplicationFile\file.exe|8c8dee0a
|
ProductVersion
|
||
\REGISTRY\A\{b2b1fbe6-f438-be8d-2f47-922cd070b7dd}\Root\InventoryApplicationFile\file.exe|8c8dee0a
|
LinkDate
|
||
\REGISTRY\A\{b2b1fbe6-f438-be8d-2f47-922cd070b7dd}\Root\InventoryApplicationFile\file.exe|8c8dee0a
|
BinProductVersion
|
||
\REGISTRY\A\{b2b1fbe6-f438-be8d-2f47-922cd070b7dd}\Root\InventoryApplicationFile\file.exe|8c8dee0a
|
Size
|
||
\REGISTRY\A\{b2b1fbe6-f438-be8d-2f47-922cd070b7dd}\Root\InventoryApplicationFile\file.exe|8c8dee0a
|
Language
|
||
\REGISTRY\A\{b2b1fbe6-f438-be8d-2f47-922cd070b7dd}\Root\InventoryApplicationFile\file.exe|8c8dee0a
|
IsPeFile
|
||
\REGISTRY\A\{b2b1fbe6-f438-be8d-2f47-922cd070b7dd}\Root\InventoryApplicationFile\file.exe|8c8dee0a
|
IsOsComponent
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
|
AmiHivePermissionsCorrect
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
|
AmiHiveOwnerCorrect
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
|
ExceptionRecord
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Cleaner_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Cleaner_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Cleaner_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Cleaner_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Cleaner_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Cleaner_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Cleaner_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Cleaner_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Cleaner_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Cleaner_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Cleaner_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Cleaner_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Cleaner_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Cleaner_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\Software\GCleaner\Trial
|
Count
|
||
HKEY_CURRENT_USER\Software\GCleaner\License
|
License
|
||
HKEY_CURRENT_USER\Software\GCleaner\Install
|
Postcheck
|
||
\REGISTRY\A\{aa4d2169-aa56-28da-7d2c-76bcfe57de21}\Root\InventoryApplicationFile\cleaner.exe|843ce3a105c8a7f3
|
ProgramId
|
||
\REGISTRY\A\{aa4d2169-aa56-28da-7d2c-76bcfe57de21}\Root\InventoryApplicationFile\cleaner.exe|843ce3a105c8a7f3
|
FileId
|
||
\REGISTRY\A\{aa4d2169-aa56-28da-7d2c-76bcfe57de21}\Root\InventoryApplicationFile\cleaner.exe|843ce3a105c8a7f3
|
LowerCaseLongPath
|
||
\REGISTRY\A\{aa4d2169-aa56-28da-7d2c-76bcfe57de21}\Root\InventoryApplicationFile\cleaner.exe|843ce3a105c8a7f3
|
LongPathHash
|
||
\REGISTRY\A\{aa4d2169-aa56-28da-7d2c-76bcfe57de21}\Root\InventoryApplicationFile\cleaner.exe|843ce3a105c8a7f3
|
Name
|
||
\REGISTRY\A\{aa4d2169-aa56-28da-7d2c-76bcfe57de21}\Root\InventoryApplicationFile\cleaner.exe|843ce3a105c8a7f3
|
Publisher
|
||
\REGISTRY\A\{aa4d2169-aa56-28da-7d2c-76bcfe57de21}\Root\InventoryApplicationFile\cleaner.exe|843ce3a105c8a7f3
|
Version
|
||
\REGISTRY\A\{aa4d2169-aa56-28da-7d2c-76bcfe57de21}\Root\InventoryApplicationFile\cleaner.exe|843ce3a105c8a7f3
|
BinFileVersion
|
||
\REGISTRY\A\{aa4d2169-aa56-28da-7d2c-76bcfe57de21}\Root\InventoryApplicationFile\cleaner.exe|843ce3a105c8a7f3
|
BinaryType
|
||
\REGISTRY\A\{aa4d2169-aa56-28da-7d2c-76bcfe57de21}\Root\InventoryApplicationFile\cleaner.exe|843ce3a105c8a7f3
|
ProductName
|
||
\REGISTRY\A\{aa4d2169-aa56-28da-7d2c-76bcfe57de21}\Root\InventoryApplicationFile\cleaner.exe|843ce3a105c8a7f3
|
ProductVersion
|
||
\REGISTRY\A\{aa4d2169-aa56-28da-7d2c-76bcfe57de21}\Root\InventoryApplicationFile\cleaner.exe|843ce3a105c8a7f3
|
LinkDate
|
||
\REGISTRY\A\{aa4d2169-aa56-28da-7d2c-76bcfe57de21}\Root\InventoryApplicationFile\cleaner.exe|843ce3a105c8a7f3
|
BinProductVersion
|
||
\REGISTRY\A\{aa4d2169-aa56-28da-7d2c-76bcfe57de21}\Root\InventoryApplicationFile\cleaner.exe|843ce3a105c8a7f3
|
Size
|
||
\REGISTRY\A\{aa4d2169-aa56-28da-7d2c-76bcfe57de21}\Root\InventoryApplicationFile\cleaner.exe|843ce3a105c8a7f3
|
Language
|
||
\REGISTRY\A\{aa4d2169-aa56-28da-7d2c-76bcfe57de21}\Root\InventoryApplicationFile\cleaner.exe|843ce3a105c8a7f3
|
IsPeFile
|
||
\REGISTRY\A\{aa4d2169-aa56-28da-7d2c-76bcfe57de21}\Root\InventoryApplicationFile\cleaner.exe|843ce3a105c8a7f3
|
IsOsComponent
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\Debug
|
ExceptionRecord
|
There are 62 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
710000
|
direct allocation
|
page execute and read and write
|
||
710000
|
direct allocation
|
page execute and read and write
|
||
710000
|
direct allocation
|
page execute and read and write
|
||
710000
|
direct allocation
|
page execute and read and write
|
||
710000
|
direct allocation
|
page execute and read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
710000
|
direct allocation
|
page execute and read and write
|
||
710000
|
direct allocation
|
page execute and read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
710000
|
direct allocation
|
page execute and read and write
|
||
710000
|
direct allocation
|
page execute and read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
710000
|
direct allocation
|
page execute and read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
710000
|
direct allocation
|
page execute and read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
710000
|
direct allocation
|
page execute and read and write
|
||
710000
|
direct allocation
|
page execute and read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
710000
|
direct allocation
|
page execute and read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
710000
|
direct allocation
|
page execute and read and write
|
||
710000
|
direct allocation
|
page execute and read and write
|
||
2210000
|
direct allocation
|
page read and write
|
||
24B1ACE8000
|
trusted library allocation
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
2EE0000
|
trusted library allocation
|
page read and write
|
||
24B7E1A0000
|
heap
|
page read and write
|
||
2C5E000
|
stack
|
page read and write
|
||
24B1AA23000
|
heap
|
page read and write
|
||
2647B658000
|
heap
|
page read and write
|
||
24B7E1A9000
|
heap
|
page read and write
|
||
264E5890000
|
heap
|
page read and write
|
||
24B18910000
|
trusted library allocation
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
24B7E1C5000
|
heap
|
page read and write
|
||
A6F000
|
stack
|
page read and write
|
||
1B4C8A40000
|
heap
|
page read and write
|
||
2A1E000
|
stack
|
page read and write
|
||
24B7E197000
|
heap
|
page read and write
|
||
24B184A0000
|
trusted library allocation
|
page read and write
|
||
24B7E1A0000
|
heap
|
page read and write
|
||
C5EFF9B000
|
stack
|
page read and write
|
||
24B7E1CE000
|
heap
|
page read and write
|
||
291E000
|
stack
|
page read and write
|
||
30000
|
unkown
|
page read and write
|
||
85F000
|
heap
|
page read and write
|
||
24B7E026000
|
heap
|
page read and write
|
||
CC261F7000
|
stack
|
page read and write
|
||
38B0000
|
trusted library allocation
|
page read and write
|
||
24B7D740000
|
trusted library allocation
|
page read and write
|
||
24B7E382000
|
trusted library allocation
|
page read and write
|
||
24B7E198000
|
heap
|
page read and write
|
||
24B7D680000
|
trusted library allocation
|
page read and write
|
||
24B7E1C5000
|
heap
|
page read and write
|
||
24B18430000
|
trusted library allocation
|
page read and write
|
||
24B7E190000
|
heap
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
2208BC02000
|
trusted library allocation
|
page read and write
|
||
2647B5D0000
|
remote allocation
|
page read and write
|
||
24B7E1C5000
|
heap
|
page read and write
|
||
24B7E1BE000
|
heap
|
page read and write
|
||
24B18510000
|
trusted library allocation
|
page read and write
|
||
24B7E085000
|
trusted library allocation
|
page read and write
|
||
24B7DFE3000
|
heap
|
page read and write
|
||
24B7E1C9000
|
heap
|
page read and write
|
||
1CA22802000
|
heap
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
3A8A000
|
trusted library allocation
|
page read and write
|
||
24B7E1BE000
|
heap
|
page read and write
|
||
7EC717E000
|
stack
|
page read and write
|
||
24B7E1CA000
|
heap
|
page read and write
|
||
24B7D710000
|
trusted library allocation
|
page read and write
|
||
24B7BB50000
|
heap
|
page read and write
|
||
24B18000000
|
heap
|
page read and write
|
||
86C000
|
heap
|
page read and write
|
||
24B7E19F000
|
heap
|
page read and write
|
||
24B7E605000
|
trusted library allocation
|
page read and write
|
||
24B7E186000
|
heap
|
page read and write
|
||
161F7C49000
|
heap
|
page read and write
|
||
22D0000
|
heap
|
page read and write
|
||
24B7E19E000
|
heap
|
page read and write
|
||
2647B641000
|
heap
|
page read and write
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
20003240000
|
heap
|
page read and write
|
||
24B7E19E000
|
heap
|
page read and write
|
||
24B7E1C6000
|
heap
|
page read and write
|
||
3940000
|
trusted library allocation
|
page read and write
|
||
24B7E1C5000
|
heap
|
page read and write
|
||
1F9379E5000
|
heap
|
page read and write
|
||
245D000
|
stack
|
page read and write
|
||
591000
|
unkown
|
page readonly
|
||
24B7E1A0000
|
heap
|
page read and write
|
||
85F000
|
heap
|
page read and write
|
||
24B7E1A0000
|
trusted library allocation
|
page read and write
|
||
40D000
|
unkown
|
page execute read
|
||
7FF4B7B80000
|
trusted library allocation
|
page execute and read and write
|
||
413817F000
|
stack
|
page read and write
|
||
843000
|
heap
|
page read and write
|
||
24B0042A000
|
trusted library allocation
|
page read and write
|
||
7FFBB0046000
|
trusted library allocation
|
page read and write
|
||
1F93798E000
|
heap
|
page read and write
|
||
590000
|
unkown
|
page read and write
|
||
2208B481000
|
heap
|
page read and write
|
||
24B7E1C0000
|
heap
|
page read and write
|
||
24B7E1BE000
|
heap
|
page read and write
|
||
24B7E1F9000
|
heap
|
page read and write
|
||
24B7E18B000
|
heap
|
page read and write
|
||
2B86000
|
heap
|
page read and write
|
||
24B7E1C4000
|
heap
|
page read and write
|
||
24B7E185000
|
heap
|
page read and write
|
||
24B1B45D000
|
heap
|
page read and write
|
||
43F000
|
unkown
|
page execute and read and write
|
||
2C5E000
|
stack
|
page read and write
|
||
3746000
|
trusted library allocation
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
264E5B08000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
24B7D6A0000
|
trusted library allocation
|
page read and write
|
||
1F9381C7000
|
heap
|
page read and write
|
||
2B1F000
|
stack
|
page read and write
|
||
24B1B870000
|
trusted library allocation
|
page read and write
|
||
24B1802D000
|
heap
|
page read and write
|
||
24B7E1C9000
|
heap
|
page read and write
|
||
264E5A4D000
|
heap
|
page read and write
|
||
291E000
|
stack
|
page read and write
|
||
2208B455000
|
heap
|
page read and write
|
||
24B7E1C6000
|
heap
|
page read and write
|
||
24B7E1C6000
|
heap
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
24B7E1C0000
|
heap
|
page read and write
|
||
24B7E1C3000
|
heap
|
page read and write
|
||
24B7E1FA000
|
heap
|
page read and write
|
||
24B180F4000
|
heap
|
page read and write
|
||
2EDE000
|
stack
|
page read and write
|
||
24B7D690000
|
trusted library allocation
|
page read and write
|
||
24B7D6B0000
|
trusted library allocation
|
page read and write
|
||
24B7E1DE000
|
heap
|
page read and write
|
||
24B7E186000
|
heap
|
page read and write
|
||
24B7E060000
|
trusted library allocation
|
page read and write
|
||
24B7E1C4000
|
heap
|
page read and write
|
||
43F000
|
unkown
|
page execute and read and write
|
||
24B1B0F1000
|
trusted library allocation
|
page read and write
|
||
24B7E1A0000
|
heap
|
page read and write
|
||
27DA000
|
heap
|
page read and write
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
246D5C88000
|
heap
|
page read and write
|
||
24B7E1C9000
|
heap
|
page read and write
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
2EDE000
|
stack
|
page read and write
|
||
264E5A4A000
|
heap
|
page read and write
|
||
24B7E1A9000
|
heap
|
page read and write
|
||
835000
|
heap
|
page read and write
|
||
24B7E1CE000
|
heap
|
page read and write
|
||
24B180C7000
|
heap
|
page read and write
|
||
2250000
|
remote allocation
|
page read and write
|
||
24B7E1A6000
|
heap
|
page read and write
|
||
24B7D7C4000
|
trusted library allocation
|
page read and write
|
||
37696FC000
|
stack
|
page read and write
|
||
24B7E1CD000
|
heap
|
page read and write
|
||
1ED221D0000
|
remote allocation
|
page read and write
|
||
246D5B70000
|
trusted library allocation
|
page read and write
|
||
241E000
|
stack
|
page read and write
|
||
249D000
|
stack
|
page read and write
|
||
24B00001000
|
trusted library allocation
|
page read and write
|
||
24B7D6C0000
|
heap
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
2B5D000
|
stack
|
page read and write
|
||
24B7E1A2000
|
heap
|
page read and write
|
||
24B18051000
|
heap
|
page read and write
|
||
96F000
|
stack
|
page read and write
|
||
224D000
|
stack
|
page read and write
|
||
246D6402000
|
heap
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
24B1B487000
|
heap
|
page read and write
|
||
24B18920000
|
trusted library allocation
|
page read and write
|
||
24B7E580000
|
trusted library allocation
|
page read and write
|
||
24B7E1C0000
|
heap
|
page read and write
|
||
2EDE000
|
stack
|
page read and write
|
||
24B1B460000
|
heap
|
page read and write
|
||
24B7E1A0000
|
heap
|
page read and write
|
||
24B7E1D0000
|
trusted library allocation
|
page read and write
|
||
24B18920000
|
trusted library allocation
|
page read and write
|
||
24B7E3A0000
|
trusted library allocation
|
page read and write
|
||
24B1B360000
|
trusted library allocation
|
page read and write
|
||
24B7E1A0000
|
heap
|
page read and write
|
||
374D000
|
trusted library allocation
|
page read and write
|
||
24B7E1B1000
|
heap
|
page read and write
|
||
24B7E070000
|
trusted library allocation
|
page read and write
|
||
24B1ACC1000
|
heap
|
page read and write
|
||
2C9D000
|
stack
|
page read and write
|
||
24B1B469000
|
heap
|
page read and write
|
||
778000
|
heap
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
1B4C88F0000
|
heap
|
page read and write
|
||
2647B440000
|
heap
|
page read and write
|
||
24B7BCEB000
|
heap
|
page read and write
|
||
24B7E1BE000
|
heap
|
page read and write
|
||
7FFBAFFEC000
|
trusted library allocation
|
page execute and read and write
|
||
B5262FC000
|
stack
|
page read and write
|
||
24B7E1CD000
|
heap
|
page read and write
|
||
24B7E0E0000
|
trusted library allocation
|
page read and write
|
||
3769779000
|
stack
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
246D5AE0000
|
heap
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
24B7E187000
|
heap
|
page read and write
|
||
24B7E1C9000
|
heap
|
page read and write
|
||
24B7E18C000
|
heap
|
page read and write
|
||
24B180B6000
|
heap
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
24B7E0B0000
|
trusted library allocation
|
page read and write
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
24B7E6E0000
|
trusted library allocation
|
page read and write
|
||
1CA22854000
|
heap
|
page read and write
|
||
2310000
|
heap
|
page read and write
|
||
24B7E19B000
|
heap
|
page read and write
|
||
24B7E1CB000
|
heap
|
page read and write
|
||
24B7E196000
|
heap
|
page read and write
|
||
24B7E1CC000
|
heap
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
2340000
|
unkown
|
page readonly
|
||
C5F08FB000
|
stack
|
page read and write
|
||
24B7E4C0000
|
trusted library allocation
|
page read and write
|
||
24B7E160000
|
heap
|
page read and write
|
||
24B7E1C9000
|
heap
|
page read and write
|
||
24B7E440000
|
trusted library allocation
|
page read and write
|
||
78A000
|
heap
|
page execute and read and write
|
||
2C5E000
|
stack
|
page read and write
|
||
24B7E1BB000
|
heap
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
24B1B05C000
|
trusted library allocation
|
page read and write
|
||
7EC737F000
|
stack
|
page read and write
|
||
10007B000
|
stack
|
page read and write
|
||
24B184B0000
|
trusted library allocation
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
24B7E1A0000
|
heap
|
page read and write
|
||
24B7E1C6000
|
heap
|
page read and write
|
||
24B7E1A0000
|
heap
|
page read and write
|
||
24B7E1C8000
|
heap
|
page read and write
|
||
24B7E18D000
|
heap
|
page read and write
|
||
86C000
|
heap
|
page read and write
|
||
24B7E1BB000
|
heap
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
C5F05FF000
|
stack
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
29EF000
|
unkown
|
page read and write
|
||
161F7C41000
|
heap
|
page read and write
|
||
24B7E18A000
|
heap
|
page read and write
|
||
43F000
|
unkown
|
page execute and read and write
|
||
374D000
|
trusted library allocation
|
page read and write
|
||
24B7E190000
|
heap
|
page read and write
|
||
161F7C6D000
|
heap
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
38F5000
|
trusted library allocation
|
page read and write
|
||
24B7D750000
|
trusted library allocation
|
page read and write
|
||
24B7E1CE000
|
heap
|
page read and write
|
||
6FE000
|
stack
|
page read and write
|
||
24B7D71A000
|
trusted library allocation
|
page read and write
|
||
24B18510000
|
trusted library allocation
|
page read and write
|
||
24B7E1A0000
|
heap
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
591000
|
unkown
|
page readonly
|
||
30000
|
unkown
|
page read and write
|
||
24B7E19E000
|
heap
|
page read and write
|
||
249F000
|
stack
|
page read and write
|
||
246D5B40000
|
heap
|
page read and write
|
||
7FFBAFFAD000
|
trusted library allocation
|
page execute and read and write
|
||
24B18500000
|
trusted library allocation
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
24B7BCF9000
|
heap
|
page read and write
|
||
24B7E1CA000
|
heap
|
page read and write
|
||
2310000
|
heap
|
page read and write
|
||
24B7E1AC000
|
heap
|
page read and write
|
||
24B18450000
|
trusted library allocation
|
page read and write
|
||
24B7E1DE000
|
heap
|
page read and write
|
||
24B7E196000
|
heap
|
page read and write
|
||
24B7E1C0000
|
heap
|
page read and write
|
||
24B1B092000
|
trusted library allocation
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
24B7E1C0000
|
heap
|
page read and write
|
||
1F938154000
|
heap
|
page read and write
|
||
24B1ABC2000
|
heap
|
page read and write
|
||
24B7E19A000
|
heap
|
page read and write
|
||
22E0000
|
heap
|
page read and write
|
||
161F7C4F000
|
heap
|
page read and write
|
||
24B7E19B000
|
heap
|
page read and write
|
||
22BD000
|
stack
|
page read and write
|
||
1F937890000
|
heap
|
page read and write
|
||
778000
|
heap
|
page read and write
|
||
30000
|
unkown
|
page read and write
|
||
24B1AA07000
|
heap
|
page read and write
|
||
24B7E1C4000
|
heap
|
page read and write
|
||
24B7E1C6000
|
heap
|
page read and write
|
||
24B7E1C3000
|
heap
|
page read and write
|
||
161F7C46000
|
heap
|
page read and write
|
||
24B18910000
|
trusted library allocation
|
page read and write
|
||
24B1A443000
|
trusted library allocation
|
page read and write
|
||
24B7E1CE000
|
heap
|
page read and write
|
||
24B7E1B2000
|
heap
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
37F0000
|
trusted library allocation
|
page read and write
|
||
24B1B41D000
|
heap
|
page read and write
|
||
590000
|
unkown
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
6AE000
|
stack
|
page read and write
|
||
24B7E03D000
|
heap
|
page read and write
|
||
24B188E0000
|
trusted library allocation
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
CC263FF000
|
stack
|
page read and write
|
||
30000
|
unkown
|
page read and write
|
||
24B7E19A000
|
heap
|
page read and write
|
||
1F938230000
|
heap
|
page read and write
|
||
2B5D000
|
stack
|
page read and write
|
||
24B7E660000
|
trusted library allocation
|
page read and write
|
||
246D5CCB000
|
heap
|
page read and write
|
||
78A000
|
heap
|
page execute and read and write
|
||
24B1AA25000
|
heap
|
page read and write
|
||
24B7E670000
|
trusted library allocation
|
page read and write
|
||
78A000
|
heap
|
page execute and read and write
|
||
24B1ABCF000
|
heap
|
page read and write
|
||
24B7E6C0000
|
trusted library allocation
|
page read and write
|
||
24B1AA03000
|
heap
|
page read and write
|
||
24B7E1A2000
|
heap
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
86C000
|
heap
|
page read and write
|
||
30000
|
unkown
|
page read and write
|
||
24B18900000
|
trusted library allocation
|
page read and write
|
||
24B7E190000
|
heap
|
page read and write
|
||
24B7E18F000
|
heap
|
page read and write
|
||
24B7D720000
|
trusted library allocation
|
page read and write
|
||
24B7E187000
|
heap
|
page read and write
|
||
264E6202000
|
trusted library allocation
|
page read and write
|
||
24B7E19B000
|
heap
|
page read and write
|
||
264E5A3C000
|
heap
|
page read and write
|
||
24B7E1C9000
|
heap
|
page read and write
|
||
390C000
|
trusted library allocation
|
page read and write
|
||
24B18910000
|
trusted library allocation
|
page read and write
|
||
246D5AD0000
|
heap
|
page read and write
|
||
100DFE000
|
stack
|
page read and write
|
||
246D5CBC000
|
heap
|
page read and write
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
24B7E1B0000
|
trusted library allocation
|
page read and write
|
||
24B7E1CE000
|
heap
|
page read and write
|
||
24B180BF000
|
heap
|
page read and write
|
||
20003202000
|
heap
|
page read and write
|
||
6FE000
|
stack
|
page read and write
|
||
24B1B8A0000
|
trusted library allocation
|
page read and write
|
||
24B7E1C9000
|
heap
|
page read and write
|
||
24B7E1BF000
|
heap
|
page read and write
|
||
85F000
|
heap
|
page read and write
|
||
24B1A9C1000
|
heap
|
page read and write
|
||
161F7C68000
|
heap
|
page read and write
|
||
374F000
|
trusted library allocation
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
24B7E1CD000
|
heap
|
page read and write
|
||
1ED22400000
|
trusted library allocation
|
page read and write
|
||
249D000
|
stack
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
3D51000
|
trusted library allocation
|
page read and write
|
||
24B7D660000
|
trusted library allocation
|
page read and write
|
||
22E0000
|
heap
|
page read and write
|
||
778000
|
heap
|
page read and write
|
||
590000
|
unkown
|
page read and write
|
||
24B7E196000
|
heap
|
page read and write
|
||
2208B300000
|
heap
|
page read and write
|
||
24B7E190000
|
heap
|
page read and write
|
||
24B7E19E000
|
heap
|
page read and write
|
||
24B7E1A0000
|
heap
|
page read and write
|
||
85F000
|
heap
|
page read and write
|
||
24B7E1C0000
|
heap
|
page read and write
|
||
224D000
|
stack
|
page read and write
|
||
24B7BC09000
|
heap
|
page read and write
|
||
24B1B870000
|
trusted library allocation
|
page read and write
|
||
6FE000
|
stack
|
page read and write
|
||
246D5C3E000
|
heap
|
page read and write
|
||
24B7E490000
|
trusted library allocation
|
page read and write
|
||
24B7E18E000
|
heap
|
page read and write
|
||
24B1B47A000
|
heap
|
page read and write
|
||
22BD000
|
stack
|
page read and write
|
||
778000
|
heap
|
page read and write
|
||
24B7E1BB000
|
heap
|
page read and write
|
||
24B7D680000
|
trusted library allocation
|
page read and write
|
||
24B19C80000
|
trusted library allocation
|
page read and write
|
||
43F000
|
unkown
|
page execute and read and write
|
||
24B7E1AA000
|
heap
|
page read and write
|
||
1ED2084B000
|
heap
|
page read and write
|
||
3971000
|
trusted library allocation
|
page read and write
|
||
24B7E1F8000
|
heap
|
page read and write
|
||
7FFBAFF93000
|
trusted library allocation
|
page execute and read and write
|
||
24B7E360000
|
trusted library allocation
|
page read and write
|
||
245D000
|
stack
|
page read and write
|
||
24B7E1A0000
|
heap
|
page read and write
|
||
24B18910000
|
trusted library allocation
|
page read and write
|
||
24B7E1E9000
|
heap
|
page read and write
|
||
1B4C8A57000
|
heap
|
page read and write
|
||
1B4C8B02000
|
heap
|
page read and write
|
||
161F7C44000
|
heap
|
page read and write
|
||
246D5C71000
|
heap
|
page read and write
|
||
24B7E190000
|
heap
|
page read and write
|
||
24B7E1CE000
|
heap
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
24B7E1AC000
|
heap
|
page read and write
|
||
24B7E19E000
|
heap
|
page read and write
|
||
24B7E1CE000
|
heap
|
page read and write
|
||
2310000
|
heap
|
page read and write
|
||
1CA22790000
|
trusted library allocation
|
page read and write
|
||
24B18460000
|
trusted library allocation
|
page read and write
|
||
43F000
|
unkown
|
page execute and read and write
|
||
161F7C62000
|
heap
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
24B188E1000
|
trusted library allocation
|
page read and write
|
||
24B7E470000
|
trusted library allocation
|
page read and write
|
||
96F000
|
stack
|
page read and write
|
||
311E000
|
stack
|
page read and write
|
||
24B1B6DF000
|
trusted library allocation
|
page read and write
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
24B7E1CE000
|
heap
|
page read and write
|
||
3919000
|
trusted library allocation
|
page read and write
|
||
2310000
|
heap
|
page read and write
|
||
24B7D760000
|
heap
|
page read and write
|
||
24B7E1A7000
|
heap
|
page read and write
|
||
6B5000
|
heap
|
page read and write
|
||
6FE000
|
stack
|
page read and write
|
||
24B7E1C0000
|
heap
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
78A000
|
heap
|
page execute and read and write
|
||
24B7BE41000
|
trusted library allocation
|
page read and write
|
||
24B7E170000
|
trusted library allocation
|
page read and write
|
||
24B7D739000
|
trusted library allocation
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
24B7E19A000
|
heap
|
page read and write
|
||
24B7E18D000
|
heap
|
page read and write
|
||
43F000
|
unkown
|
page execute and read and write
|
||
94D8EFB000
|
stack
|
page read and write
|
||
24B180F0000
|
heap
|
page read and write
|
||
246D5C29000
|
heap
|
page read and write
|
||
24B7E193000
|
heap
|
page read and write
|
||
24B7E190000
|
heap
|
page read and write
|
||
24D0000
|
heap
|
page read and write
|
||
2A1E000
|
stack
|
page read and write
|
||
1F9381C0000
|
heap
|
page read and write
|
||
22D0000
|
heap
|
page read and write
|
||
1F93788A000
|
heap
|
page read and write
|
||
2647B702000
|
heap
|
page read and write
|
||
24B7E0D0000
|
trusted library allocation
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
24B7E1B4000
|
heap
|
page read and write
|
||
3341000
|
trusted library allocation
|
page read and write
|
||
24B7E1BB000
|
heap
|
page read and write
|
||
24C0000
|
remote allocation
|
page read and write
|
||
2647B430000
|
heap
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
264E5A56000
|
heap
|
page read and write
|
||
24B7E187000
|
heap
|
page read and write
|
||
835000
|
heap
|
page read and write
|
||
24B188E0000
|
trusted library allocation
|
page read and write
|
||
24B7D700000
|
trusted library allocation
|
page read and write
|
||
24B7E5E0000
|
trusted library allocation
|
page read and write
|
||
96F000
|
stack
|
page read and write
|
||
24B7E1BE000
|
heap
|
page read and write
|
||
24B19FD3000
|
trusted library allocation
|
page read and write
|
||
24B7E1C4000
|
heap
|
page read and write
|
||
24B7E700000
|
trusted library allocation
|
page read and write
|
||
37695FF000
|
stack
|
page read and write
|
||
24B7E1A0000
|
heap
|
page read and write
|
||
24B7E1A0000
|
heap
|
page read and write
|
||
161F7C2D000
|
heap
|
page read and write
|
||
24B7E1A0000
|
heap
|
page read and write
|
||
24B7E186000
|
heap
|
page read and write
|
||
24B188E0000
|
trusted library allocation
|
page read and write
|
||
24B7E1E0000
|
heap
|
page read and write
|
||
24B18910000
|
trusted library allocation
|
page read and write
|
||
24B1AA00000
|
heap
|
page read and write
|
||
24B7BBE0000
|
trusted library allocation
|
page read and write
|
||
A6F000
|
stack
|
page read and write
|
||
1ED20670000
|
heap
|
page read and write
|
||
590000
|
unkown
|
page read and write
|
||
24B7D730000
|
trusted library allocation
|
page read and write
|
||
6FE000
|
stack
|
page read and write
|
||
7FFBAFF94000
|
trusted library allocation
|
page read and write
|
||
24B7E120000
|
trusted library allocation
|
page read and write
|
||
A743DDB000
|
stack
|
page read and write
|
||
245D000
|
stack
|
page read and write
|
||
24B7E1A0000
|
heap
|
page read and write
|
||
78A000
|
heap
|
page execute and read and write
|
||
24B7E1CD000
|
heap
|
page read and write
|
||
24B1B0A7000
|
trusted library allocation
|
page read and write
|
||
24B7E300000
|
trusted library allocation
|
page read and write
|
||
24B7E380000
|
trusted library allocation
|
page read and write
|
||
24B7E1CB000
|
heap
|
page read and write
|
||
31F7000
|
trusted library allocation
|
page read and write
|
||
241E000
|
stack
|
page read and write
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
24B7BC19000
|
heap
|
page read and write
|
||
24B7E18E000
|
heap
|
page read and write
|
||
24B188E0000
|
trusted library allocation
|
page read and write
|
||
24B7E310000
|
trusted library allocation
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
413807C000
|
stack
|
page read and write
|
||
F3F73FE000
|
stack
|
page read and write
|
||
264E5A49000
|
heap
|
page read and write
|
||
24B7E110000
|
trusted library allocation
|
page read and write
|
||
24B1805C000
|
heap
|
page read and write
|
||
843000
|
heap
|
page read and write
|
||
24B7E1E0000
|
heap
|
page read and write
|
||
24B18430000
|
trusted library allocation
|
page read and write
|
||
24B1B880000
|
trusted library allocation
|
page read and write
|
||
20003228000
|
heap
|
page read and write
|
||
3B83000
|
trusted library allocation
|
page read and write
|
||
590000
|
unkown
|
page read and write
|
||
30000
|
unkown
|
page read and write
|
||
24B188E0000
|
trusted library allocation
|
page read and write
|
||
24B7D630000
|
heap
|
page execute and read and write
|
||
24B7E1CE000
|
heap
|
page read and write
|
||
2A1E000
|
stack
|
page read and write
|
||
24B1B404000
|
heap
|
page read and write
|
||
24B7E190000
|
heap
|
page read and write
|
||
24B7E1CA000
|
heap
|
page read and write
|
||
24B1B06E000
|
trusted library allocation
|
page read and write
|
||
22BD000
|
stack
|
page read and write
|
||
24B7E1BB000
|
heap
|
page read and write
|
||
3745000
|
trusted library allocation
|
page read and write
|
||
F3F6AFE000
|
stack
|
page read and write
|
||
24B7E1CA000
|
heap
|
page read and write
|
||
24B7BCE3000
|
heap
|
page read and write
|
||
24B7BCFD000
|
heap
|
page read and write
|
||
241E000
|
stack
|
page read and write
|
||
24B7E186000
|
heap
|
page read and write
|
||
24B7E2AD000
|
trusted library allocation
|
page read and write
|
||
2DDD000
|
stack
|
page read and write
|
||
2208B452000
|
heap
|
page read and write
|
||
24B7E190000
|
heap
|
page read and write
|
||
36B8B7E000
|
stack
|
page read and write
|
||
24B7E1CC000
|
heap
|
page read and write
|
||
24B7D690000
|
trusted library allocation
|
page read and write
|
||
24B7E1C9000
|
heap
|
page read and write
|
||
86C000
|
heap
|
page read and write
|
||
24B1B612000
|
trusted library allocation
|
page read and write
|
||
1F938102000
|
heap
|
page read and write
|
||
835000
|
heap
|
page read and write
|
||
24B7E1C4000
|
heap
|
page read and write
|
||
24B7DF6C000
|
heap
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
24B7E5A0000
|
trusted library allocation
|
page read and write
|
||
2350000
|
unkown
|
page read and write
|
||
24B18430000
|
trusted library allocation
|
page read and write
|
||
24B7BCF9000
|
heap
|
page read and write
|
||
6B5000
|
heap
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
389F000
|
trusted library allocation
|
page read and write
|
||
22F0000
|
remote allocation
|
page read and write
|
||
291E000
|
stack
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
24B7D680000
|
trusted library allocation
|
page read and write
|
||
24B7E1CA000
|
heap
|
page read and write
|
||
24B7E6F0000
|
trusted library allocation
|
page read and write
|
||
2D9E000
|
stack
|
page read and write
|
||
24B7E1C9000
|
heap
|
page read and write
|
||
24B7E1C5000
|
heap
|
page read and write
|
||
86E000
|
heap
|
page read and write
|
||
24B7E1BB000
|
heap
|
page read and write
|
||
22F0000
|
remote allocation
|
page read and write
|
||
24B7D722000
|
trusted library allocation
|
page read and write
|
||
24B7E19C000
|
heap
|
page read and write
|
||
1F938202000
|
heap
|
page read and write
|
||
24B7E19F000
|
heap
|
page read and write
|
||
A7443FE000
|
stack
|
page read and write
|
||
24B180AB000
|
heap
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
24B7D7E0000
|
heap
|
page read and write
|
||
A7442F9000
|
stack
|
page read and write
|
||
24B7E19D000
|
heap
|
page read and write
|
||
24B18460000
|
trusted library allocation
|
page read and write
|
||
311E000
|
stack
|
page read and write
|
||
96F000
|
stack
|
page read and write
|
||
24B7E1DE000
|
heap
|
page read and write
|
||
24B7E1C9000
|
heap
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
4137F7C000
|
stack
|
page read and write
|
||
24B7DF8A000
|
heap
|
page read and write
|
||
24B7E18B000
|
heap
|
page read and write
|
||
24B18540000
|
trusted library allocation
|
page read and write
|
||
24B7E188000
|
heap
|
page read and write
|
||
1ED2085B000
|
heap
|
page read and write
|
||
24B18460000
|
trusted library allocation
|
page read and write
|
||
24B7E1A0000
|
heap
|
page read and write
|
||
246D5C00000
|
heap
|
page read and write
|
||
24B18350000
|
trusted library allocation
|
page read and write
|
||
24B7E1F0000
|
trusted library allocation
|
page read and write
|
||
24B7E193000
|
heap
|
page read and write
|
||
6AE000
|
stack
|
page read and write
|
||
24B7BCE3000
|
heap
|
page read and write
|
||
24B7E1BE000
|
heap
|
page read and write
|
||
24B1B610000
|
trusted library allocation
|
page read and write
|
||
591000
|
unkown
|
page readonly
|
||
291E000
|
stack
|
page read and write
|
||
24B1B3F3000
|
heap
|
page read and write
|
||
24B7E048000
|
heap
|
page read and write
|
||
24B7E1F8000
|
heap
|
page read and write
|
||
24B7E1CD000
|
heap
|
page read and write
|
||
24B7E1C6000
|
heap
|
page read and write
|
||
24B7E320000
|
trusted library allocation
|
page read and write
|
||
2B1E000
|
stack
|
page read and write
|
||
24B7D7C0000
|
trusted library allocation
|
page read and write
|
||
161F7D02000
|
heap
|
page read and write
|
||
24B7E18E000
|
heap
|
page read and write
|
||
24B7E1BD000
|
heap
|
page read and write
|
||
24B7E19D000
|
heap
|
page read and write
|
||
2310000
|
heap
|
page read and write
|
||
24B7DFFF000
|
heap
|
page read and write
|
||
24B7E1C3000
|
heap
|
page read and write
|
||
24B7E1C0000
|
heap
|
page read and write
|
||
24B7E1BE000
|
heap
|
page read and write
|
||
24B7E1A6000
|
heap
|
page read and write
|
||
24B7E1A0000
|
heap
|
page read and write
|
||
24B7E18E000
|
heap
|
page read and write
|
||
24B18919000
|
trusted library allocation
|
page read and write
|
||
24B7E198000
|
heap
|
page read and write
|
||
2310000
|
heap
|
page read and write
|
||
24B1B3D0000
|
heap
|
page read and write
|
||
24B18912000
|
trusted library allocation
|
page read and write
|
||
301D000
|
stack
|
page read and write
|
||
24B7E1C9000
|
heap
|
page read and write
|
||
2647B5D0000
|
remote allocation
|
page read and write
|
||
7FFBAFFBB000
|
trusted library allocation
|
page execute and read and write
|
||
241E000
|
stack
|
page read and write
|
||
2DDD000
|
stack
|
page read and write
|
||
246D5CE0000
|
heap
|
page read and write
|
||
24B7E1A0000
|
heap
|
page read and write
|
||
24B18910000
|
trusted library allocation
|
page read and write
|
||
43F000
|
unkown
|
page execute and read and write
|
||
24B7BC40000
|
heap
|
page read and write
|
||
24B7E1CB000
|
heap
|
page read and write
|
||
24B7E570000
|
trusted library allocation
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
590000
|
unkown
|
page read and write
|
||
3827000
|
trusted library allocation
|
page read and write
|
||
24B7E4A0000
|
trusted library allocation
|
page read and write
|
||
241E000
|
stack
|
page read and write
|
||
24B7E1BE000
|
heap
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
2208B470000
|
heap
|
page read and write
|
||
24B1B0B8000
|
trusted library allocation
|
page read and write
|
||
2C9D000
|
stack
|
page read and write
|
||
161F7C40000
|
heap
|
page read and write
|
||
24B7E1A0000
|
heap
|
page read and write
|
||
24B7E1AB000
|
heap
|
page read and write
|
||
24B7E1BE000
|
heap
|
page read and write
|
||
96F000
|
stack
|
page read and write
|
||
24B7E1CB000
|
heap
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
24B7BCF7000
|
heap
|
page read and write
|
||
A6F000
|
stack
|
page read and write
|
||
2A1E000
|
stack
|
page read and write
|
||
24B7E1AA000
|
heap
|
page read and write
|
||
1F93816F000
|
heap
|
page read and write
|
||
24B188E1000
|
trusted library allocation
|
page read and write
|
||
6AE000
|
stack
|
page read and write
|
||
24B7E193000
|
heap
|
page read and write
|
||
2B1E000
|
stack
|
page read and write
|
||
24B7DF60000
|
heap
|
page read and write
|
||
2208B459000
|
heap
|
page read and write
|
||
1F93786F000
|
heap
|
page read and write
|
||
24B7E036000
|
heap
|
page read and write
|
||
24B7E1A0000
|
heap
|
page read and write
|
||
24B7DF64000
|
heap
|
page read and write
|
||
4137AFD000
|
stack
|
page read and write
|
||
94D8F7E000
|
stack
|
page read and write
|
||
264E5820000
|
heap
|
page read and write
|
||
24B7E1BB000
|
heap
|
page read and write
|
||
2EDE000
|
stack
|
page read and write
|
||
24B1802A000
|
heap
|
page read and write
|
||
1ED2085C000
|
heap
|
page read and write
|
||
161F7C7A000
|
heap
|
page read and write
|
||
24B7E0D0000
|
trusted library allocation
|
page read and write
|
||
24B7D6E0000
|
trusted library allocation
|
page read and write
|
||
2208B48A000
|
heap
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
F3F6BFD000
|
stack
|
page read and write
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
249D000
|
stack
|
page read and write
|
||
22BD000
|
stack
|
page read and write
|
||
2330000
|
unkown
|
page readonly
|
||
22D0000
|
heap
|
page read and write
|
||
249F000
|
stack
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
24B7E1A2000
|
heap
|
page read and write
|
||
24B7E1CD000
|
heap
|
page read and write
|
||
291E000
|
stack
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
24B7E1FB000
|
heap
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
A6F000
|
stack
|
page read and write
|
||
24B7E1BE000
|
heap
|
page read and write
|
||
C5F0AFE000
|
stack
|
page read and write
|
||
1B4C8A70000
|
heap
|
page read and write
|
||
161F7C00000
|
heap
|
page read and write
|
||
86E000
|
heap
|
page read and write
|
||
B5263FE000
|
stack
|
page read and write
|
||
2208B508000
|
heap
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
24B7E187000
|
heap
|
page read and write
|
||
24B7D6D0000
|
trusted library allocation
|
page read and write
|
||
24B7E1DE000
|
heap
|
page read and write
|
||
1B4C8890000
|
heap
|
page read and write
|
||
224D000
|
stack
|
page read and write
|
||
24B7E190000
|
heap
|
page read and write
|
||
24B7E1C9000
|
heap
|
page read and write
|
||
24B7E130000
|
trusted library allocation
|
page read and write
|
||
591000
|
unkown
|
page readonly
|
||
24B7E198000
|
heap
|
page read and write
|
||
24B7E1AC000
|
heap
|
page read and write
|
||
6FE000
|
stack
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
24B7E1CE000
|
heap
|
page read and write
|
||
24B7E1A1000
|
heap
|
page read and write
|
||
24B7E1A9000
|
heap
|
page read and write
|
||
291E000
|
stack
|
page read and write
|
||
1ED20902000
|
heap
|
page read and write
|
||
2B1E000
|
stack
|
page read and write
|
||
2A36000
|
trusted library allocation
|
page read and write
|
||
24B18910000
|
trusted library allocation
|
page read and write
|
||
F3F70FE000
|
stack
|
page read and write
|
||
24B7E1A0000
|
heap
|
page read and write
|
||
24B7E390000
|
trusted library allocation
|
page read and write
|
||
24B7E190000
|
trusted library allocation
|
page read and write
|
||
30000
|
unkown
|
page read and write
|
||
264E5B13000
|
heap
|
page read and write
|
||
24B7E400000
|
trusted library allocation
|
page read and write
|
||
7FFBB0150000
|
trusted library allocation
|
page read and write
|
||
24B7E0C0000
|
trusted library allocation
|
page read and write
|
||
24B7E19A000
|
heap
|
page read and write
|
||
24B7E4F0000
|
trusted library allocation
|
page read and write
|
||
1F937875000
|
heap
|
page read and write
|
||
835000
|
heap
|
page read and write
|
||
24D0000
|
heap
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
2A1E000
|
stack
|
page read and write
|
||
24B7E1BE000
|
heap
|
page read and write
|
||
24B7E1A0000
|
heap
|
page read and write
|
||
241E000
|
stack
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
24B7E18F000
|
heap
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
1CA22800000
|
heap
|
page read and write
|
||
1CA22847000
|
heap
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
24B7E1A6000
|
heap
|
page read and write
|
||
24B7E19F000
|
heap
|
page read and write
|
||
22D0000
|
heap
|
page read and write
|
||
246D5CCD000
|
heap
|
page read and write
|
||
24B1A9D2000
|
heap
|
page read and write
|
||
24B7E1F8000
|
heap
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
24B7E1BF000
|
heap
|
page read and write
|
||
2DDD000
|
stack
|
page read and write
|
||
1CA22813000
|
heap
|
page read and write
|
||
24B7D6F0000
|
trusted library allocation
|
page read and write
|
||
24B7BCFD000
|
heap
|
page read and write
|
||
2340000
|
unkown
|
page readonly
|
||
249D000
|
stack
|
page read and write
|
||
246D6513000
|
heap
|
page read and write
|
||
24B1A089000
|
trusted library allocation
|
page read and write
|
||
24B7E190000
|
heap
|
page read and write
|
||
24B7BCEF000
|
heap
|
page read and write
|
||
24B7D7D0000
|
trusted library allocation
|
page read and write
|
||
22D0000
|
heap
|
page read and write
|
||
37DD000
|
trusted library allocation
|
page read and write
|
||
24B7E1BB000
|
heap
|
page read and write
|
||
24B0043C000
|
trusted library allocation
|
page read and write
|
||
1CA22630000
|
heap
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
264E5A4B000
|
heap
|
page read and write
|
||
241E000
|
stack
|
page read and write
|
||
3746000
|
trusted library allocation
|
page read and write
|
||
24B7E1C5000
|
heap
|
page read and write
|
||
24B7E1CA000
|
heap
|
page read and write
|
||
224D000
|
stack
|
page read and write
|
||
24B7E1A0000
|
heap
|
page read and write
|
||
161F7C45000
|
heap
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
24B1B05F000
|
trusted library allocation
|
page read and write
|
||
24B7E193000
|
heap
|
page read and write
|
||
24B7DF62000
|
heap
|
page read and write
|
||
161F7C7B000
|
heap
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
43F000
|
unkown
|
page execute and read and write
|
||
24B7E19A000
|
heap
|
page read and write
|
||
24B7D710000
|
trusted library allocation
|
page read and write
|
||
24B7E1CA000
|
heap
|
page read and write
|
||
161F7C47000
|
heap
|
page read and write
|
||
22D0000
|
heap
|
page read and write
|
||
291E000
|
stack
|
page read and write
|
||
24B7E187000
|
heap
|
page read and write
|
||
C5F087D000
|
stack
|
page read and write
|
||
24B7E18D000
|
heap
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
24B7E1F8000
|
heap
|
page read and write
|
||
24D0000
|
heap
|
page read and write
|
||
24B1B63B000
|
trusted library allocation
|
page read and write
|
||
24B1B43C000
|
heap
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
24B7E1CA000
|
heap
|
page read and write
|
||
3935000
|
trusted library allocation
|
page read and write
|
||
24B18510000
|
trusted library allocation
|
page read and write
|
||
24B7E230000
|
trusted library allocation
|
page read and write
|
||
249D000
|
stack
|
page read and write
|
||
24B7D700000
|
trusted library allocation
|
page read and write
|
||
2310000
|
heap
|
page read and write
|
||
291E000
|
stack
|
page read and write
|
||
591000
|
unkown
|
page readonly
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
24B1B0A3000
|
trusted library allocation
|
page read and write
|
||
224D000
|
stack
|
page read and write
|
||
24B18430000
|
trusted library allocation
|
page read and write
|
||
2647B613000
|
heap
|
page read and write
|
||
24B7E1AA000
|
heap
|
page read and write
|
||
24B7E19D000
|
heap
|
page read and write
|
||
24B7DFA2000
|
heap
|
page read and write
|
||
24B7E19F000
|
heap
|
page read and write
|
||
24B7E1BD000
|
heap
|
page read and write
|
||
6AE000
|
stack
|
page read and write
|
||
24B7E1DE000
|
heap
|
page read and write
|
||
3B6E000
|
trusted library allocation
|
page read and write
|
||
2A2A000
|
trusted library allocation
|
page read and write
|
||
24B7E1A0000
|
heap
|
page read and write
|
||
2B5F000
|
stack
|
page read and write
|
||
24B7E1BF000
|
heap
|
page read and write
|
||
591000
|
unkown
|
page readonly
|
||
24B7E1A9000
|
heap
|
page read and write
|
||
20003200000
|
heap
|
page read and write
|
||
24B7D6F0000
|
trusted library allocation
|
page read and write
|
||
24B7E1BA000
|
heap
|
page read and write
|
||
24B18910000
|
trusted library allocation
|
page read and write
|
||
24B7E186000
|
heap
|
page read and write
|
||
24B7E140000
|
trusted library allocation
|
page read and write
|
||
24B7E199000
|
heap
|
page read and write
|
||
24B1B3B0000
|
heap
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
24B7E19B000
|
heap
|
page read and write
|
||
24B1B063000
|
trusted library allocation
|
page read and write
|
||
24B7B8B0000
|
unkown
|
page readonly
|
||
24B7E3B0000
|
trusted library allocation
|
page read and write
|
||
24B7E193000
|
heap
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
24B7D690000
|
trusted library allocation
|
page read and write
|
||
3871000
|
trusted library allocation
|
page read and write
|
||
24B1AD4F000
|
heap
|
page read and write
|
||
24B7E1A0000
|
heap
|
page read and write
|
||
30000
|
unkown
|
page read and write
|
||
24B7E1F8000
|
heap
|
page read and write
|
||
161F7C4E000
|
heap
|
page read and write
|
||
2B5F000
|
stack
|
page read and write
|
||
2C5E000
|
stack
|
page read and write
|
||
24B7E1C9000
|
heap
|
page read and write
|
||
24B7E680000
|
trusted library allocation
|
page read and write
|
||
1CA23002000
|
trusted library allocation
|
page read and write
|
||
2C5F000
|
stack
|
page read and write
|
||
591000
|
unkown
|
page readonly
|
||
30000
|
unkown
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
224D000
|
stack
|
page read and write
|
||
2C5F000
|
stack
|
page read and write
|
||
24B7E185000
|
heap
|
page read and write
|
||
24B7BCEF000
|
heap
|
page read and write
|
||
24B7E1FB000
|
heap
|
page read and write
|
||
24B7D660000
|
trusted library allocation
|
page read and write
|
||
1F937843000
|
heap
|
page read and write
|
||
6AE000
|
stack
|
page read and write
|
||
43F000
|
unkown
|
page execute and read and write
|
||
24B7E1BE000
|
heap
|
page read and write
|
||
24B7E1BB000
|
heap
|
page read and write
|
||
24B7E1CA000
|
heap
|
page read and write
|
||
1B4C8880000
|
heap
|
page read and write
|
||
1F938223000
|
heap
|
page read and write
|
||
1B4C89F0000
|
trusted library allocation
|
page read and write
|
||
96F000
|
stack
|
page read and write
|
||
1ED2084D000
|
heap
|
page read and write
|
||
22D0000
|
heap
|
page read and write
|
||
30000
|
unkown
|
page read and write
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
24B18920000
|
trusted library allocation
|
page read and write
|
||
24B7D660000
|
trusted library allocation
|
page read and write
|
||
24B7E1AF000
|
heap
|
page read and write
|
||
24B1B4D9000
|
heap
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
24B7E1C6000
|
heap
|
page read and write
|
||
24B7E198000
|
heap
|
page read and write
|
||
20003264000
|
heap
|
page read and write
|
||
22D0000
|
heap
|
page read and write
|
||
6FE000
|
stack
|
page read and write
|
||
835000
|
heap
|
page read and write
|
||
24B7E1CE000
|
heap
|
page read and write
|
||
24B7E1DF000
|
heap
|
page read and write
|
||
24B7E1A0000
|
heap
|
page read and write
|
||
24B7E1A0000
|
heap
|
page read and write
|
||
3A07000
|
trusted library allocation
|
page read and write
|
||
B5264FD000
|
stack
|
page read and write
|
||
24D0000
|
heap
|
page read and write
|
||
24B7BE60000
|
heap
|
page execute and read and write
|
||
24B7E199000
|
heap
|
page read and write
|
||
2B86000
|
heap
|
page read and write
|
||
24B7E210000
|
trusted library allocation
|
page read and write
|
||
161F7B10000
|
heap
|
page read and write
|
||
24B7E1A0000
|
heap
|
page read and write
|
||
24B7E1BD000
|
heap
|
page read and write
|
||
24D0000
|
heap
|
page read and write
|
||
24B7E19E000
|
heap
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
24B18450000
|
trusted library allocation
|
page read and write
|
||
2D9E000
|
stack
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
2310000
|
heap
|
page read and write
|
||
24B184E0000
|
trusted library allocation
|
page read and write
|
||
2647B4A0000
|
heap
|
page read and write
|
||
96F000
|
stack
|
page read and write
|
||
24B180EB000
|
heap
|
page read and write
|
||
24B7E1F8000
|
heap
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
590000
|
unkown
|
page read and write
|
||
2250000
|
remote allocation
|
page read and write
|
||
2208B500000
|
heap
|
page read and write
|
||
24B7E1C5000
|
heap
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
2647B602000
|
heap
|
page read and write
|
||
24B7E1C5000
|
heap
|
page read and write
|
||
3986000
|
trusted library allocation
|
page read and write
|
||
24B7E1DE000
|
heap
|
page read and write
|
||
24B1B418000
|
heap
|
page read and write
|
||
24B7E18B000
|
heap
|
page read and write
|
||
24B7E308000
|
trusted library allocation
|
page read and write
|
||
2B86000
|
heap
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
24B7E190000
|
heap
|
page read and write
|
||
24B7E370000
|
trusted library allocation
|
page read and write
|
||
24B1B058000
|
trusted library allocation
|
page read and write
|
||
161F7C3D000
|
heap
|
page read and write
|
||
24B7E186000
|
heap
|
page read and write
|
||
24B18093000
|
heap
|
page read and write
|
||
1004FB000
|
stack
|
page read and write
|
||
78A000
|
heap
|
page execute and read and write
|
||
24B7E19D000
|
heap
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
24B7E1F8000
|
heap
|
page read and write
|
||
24B7E1BB000
|
heap
|
page read and write
|
||
24B18081000
|
heap
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
94D917F000
|
stack
|
page read and write
|
||
6FE000
|
stack
|
page read and write
|
||
24B18440000
|
trusted library allocation
|
page read and write
|
||
3140000
|
remote allocation
|
page read and write
|
||
CC25EFF000
|
stack
|
page read and write
|
||
1ED221D0000
|
remote allocation
|
page read and write
|
||
24B7BCE6000
|
heap
|
page read and write
|
||
78A000
|
heap
|
page execute and read and write
|
||
7B0000
|
heap
|
page read and write
|
||
22BD000
|
stack
|
page read and write
|
||
2A1E000
|
stack
|
page read and write
|
||
24B7E186000
|
heap
|
page read and write
|
||
24B7E1C9000
|
heap
|
page read and write
|
||
264E5A13000
|
heap
|
page read and write
|
||
24B7E1C0000
|
heap
|
page read and write
|
||
2208B457000
|
heap
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
24B18520000
|
trusted library allocation
|
page read and write
|
||
24B7E1BE000
|
heap
|
page read and write
|
||
843000
|
heap
|
page read and write
|
||
24B7E1BE000
|
heap
|
page read and write
|
||
24B7E18B000
|
heap
|
page read and write
|
||
F3F6DFE000
|
stack
|
page read and write
|
||
7FFBB00C0000
|
trusted library allocation
|
page execute and read and write
|
||
24B7E500000
|
trusted library allocation
|
page read and write
|
||
24B1B6F0000
|
trusted library allocation
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
24B7E1C9000
|
heap
|
page read and write
|
||
24B1B0B4000
|
trusted library allocation
|
page read and write
|
||
1F937710000
|
heap
|
page read and write
|
||
2C5E000
|
stack
|
page read and write
|
||
2208B44E000
|
heap
|
page read and write
|
||
2B1E000
|
stack
|
page read and write
|
||
224D000
|
stack
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
C5F0CFF000
|
stack
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
24B7E1A3000
|
heap
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
249D000
|
stack
|
page read and write
|
||
24B7DF70000
|
heap
|
page read and write
|
||
24B7E18D000
|
heap
|
page read and write
|
||
24B7E1C9000
|
heap
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
20003268000
|
heap
|
page read and write
|
||
24B19F16000
|
trusted library allocation
|
page read and write
|
||
24B7E1C5000
|
heap
|
page read and write
|
||
241E000
|
stack
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
2DDD000
|
stack
|
page read and write
|
||
24B19B80000
|
trusted library allocation
|
page read and write
|
||
24B1A9C1000
|
heap
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
24B7E1CA000
|
heap
|
page read and write
|
||
24B7E1C3000
|
heap
|
page read and write
|
||
24B7E1A0000
|
heap
|
page read and write
|
||
389C000
|
trusted library allocation
|
page read and write
|
||
24B18920000
|
trusted library allocation
|
page read and write
|
||
24B1B437000
|
heap
|
page read and write
|
||
36B8A7E000
|
stack
|
page read and write
|
||
24B18470000
|
trusted library allocation
|
page read and write
|
||
24B7E1BB000
|
heap
|
page read and write
|
||
24B7BBB0000
|
heap
|
page read and write
|
||
24B7E1BF000
|
heap
|
page read and write
|
||
2310000
|
heap
|
page read and write
|
||
241E000
|
stack
|
page read and write
|
||
24B7E0A0000
|
trusted library allocation
|
page read and write
|
||
43F000
|
unkown
|
page execute and read and write
|
||
24B7E650000
|
trusted library allocation
|
page read and write
|
||
24B1B4D1000
|
heap
|
page read and write
|
||
24B7E196000
|
heap
|
page read and write
|
||
24B7DFD8000
|
heap
|
page read and write
|
||
161F7C50000
|
heap
|
page read and write
|
||
20003300000
|
heap
|
page read and write
|
||
24B7E1B2000
|
heap
|
page read and write
|
||
24B7E1BB000
|
heap
|
page read and write
|
||
264E5A00000
|
heap
|
page read and write
|
||
3B0D000
|
trusted library allocation
|
page read and write
|
||
100CFF000
|
stack
|
page read and write
|
||
24B7E1AB000
|
heap
|
page read and write
|
||
24B7E19C000
|
heap
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
1ED221D0000
|
remote allocation
|
page read and write
|
||
24B7E1CE000
|
heap
|
page read and write
|
||
24B7E1C0000
|
heap
|
page read and write
|
||
24B7D660000
|
trusted library allocation
|
page read and write
|
||
2F6E000
|
trusted library allocation
|
page read and write
|
||
24B7E1DE000
|
heap
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
246D6500000
|
heap
|
page read and write
|
||
24B7D660000
|
trusted library allocation
|
page read and write
|
||
24B18460000
|
trusted library allocation
|
page read and write
|
||
24B7E5F0000
|
trusted library allocation
|
page read and write
|
||
24B7E1C0000
|
heap
|
page read and write
|
||
24B7E1CA000
|
heap
|
page read and write
|
||
24B7E1C0000
|
heap
|
page read and write
|
||
43F000
|
unkown
|
page execute and read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
85F000
|
heap
|
page read and write
|
||
24B1B087000
|
trusted library allocation
|
page read and write
|
||
24B7E190000
|
heap
|
page read and write
|
||
245D000
|
stack
|
page read and write
|
||
2310000
|
heap
|
page read and write
|
||
22D0000
|
heap
|
page read and write
|
||
24B7E186000
|
heap
|
page read and write
|
||
24B1B443000
|
heap
|
page read and write
|
||
1ED20813000
|
heap
|
page read and write
|
||
1F937813000
|
heap
|
page read and write
|
||
3769B7F000
|
stack
|
page read and write
|
||
7FFBB0140000
|
trusted library allocation
|
page read and write
|
||
24B1B095000
|
trusted library allocation
|
page read and write
|
||
24B182ED000
|
trusted library allocation
|
page read and write
|
||
24B7E1C0000
|
heap
|
page read and write
|
||
24B7E1BF000
|
heap
|
page read and write
|
||
24B7D660000
|
trusted library allocation
|
page read and write
|
||
20003279000
|
heap
|
page read and write
|
||
24B7E186000
|
heap
|
page read and write
|
||
24B00438000
|
trusted library allocation
|
page read and write
|
||
24B7E190000
|
heap
|
page read and write
|
||
24B7E187000
|
heap
|
page read and write
|
||
24B7D630000
|
trusted library allocation
|
page read and write
|
||
591000
|
unkown
|
page readonly
|
||
1F937892000
|
heap
|
page read and write
|
||
24B7D6C3000
|
heap
|
page read and write
|
||
24B7E270000
|
trusted library allocation
|
page read and write
|
||
24B1B055000
|
trusted library allocation
|
page read and write
|
||
7FFBAFFA0000
|
trusted library allocation
|
page read and write
|
||
24B7E1C0000
|
heap
|
page read and write
|
||
24B7E1CE000
|
heap
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
24B7E1C0000
|
heap
|
page read and write
|
||
24B7E19E000
|
heap
|
page read and write
|
||
24B7E1C3000
|
heap
|
page read and write
|
||
20003302000
|
heap
|
page read and write
|
||
161F7C6B000
|
heap
|
page read and write
|
||
24B7E1CE000
|
heap
|
page read and write
|
||
24B7E194000
|
heap
|
page read and write
|
||
24B7E540000
|
trusted library allocation
|
page read and write
|
||
24B18470000
|
trusted library allocation
|
page read and write
|
||
394A000
|
trusted library allocation
|
page read and write
|
||
24B1B0AE000
|
trusted library allocation
|
page read and write
|
||
24B1B4CD000
|
heap
|
page read and write
|
||
24B7E0F0000
|
trusted library allocation
|
page read and write
|
||
24B7E18A000
|
heap
|
page read and write
|
||
30000
|
unkown
|
page read and write
|
||
24B10011000
|
trusted library allocation
|
page read and write
|
||
24B18017000
|
heap
|
page read and write
|
||
24B7E1A2000
|
heap
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
24B7E190000
|
heap
|
page read and write
|
||
6B5000
|
heap
|
page read and write
|
||
24B7E1A0000
|
heap
|
page read and write
|
||
22F0000
|
remote allocation
|
page read and write
|
||
22BD000
|
stack
|
page read and write
|
||
2B5F000
|
stack
|
page read and write
|
||
3248000
|
trusted library allocation
|
page read and write
|
||
840000
|
heap
|
page read and write
|
||
24B7E1AA000
|
heap
|
page read and write
|
||
24B7E01B000
|
heap
|
page read and write
|
||
24B7E220000
|
trusted library allocation
|
page read and write
|
||
24B7E1A0000
|
heap
|
page read and write
|
||
78A000
|
heap
|
page execute and read and write
|
||
24B7E0D2000
|
trusted library allocation
|
page read and write
|
||
161F7C13000
|
heap
|
page read and write
|
||
A6F000
|
stack
|
page read and write
|
||
835000
|
heap
|
page read and write
|
||
3950000
|
trusted library allocation
|
page read and write
|
||
22D0000
|
heap
|
page read and write
|
||
24B0040E000
|
trusted library allocation
|
page read and write
|
||
24B7E187000
|
heap
|
page read and write
|
||
843000
|
heap
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
590000
|
unkown
|
page read and write
|
||
264E5A4E000
|
heap
|
page read and write
|
||
24B7E1C3000
|
heap
|
page read and write
|
||
24B7BB90000
|
heap
|
page read and write
|
||
24B7E1BF000
|
heap
|
page read and write
|
||
24B1ADCC000
|
trusted library allocation
|
page read and write
|
||
24B7E022000
|
heap
|
page read and write
|
||
245D000
|
stack
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
24B7E1C5000
|
heap
|
page read and write
|
||
7FFBAFF9D000
|
trusted library allocation
|
page execute and read and write
|
||
24B7E19F000
|
heap
|
page read and write
|
||
1F937770000
|
heap
|
page read and write
|
||
6B5000
|
heap
|
page read and write
|
||
96F000
|
stack
|
page read and write
|
||
24B7E080000
|
trusted library allocation
|
page read and write
|
||
24B7E19F000
|
heap
|
page read and write
|
||
22BD000
|
stack
|
page read and write
|
||
24B7E1CE000
|
heap
|
page read and write
|
||
24B7E1CE000
|
heap
|
page read and write
|
||
24B7E18C000
|
heap
|
page read and write
|
||
24B1808A000
|
heap
|
page read and write
|
||
24B1B3D3000
|
heap
|
page read and write
|
||
24B18440000
|
trusted library allocation
|
page read and write
|
||
24B7E1BE000
|
heap
|
page read and write
|
||
24B18480000
|
trusted library allocation
|
page read and write
|
||
22C0000
|
heap
|
page read and write
|
||
24B7E19B000
|
heap
|
page read and write
|
||
590000
|
unkown
|
page read and write
|
||
2D9E000
|
stack
|
page read and write
|
||
24B18519000
|
trusted library allocation
|
page read and write
|
||
24B18430000
|
trusted library allocation
|
page read and write
|
||
3AD8000
|
trusted library allocation
|
page read and write
|
||
24B184A0000
|
trusted library allocation
|
page read and write
|
||
2C5E000
|
stack
|
page read and write
|
||
24B7E186000
|
heap
|
page read and write
|
||
246D5C6A000
|
heap
|
page read and write
|
||
22BD000
|
stack
|
page read and write
|
||
85F000
|
heap
|
page read and write
|
||
24B7E1FA000
|
heap
|
page read and write
|
||
24B7E1C4000
|
heap
|
page read and write
|
||
1B4C8A02000
|
heap
|
page read and write
|
||
24B7E1AA000
|
heap
|
page read and write
|
||
24B7E00C000
|
heap
|
page read and write
|
||
7FFBB00B0000
|
trusted library allocation
|
page read and write
|
||
24B7E046000
|
heap
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
24B7E0C0000
|
trusted library allocation
|
page read and write
|
||
24B7E090000
|
trusted library allocation
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
24B7E1FB000
|
heap
|
page read and write
|
||
24B7E1C7000
|
heap
|
page read and write
|
||
161F7C4B000
|
heap
|
page read and write
|
||
291E000
|
stack
|
page read and write
|
||
31F7000
|
trusted library allocation
|
page read and write
|
||
24B7E1C5000
|
heap
|
page read and write
|
||
264E5A52000
|
heap
|
page read and write
|
||
1CA2282E000
|
heap
|
page read and write
|
||
24B7E1C4000
|
heap
|
page read and write
|
||
24B7E1C5000
|
heap
|
page read and write
|
||
24B19BC9000
|
trusted library allocation
|
page read and write
|
||
24B7E420000
|
trusted library allocation
|
page read and write
|
||
A6F000
|
stack
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
778000
|
heap
|
page read and write
|
||
24B7E6B0000
|
trusted library allocation
|
page read and write
|
||
CC25E7F000
|
stack
|
page read and write
|
||
30000
|
unkown
|
page read and write
|
||
2208B400000
|
heap
|
page read and write
|
||
24B188E0000
|
trusted library allocation
|
page read and write
|
||
2C5F000
|
stack
|
page read and write
|
||
24B7E1C6000
|
heap
|
page read and write
|
||
24B7E410000
|
trusted library allocation
|
page read and write
|
||
24B18431000
|
trusted library allocation
|
page read and write
|
||
264E5A8F000
|
heap
|
page read and write
|
||
2C5E000
|
stack
|
page read and write
|
||
24B1AA1B000
|
heap
|
page read and write
|
||
24B7E1CE000
|
heap
|
page read and write
|
||
31F7000
|
trusted library allocation
|
page read and write
|
||
2310000
|
heap
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
1F938122000
|
heap
|
page read and write
|
||
24B7E199000
|
heap
|
page read and write
|
||
24B7E1DE000
|
heap
|
page read and write
|
||
24B1B350000
|
trusted library allocation
|
page read and write
|
||
24B18550000
|
trusted library allocation
|
page read and write
|
||
24B7E1C5000
|
heap
|
page read and write
|
||
24B7E186000
|
heap
|
page read and write
|
||
96F000
|
stack
|
page read and write
|
||
24B1B0AA000
|
trusted library allocation
|
page read and write
|
||
24B7E1CD000
|
heap
|
page read and write
|
||
24B1A9E5000
|
heap
|
page read and write
|
||
6AE000
|
stack
|
page read and write
|
||
161F7C60000
|
heap
|
page read and write
|
||
6B5000
|
heap
|
page read and write
|
||
24B7E1E1000
|
heap
|
page read and write
|
||
778000
|
heap
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
24B7E1CD000
|
heap
|
page read and write
|
||
24B7E100000
|
trusted library allocation
|
page read and write
|
||
24B1AA30000
|
heap
|
page read and write
|
||
24B7E1F8000
|
heap
|
page read and write
|
||
24B7E560000
|
trusted library allocation
|
page read and write
|
||
2C5F000
|
stack
|
page read and write
|
||
24B19C7B000
|
trusted library allocation
|
page read and write
|
||
24B7E1CE000
|
heap
|
page read and write
|
||
24B7E1A2000
|
heap
|
page read and write
|
||
161F7C64000
|
heap
|
page read and write
|
||
1F938002000
|
heap
|
page read and write
|
||
6FE000
|
stack
|
page read and write
|
||
24B1B09C000
|
trusted library allocation
|
page read and write
|
||
24B7E1C0000
|
heap
|
page read and write
|
||
835000
|
heap
|
page read and write
|
||
24B1B4E3000
|
heap
|
page read and write
|
||
24B1ABC9000
|
trusted library allocation
|
page read and write
|
||
1ED20843000
|
heap
|
page read and write
|
||
24B7E185000
|
heap
|
page read and write
|
||
24B7E1CE000
|
heap
|
page read and write
|
||
24B1B3C7000
|
heap
|
page read and write
|
||
24B7E1C9000
|
heap
|
page read and write
|
||
24B7E1A0000
|
heap
|
page read and write
|
||
24B7E1C0000
|
heap
|
page read and write
|
||
24B7E1BD000
|
heap
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
24B7E1CE000
|
heap
|
page read and write
|
||
24B7E1CA000
|
heap
|
page read and write
|
||
24B1B06A000
|
trusted library allocation
|
page read and write
|
||
24B7E19D000
|
heap
|
page read and write
|
||
100BFF000
|
stack
|
page read and write
|
||
22BD000
|
stack
|
page read and write
|
||
24B1B3DD000
|
heap
|
page read and write
|
||
24B18460000
|
trusted library allocation
|
page read and write
|
||
24B7E1AA000
|
heap
|
page read and write
|
||
24B7E1CD000
|
heap
|
page read and write
|
||
374D000
|
trusted library allocation
|
page read and write
|
||
24D0000
|
heap
|
page read and write
|
||
24B7E480000
|
trusted library allocation
|
page read and write
|
||
96F000
|
stack
|
page read and write
|
||
24B7E190000
|
heap
|
page read and write
|
||
CC262FF000
|
stack
|
page read and write
|
||
3746000
|
trusted library allocation
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
24B188E0000
|
trusted library allocation
|
page read and write
|
||
24B7DFEB000
|
heap
|
page read and write
|
||
24B7E18C000
|
heap
|
page read and write
|
||
24B1B023000
|
trusted library allocation
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
4137D7F000
|
stack
|
page read and write
|
||
24B18440000
|
trusted library allocation
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
24B7D740000
|
trusted library allocation
|
page read and write
|
||
24B7DFE1000
|
heap
|
page read and write
|
||
3927000
|
trusted library allocation
|
page read and write
|
||
24B7E19F000
|
heap
|
page read and write
|
||
224D000
|
stack
|
page read and write
|
||
24B7E1C9000
|
heap
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
24B1B0B1000
|
trusted library allocation
|
page read and write
|
||
24B7E1CE000
|
heap
|
page read and write
|
||
24B7E1DE000
|
heap
|
page read and write
|
||
24B1B374000
|
trusted library allocation
|
page read and write
|
||
2208B429000
|
heap
|
page read and write
|
||
26FD000
|
stack
|
page read and write
|
||
3748000
|
trusted library allocation
|
page read and write
|
||
1F937887000
|
heap
|
page read and write
|
||
24B7E1BE000
|
heap
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
24B7E1BB000
|
heap
|
page read and write
|
||
24B1809C000
|
heap
|
page read and write
|
||
591000
|
unkown
|
page readonly
|
||
24B7D730000
|
trusted library allocation
|
page read and write
|
||
413827C000
|
stack
|
page read and write
|
||
24B188ED000
|
trusted library allocation
|
page read and write
|
||
24B7E1B3000
|
heap
|
page read and write
|
||
24B7E191000
|
heap
|
page read and write
|
||
591000
|
unkown
|
page readonly
|
||
2A2E000
|
trusted library allocation
|
page read and write
|
||
24B7E060000
|
trusted library section
|
page read and write
|
||
1F9379B9000
|
heap
|
page read and write
|
||
840000
|
heap
|
page read and write
|
||
24B1B890000
|
trusted library allocation
|
page read and write
|
||
2208B370000
|
heap
|
page read and write
|
||
24B7E2B0000
|
trusted library allocation
|
page read and write
|
||
264E5830000
|
heap
|
page read and write
|
||
24B7E250000
|
trusted library allocation
|
page read and write
|
||
24B7E19F000
|
heap
|
page read and write
|
||
24B7D6B0000
|
trusted library allocation
|
page read and write
|
||
24B7E1C9000
|
heap
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
24B7E0A0000
|
trusted library allocation
|
page read and write
|
||
7FFBB0040000
|
trusted library allocation
|
page read and write
|
||
1B4C8A00000
|
heap
|
page read and write
|
||
CC25BDC000
|
stack
|
page read and write
|
||
24B7E1C5000
|
heap
|
page read and write
|
||
24B7E19B000
|
heap
|
page read and write
|
||
24B7E1C0000
|
heap
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
24B7E1BB000
|
heap
|
page read and write
|
||
94D8CFE000
|
stack
|
page read and write
|
||
24B7E1DE000
|
heap
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
24B7E1A2000
|
heap
|
page read and write
|
||
24B7E1C0000
|
heap
|
page read and write
|
||
24B7E5D0000
|
trusted library allocation
|
page read and write
|
||
A6F000
|
stack
|
page read and write
|
||
F3F71FE000
|
stack
|
page read and write
|
||
24B7E18C000
|
heap
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
24B1B08E000
|
trusted library allocation
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
A6F000
|
stack
|
page read and write
|
||
843000
|
heap
|
page read and write
|
||
24B1A9C0000
|
heap
|
page read and write
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
778000
|
heap
|
page read and write
|
||
591000
|
unkown
|
page readonly
|
||
24B7E1C0000
|
heap
|
page read and write
|
||
24B18910000
|
trusted library allocation
|
page read and write
|
||
24B188E0000
|
trusted library allocation
|
page read and write
|
||
6AE000
|
stack
|
page read and write
|
||
24B7E1E7000
|
heap
|
page read and write
|
||
24B7E1C9000
|
heap
|
page read and write
|
||
1B4C8A13000
|
heap
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
376947A000
|
stack
|
page read and write
|
||
24B7E060000
|
trusted library allocation
|
page read and write
|
||
24B1AA09000
|
heap
|
page read and write
|
||
24B7E1BB000
|
heap
|
page read and write
|
||
24B7E1A4000
|
heap
|
page read and write
|
||
3743000
|
trusted library allocation
|
page read and write
|
||
24B7E6FC000
|
trusted library allocation
|
page read and write
|
||
24B7E1C3000
|
heap
|
page read and write
|
||
24B184C0000
|
trusted library allocation
|
page read and write
|
||
24B7E19B000
|
heap
|
page read and write
|
||
24B7E5B0000
|
trusted library allocation
|
page read and write
|
||
36B887E000
|
stack
|
page read and write
|
||
1ED20887000
|
heap
|
page read and write
|
||
24B7E1BD000
|
heap
|
page read and write
|
||
161F7C56000
|
heap
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
24B7E18C000
|
heap
|
page read and write
|
||
24B1AA2E000
|
heap
|
page read and write
|
||
24B7BC6A000
|
heap
|
page read and write
|
||
24B7D6E0000
|
trusted library allocation
|
page read and write
|
||
374C000
|
trusted library allocation
|
page read and write
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
2B1E000
|
stack
|
page read and write
|
||
1B4C8B13000
|
heap
|
page read and write
|
||
24B7E1C4000
|
heap
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
1ED2084C000
|
heap
|
page read and write
|
||
24B1A6DB000
|
trusted library allocation
|
page read and write
|
||
24B7F392000
|
trusted library allocation
|
page read and write
|
||
24B7E1E0000
|
heap
|
page read and write
|
||
2B80000
|
heap
|
page read and write
|
||
24B7E1C0000
|
heap
|
page read and write
|
||
24B7E170000
|
heap
|
page read and write
|
||
264E5A29000
|
heap
|
page read and write
|
||
249D000
|
stack
|
page read and write
|
||
78A000
|
heap
|
page execute and read and write
|
||
24B7E1BE000
|
heap
|
page read and write
|
||
24B7E1C0000
|
heap
|
page read and write
|
||
7EC707B000
|
stack
|
page read and write
|
||
264E5A82000
|
heap
|
page read and write
|
||
2340000
|
unkown
|
page readonly
|
||
2F6E000
|
trusted library allocation
|
page read and write
|
||
24B1B48C000
|
heap
|
page read and write
|
||
1006FB000
|
stack
|
page read and write
|
||
24B18910000
|
trusted library allocation
|
page read and write
|
||
2208B45A000
|
heap
|
page read and write
|
||
24B188F0000
|
trusted library allocation
|
page read and write
|
||
24B7E1C4000
|
heap
|
page read and write
|
||
3857000
|
trusted library allocation
|
page read and write
|
||
24B188E1000
|
trusted library allocation
|
page read and write
|
||
24B7BCDD000
|
heap
|
page read and write
|
||
24B7E196000
|
heap
|
page read and write
|
||
24B7E1BE000
|
heap
|
page read and write
|
||
96F000
|
stack
|
page read and write
|
||
2330000
|
unkown
|
page readonly
|
||
78A000
|
heap
|
page execute and read and write
|
||
1F938122000
|
heap
|
page read and write
|
||
24B7E1AA000
|
heap
|
page read and write
|
||
2B1E000
|
stack
|
page read and write
|
||
2310000
|
heap
|
page read and write
|
||
24B7E1A0000
|
heap
|
page read and write
|
||
24C0000
|
remote allocation
|
page read and write
|
||
20003260000
|
heap
|
page read and write
|
||
24B7E6A0000
|
trusted library allocation
|
page read and write
|
||
24B7E1BB000
|
heap
|
page read and write
|
||
590000
|
unkown
|
page read and write
|
||
7FFBB0170000
|
trusted library allocation
|
page execute and read and write
|
||
2EE4000
|
trusted library allocation
|
page read and write
|
||
24B1B3C5000
|
heap
|
page read and write
|
||
591000
|
unkown
|
page readonly
|
||
590000
|
unkown
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
24B7E1C6000
|
heap
|
page read and write
|
||
24B7E19D000
|
heap
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
2B1E000
|
stack
|
page read and write
|
||
232D000
|
stack
|
page read and write
|
||
24B7E187000
|
heap
|
page read and write
|
||
78A000
|
heap
|
page execute and read and write
|
||
24B7E290000
|
trusted library allocation
|
page read and write
|
||
24B7E1F9000
|
heap
|
page read and write
|
||
161F7BB0000
|
trusted library allocation
|
page read and write
|
||
24B7E190000
|
heap
|
page read and write
|
||
1F9377C0000
|
trusted library allocation
|
page read and write
|
||
24B7E1CA000
|
heap
|
page read and write
|
||
7FFBB00B2000
|
trusted library allocation
|
page read and write
|
||
24B1B43F000
|
heap
|
page read and write
|
||
24B7E0B0000
|
trusted library allocation
|
page read and write
|
||
24B7BCDC000
|
heap
|
page read and write
|
||
32A3000
|
trusted library allocation
|
page read and write
|
||
1F9377A0000
|
trusted library allocation
|
page read and write
|
||
24B7D772000
|
unkown
|
page readonly
|
||
7FFBB0160000
|
trusted library allocation
|
page execute and read and write
|
||
3140000
|
remote allocation
|
page read and write
|
||
24B7D7D0000
|
trusted library allocation
|
page read and write
|
||
24B7E1CD000
|
heap
|
page read and write
|
||
24B7E1C6000
|
heap
|
page read and write
|
||
264E5A75000
|
heap
|
page read and write
|
||
24B7BCE5000
|
heap
|
page read and write
|
||
24B7E1A0000
|
heap
|
page read and write
|
||
161F7C77000
|
heap
|
page read and write
|
||
24B7E1BD000
|
heap
|
page read and write
|
||
22BD000
|
stack
|
page read and write
|
||
24B1A750000
|
trusted library allocation
|
page read and write
|
||
245D000
|
stack
|
page read and write
|
||
2D9A000
|
stack
|
page read and write
|
||
24B180CC000
|
heap
|
page read and write
|
||
24B7E1CA000
|
heap
|
page read and write
|
||
778000
|
heap
|
page read and write
|
||
24B7E510000
|
trusted library allocation
|
page read and write
|
||
22D0000
|
heap
|
page read and write
|
||
24B7E1CB000
|
heap
|
page read and write
|
||
24B7E1DE000
|
heap
|
page read and write
|
||
1ED20878000
|
heap
|
page read and write
|
||
24B7E1A0000
|
heap
|
page read and write
|
||
24B7E1C1000
|
heap
|
page read and write
|
||
843000
|
heap
|
page read and write
|
||
24B7E19C000
|
heap
|
page read and write
|
||
1F937913000
|
heap
|
page read and write
|
||
F3F74FE000
|
stack
|
page read and write
|
||
2B5D000
|
stack
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
24B7E1C4000
|
heap
|
page read and write
|
||
3B27000
|
trusted library allocation
|
page read and write
|
||
24B7E180000
|
heap
|
page read and write
|
||
24B18922000
|
trusted library allocation
|
page read and write
|
||
43F000
|
unkown
|
page execute and read and write
|
||
24B7E1BF000
|
heap
|
page read and write
|
||
24B7E2DA000
|
trusted library allocation
|
page read and write
|
||
3769AFF000
|
stack
|
page read and write
|
||
2350000
|
unkown
|
page read and write
|
||
20003313000
|
heap
|
page read and write
|
||
24B7E1C0000
|
heap
|
page read and write
|
||
24B7E1DE000
|
heap
|
page read and write
|
||
1009FF000
|
stack
|
page read and write
|
||
24B188E0000
|
trusted library allocation
|
page read and write
|
||
24B7E1A6000
|
heap
|
page read and write
|
||
20003213000
|
heap
|
page read and write
|
||
1F938100000
|
heap
|
page read and write
|
||
1F9381B2000
|
heap
|
page read and write
|
||
2B1E000
|
stack
|
page read and write
|
||
24B7E330000
|
trusted library allocation
|
page read and write
|
||
30000
|
unkown
|
page read and write
|
||
6FE000
|
stack
|
page read and write
|
||
778000
|
heap
|
page read and write
|
||
161F7C65000
|
heap
|
page read and write
|
||
1ED20867000
|
heap
|
page read and write
|
||
3951000
|
trusted library allocation
|
page read and write
|
||
374A000
|
trusted library allocation
|
page read and write
|
||
241E000
|
stack
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
1F93783C000
|
heap
|
page read and write
|
||
24B7D6A0000
|
trusted library allocation
|
page read and write
|
||
6AE000
|
stack
|
page read and write
|
||
24B7BE70000
|
heap
|
page read and write
|
||
24B7BC3D000
|
heap
|
page read and write
|
||
24B7E187000
|
heap
|
page read and write
|
||
22F0000
|
remote allocation
|
page read and write
|
||
224D000
|
stack
|
page read and write
|
||
1F938200000
|
heap
|
page read and write
|
||
24B7E1DE000
|
heap
|
page read and write
|
||
24B7E1C5000
|
heap
|
page read and write
|
||
2310000
|
heap
|
page read and write
|
||
24B7E1CA000
|
heap
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
1ED206E0000
|
heap
|
page read and write
|
||
24B7E1A7000
|
heap
|
page read and write
|
||
1ED207E0000
|
trusted library allocation
|
page read and write
|
||
24B7E2E0000
|
trusted library allocation
|
page read and write
|
||
24B7BCF5000
|
heap
|
page read and write
|
||
1008FD000
|
stack
|
page read and write
|
||
24B7BA10000
|
heap
|
page read and write
|
||
395E000
|
trusted library allocation
|
page read and write
|
||
200030A0000
|
heap
|
page read and write
|
||
24B7E186000
|
heap
|
page read and write
|
||
24B7D680000
|
trusted library allocation
|
page read and write
|
||
24B7D725000
|
trusted library allocation
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
24B1B067000
|
trusted library allocation
|
page read and write
|
||
843000
|
heap
|
page read and write
|
||
7FFBAFFBD000
|
trusted library allocation
|
page execute and read and write
|
||
264E5990000
|
trusted library allocation
|
page read and write
|
||
22BD000
|
stack
|
page read and write
|
||
24B7E1C9000
|
heap
|
page read and write
|
||
1B4C8A73000
|
heap
|
page read and write
|
||
2A1E000
|
stack
|
page read and write
|
||
96F000
|
stack
|
page read and write
|
||
24B1B458000
|
heap
|
page read and write
|
||
24B1B4B6000
|
heap
|
page read and write
|
||
24B7E1C4000
|
heap
|
page read and write
|
||
161F7C61000
|
heap
|
page read and write
|
||
39AD000
|
trusted library allocation
|
page read and write
|
||
36B88FE000
|
stack
|
page read and write
|
||
249D000
|
stack
|
page read and write
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
245D000
|
stack
|
page read and write
|
||
7FFBAFFB4000
|
trusted library allocation
|
page read and write
|
||
24B7E1C5000
|
heap
|
page read and write
|
||
1F937700000
|
heap
|
page read and write
|
||
22D0000
|
heap
|
page read and write
|
||
24B1B352000
|
trusted library allocation
|
page read and write
|
||
24B7E18F000
|
heap
|
page read and write
|
||
24B7E1BE000
|
heap
|
page read and write
|
||
24B7E6D0000
|
trusted library allocation
|
page read and write
|
||
161F7C74000
|
heap
|
page read and write
|
||
24B7E070000
|
trusted library allocation
|
page read and write
|
||
24B7E3C0000
|
trusted library allocation
|
page read and write
|
||
246D5C13000
|
heap
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
24B7E19E000
|
heap
|
page read and write
|
||
24B7E430000
|
trusted library allocation
|
page read and write
|
||
24B7E180000
|
trusted library allocation
|
page read and write
|
||
161F7C6A000
|
heap
|
page read and write
|
||
24B7E450000
|
trusted library allocation
|
page read and write
|
||
24B7E150000
|
trusted library allocation
|
page read and write
|
||
23CE000
|
unkown
|
page read and write
|
||
24B18517000
|
trusted library allocation
|
page read and write
|
||
24B7E1CD000
|
heap
|
page read and write
|
||
24D0000
|
heap
|
page read and write
|
||
6FE000
|
stack
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
24B7E19B000
|
heap
|
page read and write
|
||
24B7E1BF000
|
heap
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
24D0000
|
heap
|
page read and write
|
||
24B7E1A0000
|
heap
|
page read and write
|
||
24B7DFC2000
|
heap
|
page read and write
|
||
843000
|
heap
|
page read and write
|
||
24B7E2D0000
|
trusted library allocation
|
page read and write
|
||
224D000
|
stack
|
page read and write
|
||
24B7E1A0000
|
heap
|
page read and write
|
||
24B188E0000
|
trusted library allocation
|
page read and write
|
||
843000
|
heap
|
page read and write
|
||
591000
|
unkown
|
page readonly
|
||
24B7E186000
|
heap
|
page read and write
|
||
2C5E000
|
stack
|
page read and write
|
||
24B7E1DE000
|
heap
|
page read and write
|
||
24B7E1C0000
|
heap
|
page read and write
|
||
24B7E1AA000
|
heap
|
page read and write
|
||
2A32000
|
trusted library allocation
|
page read and write
|
||
24B1B871000
|
trusted library allocation
|
page read and write
|
||
24B1806F000
|
heap
|
page read and write
|
||
24B7E1FB000
|
heap
|
page read and write
|
||
2B5D000
|
stack
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
43F000
|
unkown
|
page execute and read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
24B7E19E000
|
heap
|
page read and write
|
||
2330000
|
unkown
|
page readonly
|
||
24B7E1E7000
|
heap
|
page read and write
|
||
24B188F0000
|
trusted library allocation
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
24B7BE30000
|
trusted library allocation
|
page read and write
|
||
24B7E460000
|
trusted library allocation
|
page read and write
|
||
24B7E1C3000
|
heap
|
page read and write
|
||
24B180E7000
|
heap
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
24B7E1CE000
|
heap
|
page read and write
|
||
2C9D000
|
stack
|
page read and write
|
||
245D000
|
stack
|
page read and write
|
||
24B7E193000
|
heap
|
page read and write
|
||
161F7B80000
|
heap
|
page read and write
|
||
24B7E187000
|
heap
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
24B00418000
|
trusted library allocation
|
page read and write
|
||
1ED20918000
|
heap
|
page read and write
|
||
1F938143000
|
heap
|
page read and write
|
||
28E0000
|
heap
|
page read and write
|
||
A6F000
|
stack
|
page read and write
|
||
264E5A77000
|
heap
|
page read and write
|
||
24B7E19C000
|
heap
|
page read and write
|
||
24B7E550000
|
trusted library allocation
|
page read and write
|
||
24B7E186000
|
heap
|
page read and write
|
||
39DE000
|
trusted library allocation
|
page read and write
|
||
24B7E340000
|
trusted library allocation
|
page read and write
|
||
A7441FE000
|
stack
|
page read and write
|
||
43F000
|
unkown
|
page execute and read and write
|
||
7B0000
|
heap
|
page read and write
|
||
241E000
|
stack
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
224D000
|
stack
|
page read and write
|
||
264E5B00000
|
heap
|
page read and write
|
||
24B182F4000
|
trusted library allocation
|
page read and write
|
||
24D0000
|
heap
|
page read and write
|
||
24B7B8B0000
|
unkown
|
page readonly
|
||
1F937878000
|
heap
|
page read and write
|
||
24B7E1AA000
|
heap
|
page read and write
|
||
22E0000
|
heap
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
2F6E000
|
trusted library allocation
|
page read and write
|
||
24B188E1000
|
trusted library allocation
|
page read and write
|
||
24B7E18E000
|
heap
|
page read and write
|
||
6AE000
|
stack
|
page read and write
|
||
590000
|
unkown
|
page read and write
|
||
161F7C48000
|
heap
|
page read and write
|
||
24B1B4A6000
|
heap
|
page read and write
|
||
24B7E350000
|
trusted library allocation
|
page read and write
|
||
1CA22640000
|
heap
|
page read and write
|
||
23D0000
|
trusted library allocation
|
page read and write
|
||
78A000
|
heap
|
page execute and read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
3B7C000
|
trusted library allocation
|
page read and write
|
||
1B4C8A3E000
|
heap
|
page read and write
|
||
3746000
|
trusted library allocation
|
page read and write
|
||
24B7E1BE000
|
heap
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
22BD000
|
stack
|
page read and write
|
||
24B7E186000
|
heap
|
page read and write
|
||
20003251000
|
heap
|
page read and write
|
||
43F000
|
unkown
|
page execute and read and write
|
||
24B7D6D0000
|
trusted library allocation
|
page read and write
|
||
24B7BE50000
|
trusted library allocation
|
page read and write
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
1CA22902000
|
heap
|
page read and write
|
||
24B7E1C6000
|
heap
|
page read and write
|
||
24B7F370000
|
trusted library allocation
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
2B5D000
|
stack
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
410000
|
unkown
|
page write copy
|
||
2D9A000
|
stack
|
page read and write
|
||
835000
|
heap
|
page read and write
|
||
6AE000
|
stack
|
page read and write
|
||
3741000
|
trusted library allocation
|
page read and write
|
||
3741000
|
trusted library allocation
|
page read and write
|
||
2C9D000
|
stack
|
page read and write
|
||
24B7E620000
|
trusted library allocation
|
page read and write
|
||
24B7E196000
|
heap
|
page read and write
|
||
24B7E1CA000
|
heap
|
page read and write
|
||
24B18490000
|
trusted library allocation
|
page read and write
|
||
24B1B3EA000
|
heap
|
page read and write
|
||
241E000
|
stack
|
page read and write
|
||
24B1B478000
|
heap
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
2647BE02000
|
trusted library allocation
|
page read and write
|
||
100AFE000
|
stack
|
page read and write
|
||
245D000
|
stack
|
page read and write
|
||
590000
|
unkown
|
page read and write
|
||
6FE000
|
stack
|
page read and write
|
||
24B7E1C9000
|
heap
|
page read and write
|
||
291E000
|
stack
|
page read and write
|
||
24B7E1B3000
|
heap
|
page read and write
|
||
24B7BCEF000
|
heap
|
page read and write
|
||
591000
|
unkown
|
page readonly
|
||
24B7D7AE000
|
unkown
|
page readonly
|
||
24B7E1A1000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
241E000
|
stack
|
page read and write
|
||
590000
|
unkown
|
page read and write
|
||
24B7E198000
|
heap
|
page read and write
|
||
2C9D000
|
stack
|
page read and write
|
||
24B7E1F0000
|
heap
|
page read and write
|
||
2B5F000
|
stack
|
page read and write
|
||
2F6E000
|
trusted library allocation
|
page read and write
|
||
291E000
|
stack
|
page read and write
|
||
24B7E1BE000
|
heap
|
page read and write
|
||
24B7E260000
|
trusted library allocation
|
page read and write
|
||
A6F000
|
stack
|
page read and write
|
||
24B1B495000
|
heap
|
page read and write
|
||
24B7E19E000
|
heap
|
page read and write
|
||
94D89CC000
|
stack
|
page read and write
|
||
24B7BCDC000
|
heap
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
778000
|
heap
|
page read and write
|
||
778000
|
heap
|
page read and write
|
||
24B7E1C9000
|
heap
|
page read and write
|
||
20003090000
|
heap
|
page read and write
|
||
24B7E1CA000
|
heap
|
page read and write
|
||
24B7E187000
|
heap
|
page read and write
|
||
24B7E1C5000
|
heap
|
page read and write
|
||
2EE4000
|
trusted library allocation
|
page read and write
|
||
4137E7E000
|
stack
|
page read and write
|
||
24B7E1F8000
|
heap
|
page read and write
|
||
161F8402000
|
trusted library allocation
|
page read and write
|
||
2F94000
|
trusted library allocation
|
page read and write
|
||
24B7BC00000
|
heap
|
page read and write
|
||
24B7D750000
|
trusted library allocation
|
page read and write
|
||
24B7E1A0000
|
heap
|
page read and write
|
||
32A3000
|
trusted library allocation
|
page read and write
|
||
24B7E1CA000
|
heap
|
page read and write
|
||
24B7E1C8000
|
heap
|
page read and write
|
||
24B7E1E0000
|
trusted library allocation
|
page read and write
|
||
6AE000
|
stack
|
page read and write
|
||
24B180E2000
|
heap
|
page read and write
|
||
590000
|
unkown
|
page read and write
|
||
24B1B880000
|
trusted library allocation
|
page read and write
|
||
24B7E1BB000
|
heap
|
page read and write
|
||
24B7E1BE000
|
heap
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
24B7E1C0000
|
heap
|
page read and write
|
||
291E000
|
stack
|
page read and write
|
||
24B1B3B5000
|
heap
|
page read and write
|
||
24B18511000
|
trusted library allocation
|
page read and write
|
||
1B4C8A29000
|
heap
|
page read and write
|
||
24D0000
|
heap
|
page read and write
|
||
24B7BCB5000
|
heap
|
page read and write
|
||
24B7E190000
|
heap
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
24B7E1C8000
|
heap
|
page read and write
|
||
24B18432000
|
trusted library allocation
|
page read and write
|
||
24B188E3000
|
trusted library allocation
|
page read and write
|
||
2208B513000
|
heap
|
page read and write
|
||
24B7E02C000
|
heap
|
page read and write
|
||
835000
|
heap
|
page read and write
|
||
161F7C3A000
|
heap
|
page read and write
|
||
2208B502000
|
heap
|
page read and write
|
||
24B7E1C0000
|
heap
|
page read and write
|
||
3806000
|
trusted library allocation
|
page read and write
|
||
835000
|
heap
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
24B7E1CA000
|
heap
|
page read and write
|
||
24B7E1A0000
|
heap
|
page read and write
|
||
778000
|
heap
|
page read and write
|
||
24B7E1CA000
|
heap
|
page read and write
|
||
24D0000
|
heap
|
page read and write
|
||
24B7BCE9000
|
heap
|
page read and write
|
||
2647B5D0000
|
remote allocation
|
page read and write
|
||
2647B5A0000
|
trusted library allocation
|
page read and write
|
||
6FE000
|
stack
|
page read and write
|
||
7FFBAFF90000
|
trusted library allocation
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
6AE000
|
stack
|
page read and write
|
||
2208B43C000
|
heap
|
page read and write
|
||
245D000
|
stack
|
page read and write
|
||
24B1B07C000
|
trusted library allocation
|
page read and write
|
||
24B7E1C6000
|
heap
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
24B7D620000
|
trusted library allocation
|
page read and write
|
||
24B1AD53000
|
heap
|
page read and write
|
||
591000
|
unkown
|
page readonly
|
||
24B7E1A0000
|
heap
|
page read and write
|
||
24B7E1A0000
|
heap
|
page read and write
|
||
24B7E190000
|
heap
|
page read and write
|
||
3A2A000
|
trusted library allocation
|
page read and write
|
||
7FFBAFFA2000
|
trusted library allocation
|
page read and write
|
||
1F938192000
|
heap
|
page read and write
|
||
24B7E18A000
|
heap
|
page read and write
|
||
376987F000
|
stack
|
page read and write
|
||
2A1E000
|
stack
|
page read and write
|
||
2A1E000
|
stack
|
page read and write
|
||
C5F077C000
|
stack
|
page read and write
|
||
24B7E1C6000
|
heap
|
page read and write
|
||
24B7E1DE000
|
heap
|
page read and write
|
||
24B1A386000
|
trusted library allocation
|
page read and write
|
||
24B7E187000
|
heap
|
page read and write
|
||
2208B454000
|
heap
|
page read and write
|
||
24B7E1AC000
|
heap
|
page read and write
|
||
2A1E000
|
stack
|
page read and write
|
||
96F000
|
stack
|
page read and write
|
||
24B7E1BD000
|
heap
|
page read and write
|
||
24B7BCE6000
|
heap
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
1F938227000
|
heap
|
page read and write
|
||
24B7E034000
|
heap
|
page read and write
|
||
96F000
|
stack
|
page read and write
|
||
24B18910000
|
trusted library allocation
|
page read and write
|
||
246D5D02000
|
heap
|
page read and write
|
||
2647B65F000
|
heap
|
page read and write
|
||
24D0000
|
trusted library allocation
|
page read and write
|
||
30000
|
unkown
|
page read and write
|
||
78A000
|
heap
|
page execute and read and write
|
||
2B82000
|
heap
|
page read and write
|
||
24B7E19F000
|
heap
|
page read and write
|
||
24B7E1DE000
|
heap
|
page read and write
|
||
24B7E1C4000
|
heap
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
24B7E1BB000
|
heap
|
page read and write
|
||
24B7B8B2000
|
unkown
|
page readonly
|
||
24B7E187000
|
heap
|
page read and write
|
||
24B7E1BE000
|
heap
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
24B7E1C0000
|
heap
|
page read and write
|
||
24B7E19D000
|
heap
|
page read and write
|
||
20003A02000
|
trusted library allocation
|
page read and write
|
||
22F0000
|
remote allocation
|
page read and write
|
||
24B18510000
|
trusted library allocation
|
page read and write
|
||
24B7E1CD000
|
trusted library allocation
|
page read and write
|
||
C5F03FB000
|
stack
|
page read and write
|
||
24B7D740000
|
trusted library section
|
page readonly
|
||
24B7E187000
|
heap
|
page read and write
|
||
24B18490000
|
trusted library allocation
|
page read and write
|
||
2F6E000
|
trusted library allocation
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
24B1000D000
|
trusted library allocation
|
page read and write
|
||
24B18910000
|
trusted library allocation
|
page read and write
|
||
24B7E190000
|
heap
|
page read and write
|
||
6AE000
|
stack
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
24B7DF84000
|
heap
|
page read and write
|
||
24B7E186000
|
heap
|
page read and write
|
||
835000
|
heap
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
24B7E1F8000
|
heap
|
page read and write
|
||
24C0000
|
remote allocation
|
page read and write
|
||
2310000
|
heap
|
page read and write
|
||
591000
|
unkown
|
page readonly
|
||
2A01000
|
trusted library allocation
|
page read and write
|
||
249D000
|
stack
|
page read and write
|
||
24B7E18C000
|
heap
|
page read and write
|
||
1ED2082A000
|
heap
|
page read and write
|
||
390E000
|
trusted library allocation
|
page read and write
|
||
F3F6FFD000
|
stack
|
page read and write
|
||
24B1B48A000
|
heap
|
page read and write
|
||
36B8D7E000
|
stack
|
page read and write
|
||
24B7E3E0000
|
trusted library allocation
|
page read and write
|
||
24B1B376000
|
trusted library allocation
|
page read and write
|
||
161F7C63000
|
heap
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
1F937800000
|
heap
|
page read and write
|
||
24B7E690000
|
trusted library allocation
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
2208B310000
|
heap
|
page read and write
|
||
24D0000
|
heap
|
page read and write
|
||
835000
|
heap
|
page read and write
|
||
1ED20680000
|
heap
|
page read and write
|
||
24B7E1AA000
|
heap
|
page read and write
|
||
24B7E1C6000
|
heap
|
page read and write
|
||
24B7E1CD000
|
heap
|
page read and write
|
||
B52657E000
|
stack
|
page read and write
|
||
24B7E1C5000
|
heap
|
page read and write
|
||
6B5000
|
heap
|
page read and write
|
||
24B7E1CA000
|
heap
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
2208B402000
|
heap
|
page read and write
|
||
85F000
|
heap
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
24B7E19B000
|
heap
|
page read and write
|
||
24B7E1DE000
|
heap
|
page read and write
|
||
CC260FB000
|
stack
|
page read and write
|
||
161F7C42000
|
heap
|
page read and write
|
||
24B7BA02000
|
unkown
|
page readonly
|
||
B5267FE000
|
stack
|
page read and write
|
||
843000
|
heap
|
page read and write
|
||
24B7E1A0000
|
heap
|
page read and write
|
||
241E000
|
stack
|
page read and write
|
||
2310000
|
heap
|
page read and write
|
||
A6F000
|
stack
|
page read and write
|
||
6AE000
|
stack
|
page read and write
|
||
24B7E19F000
|
heap
|
page read and write
|
||
161F7C39000
|
heap
|
page read and write
|
||
94D8C7E000
|
stack
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
843000
|
heap
|
page read and write
|
||
24B7E186000
|
heap
|
page read and write
|
||
241E000
|
stack
|
page read and write
|
||
24B7E1C4000
|
heap
|
page read and write
|
||
22E0000
|
heap
|
page read and write
|
||
A6F000
|
stack
|
page read and write
|
||
24B10001000
|
trusted library allocation
|
page read and write
|
||
246D5D13000
|
heap
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
24B1B402000
|
heap
|
page read and write
|
||
24B7E1C0000
|
heap
|
page read and write
|
||
835000
|
heap
|
page read and write
|
||
24B1B099000
|
trusted library allocation
|
page read and write
|
||
24B7E1DE000
|
heap
|
page read and write
|
||
36B8C7E000
|
stack
|
page read and write
|
||
161F7C84000
|
heap
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
7FFBB0076000
|
trusted library allocation
|
page execute and read and write
|
||
9D000
|
stack
|
page read and write
|
||
24B7E1C5000
|
heap
|
page read and write
|
||
24B7BD00000
|
trusted library allocation
|
page read and write
|
||
78A000
|
heap
|
page execute and read and write
|
||
24B7E1BB000
|
heap
|
page read and write
|
||
24D0000
|
heap
|
page read and write
|
||
30000
|
unkown
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
24B7E1F2000
|
heap
|
page read and write
|
||
24B7E193000
|
heap
|
page read and write
|
||
376927C000
|
stack
|
page read and write
|
||
A6F000
|
stack
|
page read and write
|
||
24B7E296000
|
trusted library allocation
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
245D000
|
stack
|
page read and write
|
||
24B7E1CA000
|
heap
|
page read and write
|
||
24B7E1C9000
|
heap
|
page read and write
|
||
24B1B424000
|
heap
|
page read and write
|
||
24B18470000
|
trusted library allocation
|
page read and write
|
||
224D000
|
stack
|
page read and write
|
||
24B1B080000
|
trusted library allocation
|
page read and write
|
||
24B7E1BE000
|
heap
|
page read and write
|
||
24B7E090000
|
trusted library allocation
|
page read and write
|
||
24B7BCC7000
|
heap
|
page read and write
|
||
24B7E198000
|
heap
|
page read and write
|
||
24B7E1CE000
|
heap
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
24B7E1F8000
|
heap
|
page read and write
|
||
24B1B3B8000
|
heap
|
page read and write
|
||
2A1E000
|
stack
|
page read and write
|
||
3749000
|
trusted library allocation
|
page read and write
|
||
24B1B350000
|
trusted library allocation
|
page read and write
|
||
24B7E1BE000
|
heap
|
page read and write
|
||
24B7E1BD000
|
heap
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
24B7E2C0000
|
trusted library allocation
|
page read and write
|
||
24B7E4B0000
|
trusted library allocation
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
24B1B04A000
|
trusted library allocation
|
page read and write
|
||
7EC727E000
|
stack
|
page read and write
|
||
1F937865000
|
heap
|
page read and write
|
||
24B7E1CA000
|
heap
|
page read and write
|
||
24B18530000
|
trusted library allocation
|
page read and write
|
||
A6F000
|
stack
|
page read and write
|
||
264E5A71000
|
heap
|
page read and write
|
||
24B7E1B2000
|
heap
|
page read and write
|
||
24B7E1C0000
|
heap
|
page read and write
|
||
24B7E197000
|
heap
|
page read and write
|
||
7FFBB004C000
|
trusted library allocation
|
page execute and read and write
|
||
24B7E1BD000
|
heap
|
page read and write
|
||
241E000
|
stack
|
page read and write
|
||
161F7C29000
|
heap
|
page read and write
|
||
24B7E1DF000
|
heap
|
page read and write
|
||
24B7E630000
|
trusted library allocation
|
page read and write
|
||
2208B44D000
|
heap
|
page read and write
|
||
3769A7E000
|
stack
|
page read and write
|
||
B525DAC000
|
stack
|
page read and write
|
||
3893000
|
trusted library allocation
|
page read and write
|
||
24B18910000
|
trusted library allocation
|
page read and write
|
||
24B7D7C0000
|
heap
|
page read and write
|
||
24B180D1000
|
heap
|
page read and write
|
||
778000
|
heap
|
page read and write
|
||
24B18340000
|
trusted library allocation
|
page read and write
|
||
24B7BE75000
|
heap
|
page read and write
|
||
24B7E200000
|
trusted library allocation
|
page read and write
|
||
20003100000
|
heap
|
page read and write
|
||
161F7C75000
|
heap
|
page read and write
|
||
36B85CB000
|
stack
|
page read and write
|
||
24B184D0000
|
trusted library allocation
|
page read and write
|
||
24B18460000
|
trusted library allocation
|
page read and write
|
||
224D000
|
stack
|
page read and write
|
||
3841000
|
trusted library allocation
|
page read and write
|
||
778000
|
heap
|
page read and write
|
||
22D0000
|
heap
|
page read and write
|
||
3141000
|
trusted library allocation
|
page read and write
|
||
24B1A656000
|
trusted library allocation
|
page read and write
|
||
4137C7F000
|
stack
|
page read and write
|
||
24B7E1C4000
|
heap
|
page read and write
|
||
24B7E034000
|
heap
|
page read and write
|
||
24B7BE20000
|
trusted library allocation
|
page read and write
|
||
22D0000
|
heap
|
page read and write
|
||
24B7E1CA000
|
heap
|
page read and write
|
||
24B7E1DE000
|
heap
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
24B18434000
|
trusted library allocation
|
page read and write
|
||
24B184F0000
|
trusted library allocation
|
page read and write
|
||
24B7E1C4000
|
heap
|
page read and write
|
||
24B7E0B7000
|
trusted library allocation
|
page read and write
|
||
24B7E1A0000
|
heap
|
page read and write
|
||
264E5B02000
|
heap
|
page read and write
|
||
24B7E610000
|
trusted library allocation
|
page read and write
|
||
2A1E000
|
stack
|
page read and write
|
||
24B7E193000
|
heap
|
page read and write
|
||
2208B450000
|
heap
|
page read and write
|
||
24B7E590000
|
trusted library allocation
|
page read and write
|
||
24B7E1CD000
|
heap
|
page read and write
|
||
24B7E187000
|
heap
|
page read and write
|
||
24B7E1A6000
|
heap
|
page read and write
|
||
1F937829000
|
heap
|
page read and write
|
||
1F93786B000
|
heap
|
page read and write
|
||
24B7E1BC000
|
heap
|
page read and write
|
||
C5F09FF000
|
stack
|
page read and write
|
||
1F937858000
|
heap
|
page read and write
|
||
24B7E1BD000
|
heap
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
43F000
|
unkown
|
page execute and read and write
|
||
24B7E188000
|
heap
|
page read and write
|
||
24B7E1C9000
|
heap
|
page read and write
|
||
24B18430000
|
trusted library allocation
|
page read and write
|
||
24B7E2F0000
|
trusted library allocation
|
page read and write
|
||
24B18078000
|
heap
|
page read and write
|
||
2B5D000
|
stack
|
page read and write
|
||
24B7E1BD000
|
heap
|
page read and write
|
||
24B7E1A0000
|
heap
|
page read and write
|
||
2B1E000
|
stack
|
page read and write
|
||
24B7E1BE000
|
heap
|
page read and write
|
||
1ED22440000
|
trusted library allocation
|
page read and write
|
||
1B4C8A5B000
|
heap
|
page read and write
|
||
24B7BB85000
|
heap
|
page read and write
|
||
24B7E1CD000
|
heap
|
page read and write
|
||
24B7E1C0000
|
heap
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
24B7E1A2000
|
heap
|
page read and write
|
||
24B7E190000
|
heap
|
page read and write
|
||
1ED20913000
|
heap
|
page read and write
|
||
24B7E1BE000
|
heap
|
page read and write
|
||
22BD000
|
stack
|
page read and write
|
||
24B1B050000
|
trusted library allocation
|
page read and write
|
||
24B7E2A0000
|
trusted library allocation
|
page read and write
|
||
590000
|
unkown
|
page read and write
|
||
24B7E1BA000
|
heap
|
page read and write
|
||
1CA22829000
|
heap
|
page read and write
|
||
301D000
|
stack
|
page read and write
|
||
24B1B4BB000
|
heap
|
page read and write
|
||
22E0000
|
heap
|
page read and write
|
||
24B7E1DE000
|
heap
|
page read and write
|
||
24B7E16F000
|
trusted library allocation
|
page read and write
|
||
24B7E190000
|
heap
|
page read and write
|
||
24B7E198000
|
heap
|
page read and write
|
||
24B7E1BB000
|
heap
|
page read and write
|
||
2D9E000
|
stack
|
page read and write
|
||
2B5D000
|
stack
|
page read and write
|
||
A7444FE000
|
stack
|
page read and write
|
||
F3F6CFF000
|
stack
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
778000
|
heap
|
page read and write
|
||
1ED20900000
|
heap
|
page read and write
|
||
224D000
|
stack
|
page read and write
|
||
22F0000
|
remote allocation
|
page read and write
|
||
374B000
|
trusted library allocation
|
page read and write
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
24B1A9CB000
|
heap
|
page read and write
|
||
843000
|
heap
|
page read and write
|
||
24B7E1C0000
|
heap
|
page read and write
|
||
24B7E18B000
|
heap
|
page read and write
|
||
24B7E1BE000
|
heap
|
page read and write
|
||
B52667D000
|
stack
|
page read and write
|
||
24B7BE24000
|
trusted library allocation
|
page read and write
|
||
24B7E1BE000
|
heap
|
page read and write
|
||
24B18510000
|
trusted library allocation
|
page read and write
|
||
24B7E1C9000
|
heap
|
page read and write
|
||
1CA22690000
|
heap
|
page read and write
|
||
1CA2283C000
|
heap
|
page read and write
|
||
24B7E1BE000
|
heap
|
page read and write
|
||
24B1AF4F000
|
trusted library allocation
|
page read and write
|
||
C5F06FF000
|
stack
|
page read and write
|
||
1ED20800000
|
heap
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
24B7E1BE000
|
heap
|
page read and write
|
||
24B7E1AA000
|
heap
|
page read and write
|
||
A6F000
|
stack
|
page read and write
|
||
24B7E1C0000
|
heap
|
page read and write
|
||
24B7E1C0000
|
heap
|
page read and write
|
||
22D0000
|
heap
|
page read and write
|
||
3B4D000
|
trusted library allocation
|
page read and write
|
||
24B7E1C4000
|
heap
|
page read and write
|
||
24B7E1CE000
|
heap
|
page read and write
|
||
2B1F000
|
stack
|
page read and write
|
||
24B7E1DC000
|
heap
|
page read and write
|
||
161F7C2E000
|
heap
|
page read and write
|
||
24B7E190000
|
heap
|
page read and write
|
||
24B1B0A0000
|
trusted library allocation
|
page read and write
|
||
24B7E1BF000
|
heap
|
page read and write
|
||
24B7BB80000
|
heap
|
page read and write
|
||
24B7E1A0000
|
heap
|
page read and write
|
||
591000
|
unkown
|
page readonly
|
||
24B7E1B3000
|
heap
|
page read and write
|
||
24B1B370000
|
trusted library allocation
|
page read and write
|
||
3875000
|
trusted library allocation
|
page read and write
|
||
24B7E19B000
|
heap
|
page read and write
|
||
2A01000
|
trusted library allocation
|
page read and write
|
||
161F7C7E000
|
heap
|
page read and write
|
||
24B7E1DE000
|
heap
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
F3F72FD000
|
stack
|
page read and write
|
||
38DB000
|
trusted library allocation
|
page read and write
|
||
38E0000
|
trusted library allocation
|
page read and write
|
||
24B18480000
|
trusted library allocation
|
page read and write
|
||
22F0000
|
remote allocation
|
page read and write
|
||
24B7E1C0000
|
heap
|
page read and write
|
||
6AE000
|
stack
|
page read and write
|
||
2310000
|
heap
|
page read and write
|
||
2208B3A0000
|
trusted library allocation
|
page read and write
|
||
24B7BCBC000
|
heap
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
843000
|
heap
|
page read and write
|
||
24B1B42F000
|
heap
|
page read and write
|
||
7FFBAFFB0000
|
trusted library allocation
|
page read and write
|
||
24B7E1BE000
|
heap
|
page read and write
|
||
161F7B20000
|
heap
|
page read and write
|
||
24D0000
|
heap
|
page read and write
|
||
2208B47A000
|
heap
|
page read and write
|
||
24B7E1C5000
|
heap
|
page read and write
|
||
24B7D660000
|
trusted library allocation
|
page read and write
|
||
835000
|
heap
|
page read and write
|
||
24D0000
|
trusted library allocation
|
page read and write
|
||
24B7E1FB000
|
heap
|
page read and write
|
||
24C0000
|
remote allocation
|
page read and write
|
||
22F0000
|
remote allocation
|
page read and write
|
||
24B7E18C000
|
heap
|
page read and write
|
||
24B7E1DE000
|
heap
|
page read and write
|
||
374E000
|
trusted library allocation
|
page read and write
|
||
24B7E1C5000
|
heap
|
page read and write
|
||
24B7E1BE000
|
heap
|
page read and write
|
||
24B7E167000
|
heap
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
381C000
|
trusted library allocation
|
page read and write
|
||
1ED22202000
|
trusted library allocation
|
page read and write
|
||
24B1A21A000
|
trusted library allocation
|
page read and write
|
||
7EC6B6B000
|
stack
|
page read and write
|
||
1F938213000
|
heap
|
page read and write
|
||
24B7E1E0000
|
heap
|
page read and write
|
||
24B7E4D0000
|
trusted library allocation
|
page read and write
|
||
24B7E1BE000
|
heap
|
page read and write
|
||
24B7E1BE000
|
heap
|
page read and write
|
||
94D9077000
|
stack
|
page read and write
|
||
24B18510000
|
trusted library allocation
|
page read and write
|
||
245D000
|
stack
|
page read and write
|
||
24B7BCF6000
|
heap
|
page read and write
|
||
24B1B4DB000
|
heap
|
page read and write
|
||
413769B000
|
stack
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
24B7E1DE000
|
heap
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
24B7E4E0000
|
trusted library allocation
|
page read and write
|
||
38C6000
|
trusted library allocation
|
page read and write
|
||
24B7E1B3000
|
heap
|
page read and write
|
||
22D0000
|
heap
|
page read and write
|
||
24B7E1BD000
|
heap
|
page read and write
|
||
24B7E1C0000
|
heap
|
page read and write
|
||
A6F000
|
stack
|
page read and write
|
||
3D87000
|
trusted library allocation
|
page read and write
|
||
249D000
|
stack
|
page read and write
|
||
374B000
|
trusted library allocation
|
page read and write
|
||
24B7E1CA000
|
heap
|
page read and write
|
||
78A000
|
heap
|
page execute and read and write
|
||
24B7BCDC000
|
heap
|
page read and write
|
||
24B7E1B3000
|
heap
|
page read and write
|
||
24B7D640000
|
heap
|
page read and write
|
||
24B7E187000
|
heap
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
24B7E18A000
|
heap
|
page read and write
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
94D927E000
|
stack
|
page read and write
|
||
24B7E520000
|
trusted library allocation
|
page read and write
|
||
24B7E18F000
|
heap
|
page read and write
|
||
B52627E000
|
stack
|
page read and write
|
||
24B18910000
|
trusted library allocation
|
page read and write
|
||
24B7E19B000
|
heap
|
page read and write
|
||
24B7D770000
|
unkown
|
page readonly
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
24B1B412000
|
heap
|
page read and write
|
||
24B1B5E3000
|
trusted library allocation
|
page read and write
|
||
24B180D5000
|
heap
|
page read and write
|
||
1ED2085D000
|
heap
|
page read and write
|
||
24B7E240000
|
trusted library allocation
|
page read and write
|
||
24B7E19A000
|
heap
|
page read and write
|
||
24B7E1F8000
|
heap
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
24B18910000
|
trusted library allocation
|
page read and write
|
||
24B1B075000
|
trusted library allocation
|
page read and write
|
||
7FFBB0050000
|
trusted library allocation
|
page execute and read and write
|
||
24B18912000
|
trusted library allocation
|
page read and write
|
||
24B7E3F0000
|
trusted library allocation
|
page read and write
|
||
396A000
|
trusted library allocation
|
page read and write
|
||
24B7E530000
|
trusted library allocation
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
24B7E1B5000
|
heap
|
page read and write
|
||
24B7E1FB000
|
heap
|
page read and write
|
||
24B7E1A0000
|
heap
|
page read and write
|
||
6FE000
|
stack
|
page read and write
|
||
24B7DFD6000
|
heap
|
page read and write
|
||
24B7E1A0000
|
heap
|
page read and write
|
||
24B7E198000
|
heap
|
page read and write
|
||
24B7E1C6000
|
heap
|
page read and write
|
||
24B7E1BB000
|
heap
|
page read and write
|
||
24B7BCE3000
|
heap
|
page read and write
|
||
24B1B3C1000
|
heap
|
page read and write
|
||
78A000
|
heap
|
page execute and read and write
|
||
24B7E1C4000
|
heap
|
page read and write
|
||
2B1E000
|
stack
|
page read and write
|
||
24B7E1C0000
|
heap
|
page read and write
|
||
24B7D720000
|
trusted library allocation
|
page read and write
|
||
24B7E1C0000
|
heap
|
page read and write
|
||
24B7E5C0000
|
trusted library allocation
|
page read and write
|
||
6AE000
|
stack
|
page read and write
|
||
24B7E1CA000
|
heap
|
page read and write
|
||
291E000
|
stack
|
page read and write
|
||
2EE0000
|
trusted library allocation
|
page read and write
|
||
24B7D7C0000
|
trusted library allocation
|
page read and write
|
||
291E000
|
stack
|
page read and write
|
||
85F000
|
heap
|
page read and write
|
||
6FE000
|
stack
|
page read and write
|
||
3741000
|
trusted library allocation
|
page read and write
|
||
778000
|
heap
|
page read and write
|
||
96F000
|
stack
|
page read and write
|
||
24B7BE40000
|
trusted library allocation
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
2C9D000
|
stack
|
page read and write
|
||
24B7E191000
|
heap
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
2647B629000
|
heap
|
page read and write
|
||
24B7E1C6000
|
heap
|
page read and write
|
||
24B7E1C6000
|
heap
|
page read and write
|
||
224D000
|
stack
|
page read and write
|
||
24B7E3D0000
|
trusted library allocation
|
page read and write
|
||
161F7C30000
|
heap
|
page read and write
|
||
24B7E1A2000
|
heap
|
page read and write
|
||
22BD000
|
stack
|
page read and write
|
||
24B1B4B8000
|
heap
|
page read and write
|
||
24B1B6D1000
|
trusted library allocation
|
page read and write
|
||
24B7E186000
|
heap
|
page read and write
|
||
F3F6575000
|
stack
|
page read and write
|
||
6FE000
|
stack
|
page read and write
|
||
24B18910000
|
trusted library allocation
|
page read and write
|
||
24B1B44E000
|
heap
|
page read and write
|
||
24B7E1DE000
|
heap
|
page read and write
|
||
3A6B000
|
trusted library allocation
|
page read and write
|
||
24B7E1C2000
|
heap
|
page read and write
|
||
24B7E1C6000
|
heap
|
page read and write
|
||
246D5CC3000
|
heap
|
page read and write
|
||
24B7E19D000
|
heap
|
page read and write
|
||
24B1B633000
|
trusted library allocation
|
page read and write
|
||
2B5D000
|
stack
|
page read and write
|
||
24B7E1BD000
|
heap
|
page read and write
|
||
24B7E190000
|
heap
|
page read and write
|
||
24B18480000
|
trusted library allocation
|
page read and write
|
||
24B7E1F8000
|
heap
|
page read and write
|
||
843000
|
heap
|
page read and write
|
||
24B7E1A0000
|
heap
|
page read and write
|
||
24B7E1C0000
|
heap
|
page read and write
|
||
376997A000
|
stack
|
page read and write
|
||
30000
|
unkown
|
page read and write
|
||
C5F0BFD000
|
stack
|
page read and write
|
||
24B7E19D000
|
heap
|
page read and write
|
||
24B7E1BE000
|
heap
|
page read and write
|
||
24B7E19B000
|
heap
|
page read and write
|
||
24B7E640000
|
trusted library allocation
|
page read and write
|
||
24B1AD4B000
|
heap
|
page read and write
|
||
224D000
|
stack
|
page read and write
|
||
96F000
|
stack
|
page read and write
|
||
22E0000
|
heap
|
page read and write
|
||
24B18450000
|
trusted library allocation
|
page read and write
|
||
31F7000
|
trusted library allocation
|
page read and write
|
||
1B4C9202000
|
trusted library allocation
|
page read and write
|
||
3D95000
|
trusted library allocation
|
page read and write
|
||
2350000
|
unkown
|
page read and write
|
||
24B7E1DE000
|
heap
|
page read and write
|
||
20003860000
|
trusted library allocation
|
page read and write
|
||
2B86000
|
heap
|
page read and write
|
||
1ED221A0000
|
trusted library allocation
|
page read and write
|
||
24B18912000
|
trusted library allocation
|
page read and write
|
||
27D0000
|
heap
|
page read and write
|
||
1005FE000
|
stack
|
page read and write
|
||
24B7E1DE000
|
heap
|
page read and write
|
||
2647B600000
|
heap
|
page read and write
|
||
2208B413000
|
heap
|
page read and write
|
There are 2297 hidden memdumps, click here to show them.