Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
rFACTURA_FAC_2023_1-1000733.PDF.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\antiphthisical\Primar\Cunicular\Densimetric\Talestrmmene.Unr
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_caspol.exe_c9831a337d3627d9a81a22112d1a4918180c9e2_ea830a9b_d3bd527c-2f90-4458-9cd4-e1517201fb0e\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2B2E.tmp.dmp
|
Mini DuMP crash report, 14 streams, Mon Mar 20 11:06:18 2023, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2DBF.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2DEF.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\Nikotins61.sto
|
ASCII text, with very long lines (22842), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\System.Reflection.TypeExtensions.dll
|
PE32+ executable (DLL) (console) x86-64 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\antiphthisical\Primar\Cunicular\Densimetric\System.Reflection.Primitives.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\battery-level-90-charging-symbolic.svg
|
SVG Scalable Vector Graphics image
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\colorimeter-colorhug-symbolic.symbolic.png
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\media-playlist-consecutive-symbolic.svg
|
SVG Scalable Vector Graphics image
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\network-offline-symbolic.svg
|
SVG Scalable Vector Graphics image
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\network-wireless.png
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\preferences-desktop-font-symbolic.symbolic.png
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\task-due-symbolic.symbolic.png
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\window-close.png
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsp1D68.tmp\AdvSplash.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsp1D68.tmp\System.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve.LOG1
|
MS Windows registry file, NT/2000 or above
|
dropped
|
||
\Device\ConDrv
|
ASCII text, with CRLF, LF line terminators
|
dropped
|
There are 12 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exe
|
C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exe
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
|
C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 6576 -s 2500
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://checkip.dyndns.org/
|
132.226.8.169
|
||
http://crl.certum.pl/ctsca2021.crl0o
|
unknown
|
||
http://repository.certum.pl/ctnca.cer09
|
unknown
|
||
http://crl.certum.pl/ctnca.crl0k
|
unknown
|
||
https://drive.google.com/2
|
unknown
|
||
http://creativecommons.org/ns#ShareAlike
|
unknown
|
||
http://upx.sf.net
|
unknown
|
||
http://checkip.dyndns.org
|
unknown
|
||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
||
https://doc-0s-a8-docs.googleusercontent.com/#
|
unknown
|
||
http://creativecommons.org/ns#
|
unknown
|
||
https://github.com/dotnet/runtime
|
unknown
|
||
http://creativecommons.org/ns#DerivativeWorks
|
unknown
|
||
https://doc-0s-a8-docs.googleusercontent.com/
|
unknown
|
||
http://creativecommons.org/licenses/by-sa/4.0/
|
unknown
|
||
http://creativecommons.org/ns#Distribution
|
unknown
|
||
http://repository.certum.pl/ctsca2021.cer0
|
unknown
|
||
http://subca.ocsp-certum.com05
|
unknown
|
||
http://creativecommons.org/ns#Attribution
|
unknown
|
||
http://subca.ocsp-certum.com02
|
unknown
|
||
https://doc-0s-a8-docs.googleusercontent.com/docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/mjejjps3gi1cd44ihbckcd43d7dn78od/1679306700000/12467729248612761337/*/1XARcr4sm_5_dvnsnsVtsDOfjHfua_08k?e=download&uuid=dc7be3b5-c5f0-4bcb-ad3e-a7d72194b047
|
142.250.185.193
|
||
http://subca.ocsp-certum.com01
|
unknown
|
||
https://csp.withgoogle.com/csp/report-to/DriveUntrustedContentHttp/external
|
unknown
|
||
http://crl.certum.pl/ctnca2.crl0l
|
unknown
|
||
http://repository.certum.pl/ctnca2.cer09
|
unknown
|
||
https://github.com/dotnet/runtimeBSJB
|
unknown
|
||
https://drive.google.com/j
|
unknown
|
||
http://checkip.dyndns.com
|
unknown
|
||
http://creativecommons.org/ns#Notice
|
unknown
|
||
http://creativecommons.org/ns#Reproduction
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://www.certum.pl/CPS0
|
unknown
|
||
https://doc-0s-a8-docs.googleusercontent.com/docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/mjejjps3
|
unknown
|
There are 23 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
checkip.dyndns.com
|
132.226.8.169
|
||
checkip.dyndns.org
|
unknown
|
||
drive.google.com
|
142.250.181.238
|
||
googlehosted.l.googleusercontent.com
|
142.250.185.193
|
||
doc-0s-a8-docs.googleusercontent.com
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
132.226.8.169
|
checkip.dyndns.com
|
United States
|
||
142.250.181.238
|
drive.google.com
|
United States
|
||
142.250.185.193
|
googlehosted.l.googleusercontent.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\InstallDir32
|
Path
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Micos\Irises\Kandissens\Raceblanding
|
Sulphammonium164
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Hermeneutics\Ophjedes\Amtsraadsmedlemmet
|
Printerproblemernes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Replyingly\Avnbgen\Spisekamrenes
|
Rumfartscenterets
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Fetichry
|
Isobase
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASMANCS
|
FileDirectory
|
||
\REGISTRY\A\{0d50961f-3942-294a-b704-edbe88fdef91}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
|
ProgramId
|
||
\REGISTRY\A\{0d50961f-3942-294a-b704-edbe88fdef91}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
|
FileId
|
||
\REGISTRY\A\{0d50961f-3942-294a-b704-edbe88fdef91}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
|
LowerCaseLongPath
|
||
\REGISTRY\A\{0d50961f-3942-294a-b704-edbe88fdef91}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
|
LongPathHash
|
||
\REGISTRY\A\{0d50961f-3942-294a-b704-edbe88fdef91}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
|
Name
|
||
\REGISTRY\A\{0d50961f-3942-294a-b704-edbe88fdef91}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
|
OriginalFileName
|
||
\REGISTRY\A\{0d50961f-3942-294a-b704-edbe88fdef91}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
|
Publisher
|
||
\REGISTRY\A\{0d50961f-3942-294a-b704-edbe88fdef91}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
|
Version
|
||
\REGISTRY\A\{0d50961f-3942-294a-b704-edbe88fdef91}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
|
BinFileVersion
|
||
\REGISTRY\A\{0d50961f-3942-294a-b704-edbe88fdef91}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
|
BinaryType
|
||
\REGISTRY\A\{0d50961f-3942-294a-b704-edbe88fdef91}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
|
ProductName
|
||
\REGISTRY\A\{0d50961f-3942-294a-b704-edbe88fdef91}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
|
ProductVersion
|
||
\REGISTRY\A\{0d50961f-3942-294a-b704-edbe88fdef91}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
|
LinkDate
|
||
\REGISTRY\A\{0d50961f-3942-294a-b704-edbe88fdef91}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
|
BinProductVersion
|
||
\REGISTRY\A\{0d50961f-3942-294a-b704-edbe88fdef91}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
|
AppxPackageFullName
|
||
\REGISTRY\A\{0d50961f-3942-294a-b704-edbe88fdef91}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{0d50961f-3942-294a-b704-edbe88fdef91}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
|
Size
|
||
\REGISTRY\A\{0d50961f-3942-294a-b704-edbe88fdef91}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
|
Language
|
||
\REGISTRY\A\{0d50961f-3942-294a-b704-edbe88fdef91}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
|
IsOsComponent
|
||
\REGISTRY\A\{0d50961f-3942-294a-b704-edbe88fdef91}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
|
Usn
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
TickCount
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
|
0018C0099012AB0F
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceTicket
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceId
|
There are 35 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
5E20000
|
direct allocation
|
page execute and read and write
|
||
48B0000
|
direct allocation
|
page execute and read and write
|
||
FC0000
|
remote allocation
|
page execute and read and write
|
||
210680C2000
|
heap
|
page read and write
|
||
7EF000
|
unkown
|
page readonly
|
||
224F9A9B000
|
heap
|
page read and write
|
||
224F891C000
|
heap
|
page read and write
|
||
3C0E000
|
stack
|
page read and write
|
||
224F8902000
|
heap
|
page read and write
|
||
12ECEC67000
|
heap
|
page read and write
|
||
32FB1000
|
heap
|
page read and write
|
||
21067FFC000
|
heap
|
page read and write
|
||
2106800C000
|
heap
|
page read and write
|
||
12ECEBB0000
|
heap
|
page read and write
|
||
210680B3000
|
heap
|
page read and write
|
||
210680CD000
|
heap
|
page read and write
|
||
7E9000
|
unkown
|
page readonly
|
||
2426A9B0000
|
remote allocation
|
page read and write
|
||
201D948F000
|
heap
|
page read and write
|
||
F4A8079000
|
stack
|
page read and write
|
||
21068730000
|
heap
|
page read and write
|
||
364C0000
|
trusted library allocation
|
page read and write
|
||
12ECEC6C000
|
heap
|
page read and write
|
||
21068963000
|
heap
|
page read and write
|
||
36530000
|
trusted library allocation
|
page read and write
|
||
2106808B000
|
heap
|
page read and write
|
||
224F932F000
|
heap
|
page read and write
|
||
32FB1000
|
heap
|
page read and write
|
||
224F930F000
|
heap
|
page read and write
|
||
2CF0581E000
|
unkown
|
page read and write
|
||
12ECEC82000
|
heap
|
page read and write
|
||
21068104000
|
heap
|
page read and write
|
||
210686AF000
|
heap
|
page read and write
|
||
32FB1000
|
heap
|
page read and write
|
||
3AC4000
|
heap
|
page read and write
|
||
335A0000
|
heap
|
page read and write
|
||
B8F000
|
heap
|
page read and write
|
||
995000
|
heap
|
page read and write
|
||
341B0000
|
trusted library allocation
|
page read and write
|
||
224F891C000
|
heap
|
page read and write
|
||
224F9A14000
|
heap
|
page read and write
|
||
33FEA000
|
trusted library allocation
|
page execute and read and write
|
||
2106875D000
|
heap
|
page read and write
|
||
224F9378000
|
heap
|
page read and write
|
||
3388F000
|
stack
|
page read and write
|
||
1F6BBE52000
|
heap
|
page read and write
|
||
33E3E000
|
stack
|
page read and write
|
||
364D0000
|
trusted library allocation
|
page read and write
|
||
364E0000
|
trusted library allocation
|
page read and write
|
||
B58000
|
heap
|
page read and write
|
||
21068088000
|
heap
|
page read and write
|
||
21068787000
|
heap
|
page read and write
|
||
224F9376000
|
heap
|
page read and write
|
||
21068095000
|
heap
|
page read and write
|
||
3814000
|
heap
|
page read and write
|
||
224F9AAC000
|
heap
|
page read and write
|
||
1F6BBE60000
|
heap
|
page read and write
|
||
21067806000
|
heap
|
page read and write
|
||
21067929000
|
heap
|
page read and write
|
||
3A94000
|
heap
|
page read and write
|
||
21067FD9000
|
heap
|
page read and write
|
||
210680CD000
|
heap
|
page read and write
|
||
224F9329000
|
heap
|
page read and write
|
||
3652D000
|
stack
|
page read and write
|
||
21068081000
|
heap
|
page read and write
|
||
210680E9000
|
heap
|
page read and write
|
||
224F937C000
|
heap
|
page read and write
|
||
21067FDA000
|
heap
|
page read and write
|
||
3AAD000
|
heap
|
page read and write
|
||
21067FC4000
|
heap
|
page read and write
|
||
7EF000
|
unkown
|
page readonly
|
||
24268F50000
|
heap
|
page read and write
|
||
1C7BE260000
|
heap
|
page read and write
|
||
12ECEC64000
|
heap
|
page read and write
|
||
B9C000
|
heap
|
page read and write
|
||
2106792E000
|
heap
|
page read and write
|
||
364C0000
|
trusted library allocation
|
page read and write
|
||
21068110000
|
heap
|
page read and write
|
||
1F6BBDC0000
|
heap
|
page read and write
|
||
201D9400000
|
heap
|
page read and write
|
||
2106897B000
|
heap
|
page read and write
|
||
21068045000
|
heap
|
page read and write
|
||
21068123000
|
heap
|
page read and write
|
||
3637E000
|
stack
|
page read and write
|
||
2DE0000
|
heap
|
page read and write
|
||
487CDFE000
|
stack
|
page read and write
|
||
210680F1000
|
heap
|
page read and write
|
||
21067FFA000
|
heap
|
page read and write
|
||
2106811C000
|
heap
|
page read and write
|
||
210686B0000
|
heap
|
page read and write
|
||
3AA3000
|
heap
|
page read and write
|
||
210680CD000
|
heap
|
page read and write
|
||
12ECED02000
|
heap
|
page read and write
|
||
DA8ADF9000
|
stack
|
page read and write
|
||
2106813B000
|
heap
|
page read and write
|
||
210680E3000
|
heap
|
page read and write
|
||
32FB1000
|
heap
|
page read and write
|
||
210687C5000
|
heap
|
page read and write
|
||
7E0000
|
unkown
|
page readonly
|
||
21068754000
|
heap
|
page read and write
|
||
21287DB0000
|
unclassified section
|
page readonly
|
||
224F88F3000
|
heap
|
page read and write
|
||
2CF05800000
|
unkown
|
page read and write
|
||
21068962000
|
heap
|
page read and write
|
||
21068754000
|
heap
|
page read and write
|
||
32FB1000
|
heap
|
page read and write
|
||
1C7BEA00000
|
heap
|
page read and write
|
||
27EE000
|
stack
|
page read and write
|
||
210687A0000
|
heap
|
page read and write
|
||
DA8ACFF000
|
stack
|
page read and write
|
||
142DEFE000
|
stack
|
page read and write
|
||
210680FB000
|
heap
|
page read and write
|
||
2CF05813000
|
unkown
|
page read and write
|
||
224F9396000
|
heap
|
page read and write
|
||
33FC3000
|
trusted library allocation
|
page execute and read and write
|
||
21068108000
|
heap
|
page read and write
|
||
32FB1000
|
heap
|
page read and write
|
||
1C7BE2A6000
|
heap
|
page read and write
|
||
32FB1000
|
heap
|
page read and write
|
||
6820000
|
direct allocation
|
page execute and read and write
|
||
210687C5000
|
heap
|
page read and write
|
||
3AA3000
|
heap
|
page read and write
|
||
21068094000
|
heap
|
page read and write
|
||
142E3FE000
|
stack
|
page read and write
|
||
27494D00000
|
heap
|
page read and write
|
||
21287E51000
|
heap
|
page read and write
|
||
12ECEC53000
|
heap
|
page read and write
|
||
570D5DB000
|
stack
|
page read and write
|
||
21068755000
|
heap
|
page read and write
|
||
379E000
|
stack
|
page read and write
|
||
1C7BE28E000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page read and write
|
||
224F9378000
|
heap
|
page read and write
|
||
224F9329000
|
heap
|
page read and write
|
||
3AAD000
|
heap
|
page read and write
|
||
210687C5000
|
heap
|
page read and write
|
||
210677FE000
|
heap
|
page read and write
|
||
224F9330000
|
heap
|
page read and write
|
||
2665000
|
heap
|
page read and write
|
||
2106813A000
|
heap
|
page read and write
|
||
210680F0000
|
heap
|
page read and write
|
||
363FF000
|
heap
|
page read and write
|
||
ABBD17E000
|
stack
|
page read and write
|
||
210680D1000
|
heap
|
page read and write
|
||
570D9FD000
|
stack
|
page read and write
|
||
210680A4000
|
heap
|
page read and write
|
||
27494D13000
|
heap
|
page read and write
|
||
21068104000
|
heap
|
page read and write
|
||
2CF056C0000
|
heap
|
page read and write
|
||
24269100000
|
heap
|
page read and write
|
||
21068730000
|
heap
|
page read and write
|
||
3671F000
|
stack
|
page read and write
|
||
24269063000
|
heap
|
page read and write
|
||
3417E000
|
stack
|
page read and write
|
||
1C7BE2AE000
|
heap
|
page read and write
|
||
224F9379000
|
heap
|
page read and write
|
||
2106813B000
|
heap
|
page read and write
|
||
364D0000
|
trusted library allocation
|
page read and write
|
||
21068730000
|
heap
|
page read and write
|
||
21068123000
|
heap
|
page read and write
|
||
2106811A000
|
heap
|
page read and write
|
||
32FB1000
|
heap
|
page read and write
|
||
3AEA000
|
heap
|
page read and write
|
||
210680A5000
|
heap
|
page read and write
|
||
27494C3A000
|
heap
|
page read and write
|
||
2426A9B0000
|
remote allocation
|
page read and write
|
||
224F930E000
|
heap
|
page read and write
|
||
224F9A08000
|
heap
|
page read and write
|
||
364E0000
|
trusted library allocation
|
page read and write
|
||
210680A7000
|
heap
|
page read and write
|
||
224F88A5000
|
heap
|
page read and write
|
||
210680C4000
|
heap
|
page read and write
|
||
1C7BE276000
|
heap
|
page read and write
|
||
21068712000
|
heap
|
page read and write
|
||
487C55C000
|
stack
|
page read and write
|
||
201D943B000
|
heap
|
page read and write
|
||
21068134000
|
heap
|
page read and write
|
||
210686AA000
|
heap
|
page read and write
|
||
1C7BE278000
|
heap
|
page read and write
|
||
224F9390000
|
heap
|
page read and write
|
||
224F9329000
|
heap
|
page read and write
|
||
2FB0000
|
heap
|
page read and write
|
||
210680C4000
|
heap
|
page read and write
|
||
201D9445000
|
heap
|
page read and write
|
||
2660000
|
heap
|
page read and write
|
||
26D4F5B000
|
stack
|
page read and write
|
||
21068754000
|
heap
|
page read and write
|
||
ABBD375000
|
stack
|
page read and write
|
||
201D9502000
|
heap
|
page read and write
|
||
2E5C000
|
stack
|
page read and write
|
||
21067779000
|
heap
|
page read and write
|
||
224F932D000
|
heap
|
page read and write
|
||
3ACB000
|
heap
|
page read and write
|
||
210677FE000
|
heap
|
page read and write
|
||
1F6BC6B0000
|
trusted library allocation
|
page read and write
|
||
210680F3000
|
heap
|
page read and write
|
||
24268F40000
|
unclassified section
|
page readonly
|
||
21068730000
|
heap
|
page read and write
|
||
224F9130000
|
remote allocation
|
page read and write
|
||
2426902A000
|
heap
|
page read and write
|
||
1C7BE278000
|
heap
|
page read and write
|
||
210680D0000
|
heap
|
page read and write
|
||
210680C2000
|
heap
|
page read and write
|
||
21067FFA000
|
heap
|
page read and write
|
||
274953F0000
|
trusted library allocation
|
page read and write
|
||
210680DA000
|
heap
|
page read and write
|
||
21067FD4000
|
heap
|
page read and write
|
||
3AC7000
|
heap
|
page read and write
|
||
ABBD0FF000
|
stack
|
page read and write
|
||
33FFB000
|
trusted library allocation
|
page execute and read and write
|
||
364C0000
|
trusted library allocation
|
page read and write
|
||
21068759000
|
heap
|
page read and write
|
||
368BE000
|
stack
|
page read and write
|
||
3A9F000
|
heap
|
page read and write
|
||
210687A0000
|
heap
|
page read and write
|
||
21068136000
|
heap
|
page read and write
|
||
21068144000
|
heap
|
page read and write
|
||
32FB1000
|
heap
|
page read and write
|
||
224F9AB5000
|
heap
|
page read and write
|
||
210687A0000
|
heap
|
page read and write
|
||
12ECEC59000
|
heap
|
page read and write
|
||
2106800C000
|
heap
|
page read and write
|
||
210680C7000
|
heap
|
page read and write
|
||
224F9329000
|
heap
|
page read and write
|
||
21068743000
|
heap
|
page read and write
|
||
224F935E000
|
heap
|
page read and write
|
||
224F8760000
|
heap
|
page read and write
|
||
21068963000
|
heap
|
page read and write
|
||
21068924000
|
heap
|
page read and write
|
||
224F88EF000
|
heap
|
page read and write
|
||
32FB1000
|
heap
|
page read and write
|
||
224F937D000
|
heap
|
page read and write
|
||
32FB1000
|
heap
|
page read and write
|
||
33210000
|
direct allocation
|
page read and write
|
||
210680AB000
|
heap
|
page read and write
|
||
364C0000
|
trusted library allocation
|
page read and write
|
||
21067764000
|
heap
|
page read and write
|
||
950000
|
heap
|
page read and write
|
||
210680C3000
|
heap
|
page read and write
|
||
210680BC000
|
heap
|
page read and write
|
||
224F9202000
|
heap
|
page read and write
|
||
27494C92000
|
heap
|
page read and write
|
||
21068134000
|
heap
|
page read and write
|
||
224F9329000
|
heap
|
page read and write
|
||
27494C52000
|
heap
|
page read and write
|
||
210680B1000
|
heap
|
page read and write
|
||
12ECEC36000
|
heap
|
page read and write
|
||
12ECEC40000
|
heap
|
page read and write
|
||
210680B4000
|
heap
|
page read and write
|
||
36530000
|
trusted library allocation
|
page read and write
|
||
21068764000
|
heap
|
page read and write
|
||
ABBD07E000
|
stack
|
page read and write
|
||
27494C8A000
|
heap
|
page read and write
|
||
2106811A000
|
heap
|
page read and write
|
||
210680DA000
|
heap
|
page read and write
|
||
210680CD000
|
heap
|
page read and write
|
||
21068104000
|
heap
|
page read and write
|
||
3AC6000
|
heap
|
page read and write
|
||
210680E8000
|
heap
|
page read and write
|
||
224F891B000
|
heap
|
page read and write
|
||
21068045000
|
heap
|
page read and write
|
||
2106875D000
|
heap
|
page read and write
|
||
224F882A000
|
heap
|
page read and write
|
||
210680EF000
|
heap
|
page read and write
|
||
210686CB000
|
heap
|
page read and write
|
||
DA8B1FE000
|
stack
|
page read and write
|
||
33230000
|
direct allocation
|
page read and write
|
||
21068730000
|
heap
|
page read and write
|
||
21068144000
|
heap
|
page read and write
|
||
224F932F000
|
heap
|
page read and write
|
||
21067FE9000
|
heap
|
page read and write
|
||
21067929000
|
heap
|
page read and write
|
||
210687C5000
|
heap
|
page read and write
|
||
1F6BBE27000
|
heap
|
page read and write
|
||
210680EC000
|
heap
|
page read and write
|
||
224F937C000
|
heap
|
page read and write
|
||
210680AD000
|
heap
|
page read and write
|
||
224F935A000
|
heap
|
page read and write
|
||
1C7BE1A0000
|
unclassified section
|
page readonly
|
||
2106813B000
|
heap
|
page read and write
|
||
12ECEC62000
|
heap
|
page read and write
|
||
32FB1000
|
heap
|
page read and write
|
||
1F6BBDB0000
|
unclassified section
|
page readonly
|
||
21068137000
|
heap
|
page read and write
|
||
12ECEC5B000
|
heap
|
page read and write
|
||
12ECECA9000
|
heap
|
page read and write
|
||
224F9313000
|
heap
|
page read and write
|
||
12ECEC97000
|
heap
|
page read and write
|
||
21068743000
|
heap
|
page read and write
|
||
32FB1000
|
heap
|
page read and write
|
||
224F9376000
|
heap
|
page read and write
|
||
224F936B000
|
heap
|
page read and write
|
||
224F9337000
|
heap
|
page read and write
|
||
21068094000
|
heap
|
page read and write
|
||
2106811C000
|
heap
|
page read and write
|
||
210680E4000
|
heap
|
page read and write
|
||
21068110000
|
heap
|
page read and write
|
||
12ECEC6D000
|
heap
|
page read and write
|
||
21067779000
|
heap
|
page read and write
|
||
21068081000
|
heap
|
page read and write
|
||
2106813C000
|
heap
|
page read and write
|
||
21068709000
|
heap
|
page read and write
|
||
21068104000
|
heap
|
page read and write
|
||
341E1000
|
trusted library allocation
|
page read and write
|
||
224F88F9000
|
heap
|
page read and write
|
||
2860000
|
heap
|
page read and write
|
||
36530000
|
trusted library allocation
|
page read and write
|
||
210680E6000
|
heap
|
page read and write
|
||
21067FFC000
|
heap
|
page read and write
|
||
27AF000
|
stack
|
page read and write
|
||
3374F000
|
stack
|
page read and write
|
||
369BE000
|
stack
|
page read and write
|
||
1F6BBD00000
|
heap
|
page read and write
|
||
32FB1000
|
heap
|
page read and write
|
||
224F891C000
|
heap
|
page read and write
|
||
210680E9000
|
heap
|
page read and write
|
||
789000
|
unkown
|
page read and write
|
||
21067F51000
|
heap
|
page read and write
|
||
210680AD000
|
heap
|
page read and write
|
||
224F9379000
|
heap
|
page read and write
|
||
224F9374000
|
heap
|
page read and write
|
||
F4A78BD000
|
stack
|
page read and write
|
||
21067660000
|
heap
|
page read and write
|
||
2CF05D02000
|
heap
|
page read and write
|
||
210680A5000
|
heap
|
page read and write
|
||
32FB1000
|
heap
|
page read and write
|
||
224F9396000
|
heap
|
page read and write
|
||
10003000
|
unkown
|
page readonly
|
||
2106776D000
|
heap
|
page read and write
|
||
224F932D000
|
heap
|
page read and write
|
||
21067F95000
|
heap
|
page read and write
|
||
2CF05915000
|
trusted library allocation
|
page read and write
|
||
21067FB2000
|
heap
|
page read and write
|
||
210680A5000
|
heap
|
page read and write
|
||
2106800C000
|
heap
|
page read and write
|
||
210680FA000
|
heap
|
page read and write
|
||
32FB1000
|
heap
|
page read and write
|
||
224F9350000
|
heap
|
page read and write
|
||
210680EC000
|
heap
|
page read and write
|
||
3A0E000
|
stack
|
page read and write
|
||
142DFFE000
|
stack
|
page read and write
|
||
21068650000
|
remote allocation
|
page read and write
|
||
12ECEC2B000
|
heap
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
32FB1000
|
heap
|
page read and write
|
||
21068730000
|
heap
|
page read and write
|
||
3ABB000
|
heap
|
page read and write
|
||
2CF05C00000
|
heap
|
page read and write
|
||
12ECEC32000
|
heap
|
page read and write
|
||
21287E92000
|
heap
|
page read and write
|
||
2106792A000
|
heap
|
page read and write
|
||
2106800C000
|
heap
|
page read and write
|
||
21067920000
|
heap
|
page read and write
|
||
142E2FE000
|
stack
|
page read and write
|
||
21067FBD000
|
heap
|
page read and write
|
||
34283000
|
trusted library allocation
|
page read and write
|
||
10000000
|
unkown
|
page readonly
|
||
21067FE0000
|
heap
|
page read and write
|
||
27494C49000
|
heap
|
page read and write
|
||
21068094000
|
heap
|
page read and write
|
||
21068045000
|
heap
|
page read and write
|
||
210680F1000
|
heap
|
page read and write
|
||
32FB1000
|
heap
|
page read and write
|
||
32FB1000
|
heap
|
page read and write
|
||
210677F0000
|
heap
|
page read and write
|
||
2106898A000
|
heap
|
page read and write
|
||
26D587D000
|
stack
|
page read and write
|
||
21068103000
|
heap
|
page read and write
|
||
12ECEC87000
|
heap
|
page read and write
|
||
21068702000
|
heap
|
page read and write
|
||
1C7BEA02000
|
heap
|
page read and write
|
||
1C7BE26D000
|
heap
|
page read and write
|
||
201D946C000
|
heap
|
page read and write
|
||
21067FB2000
|
heap
|
page read and write
|
||
32FB1000
|
heap
|
page read and write
|
||
21067FEA000
|
heap
|
page read and write
|
||
BBA000
|
heap
|
page read and write
|
||
210680F3000
|
heap
|
page read and write
|
||
201D9360000
|
heap
|
page read and write
|
||
224F932F000
|
heap
|
page read and write
|
||
32FB1000
|
heap
|
page read and write
|
||
21067FA0000
|
heap
|
page read and write
|
||
210680C6000
|
heap
|
page read and write
|
||
210680CD000
|
heap
|
page read and write
|
||
21067F64000
|
heap
|
page read and write
|
||
3ADC000
|
heap
|
page read and write
|
||
224F9362000
|
heap
|
page read and write
|
||
32FB1000
|
heap
|
page read and write
|
||
224F9393000
|
heap
|
page read and write
|
||
224F9376000
|
heap
|
page read and write
|
||
224F930F000
|
heap
|
page read and write
|
||
210677C4000
|
heap
|
page read and write
|
||
3AD9000
|
heap
|
page read and write
|
||
2106809F000
|
heap
|
page read and write
|
||
210680C7000
|
heap
|
page read and write
|
||
210677FA000
|
heap
|
page read and write
|
||
224F9329000
|
heap
|
page read and write
|
||
210680C4000
|
heap
|
page read and write
|
||
2CF0584A000
|
heap
|
page read and write
|
||
3A99000
|
heap
|
page read and write
|
||
224F932C000
|
heap
|
page read and write
|
||
32FB1000
|
heap
|
page read and write
|
||
21068104000
|
heap
|
page read and write
|
||
342A2000
|
trusted library allocation
|
page read and write
|
||
21068045000
|
heap
|
page read and write
|
||
1F6BC802000
|
trusted library allocation
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
224F9A39000
|
heap
|
page read and write
|
||
210680C3000
|
heap
|
page read and write
|
||
21067764000
|
heap
|
page read and write
|
||
12ECEC51000
|
heap
|
page read and write
|
||
F4A7CFE000
|
stack
|
page read and write
|
||
24268E30000
|
heap
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
12ECEC69000
|
heap
|
page read and write
|
||
21287D10000
|
heap
|
page read and write
|
||
27495615000
|
heap
|
page read and write
|
||
331AF000
|
stack
|
page read and write
|
||
24269113000
|
heap
|
page read and write
|
||
1C7BE25A000
|
heap
|
page read and write
|
||
210686CC000
|
heap
|
page read and write
|
||
32FB1000
|
heap
|
page read and write
|
||
210680F1000
|
heap
|
page read and write
|
||
36484000
|
trusted library allocation
|
page read and write
|
||
12ECEC5E000
|
heap
|
page read and write
|
||
21068730000
|
heap
|
page read and write
|
||
12ECEC5D000
|
heap
|
page read and write
|
||
21287E8C000
|
heap
|
page read and write
|
||
24269083000
|
heap
|
page read and write
|
||
210677FE000
|
heap
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
2CF05C13000
|
heap
|
page read and write
|
||
21067FA8000
|
heap
|
page read and write
|
||
3130000
|
direct allocation
|
page read and write
|
||
224F8913000
|
heap
|
page read and write
|
||
7B3000
|
unkown
|
page read and write
|
||
21068787000
|
heap
|
page read and write
|
||
33FF7000
|
trusted library allocation
|
page execute and read and write
|
||
21068091000
|
heap
|
page read and write
|
||
21067FFC000
|
heap
|
page read and write
|
||
21068097000
|
heap
|
page read and write
|
||
210680EE000
|
heap
|
page read and write
|
||
224F9300000
|
heap
|
page read and write
|
||
2106800C000
|
heap
|
page read and write
|
||
224F937C000
|
heap
|
page read and write
|
||
21068123000
|
heap
|
page read and write
|
||
12ECF602000
|
trusted library allocation
|
page read and write
|
||
21067FBD000
|
heap
|
page read and write
|
||
2426900B000
|
heap
|
page read and write
|
||
364D0000
|
trusted library allocation
|
page read and write
|
||
21068726000
|
heap
|
page read and write
|
||
224F9332000
|
heap
|
page read and write
|
||
224F9A85000
|
heap
|
page read and write
|
||
3428C000
|
trusted library allocation
|
page read and write
|
||
21067779000
|
heap
|
page read and write
|
||
224F932C000
|
heap
|
page read and write
|
||
21067710000
|
heap
|
page read and write
|
||
21067FD9000
|
heap
|
page read and write
|
||
224F930E000
|
heap
|
page read and write
|
||
224F889C000
|
heap
|
page read and write
|
||
12ECEC94000
|
heap
|
page read and write
|
||
364D0000
|
trusted library allocation
|
page read and write
|
||
224F88C5000
|
heap
|
page read and write
|
||
224F935B000
|
heap
|
page read and write
|
||
224F88B4000
|
heap
|
page read and write
|
||
32FB1000
|
heap
|
page read and write
|
||
224F9329000
|
heap
|
page read and write
|
||
21067FBD000
|
heap
|
page read and write
|
||
21068744000
|
heap
|
page read and write
|
||
21067F58000
|
heap
|
page read and write
|
||
210680E8000
|
heap
|
page read and write
|
||
2CF05D02000
|
heap
|
page read and write
|
||
7D0000
|
unkown
|
page readonly
|
||
364D0000
|
trusted library allocation
|
page read and write
|
||
2CF05D13000
|
heap
|
page read and write
|
||
32FB1000
|
heap
|
page read and write
|
||
210680CF000
|
heap
|
page read and write
|
||
224F88B6000
|
heap
|
page read and write
|
||
224F937D000
|
heap
|
page read and write
|
||
21287E73000
|
heap
|
page read and write
|
||
21068725000
|
heap
|
page read and write
|
||
21067929000
|
heap
|
page read and write
|
||
21068110000
|
heap
|
page read and write
|
||
36610000
|
heap
|
page read and write
|
||
21068730000
|
heap
|
page read and write
|
||
224F9332000
|
heap
|
page read and write
|
||
1F6BBE02000
|
heap
|
page read and write
|
||
210680C6000
|
heap
|
page read and write
|
||
2106811A000
|
heap
|
page read and write
|
||
84BF12B000
|
stack
|
page read and write
|
||
224F887C000
|
heap
|
page read and write
|
||
24269102000
|
heap
|
page read and write
|
||
341C0000
|
trusted library allocation
|
page read and write
|
||
32FB1000
|
heap
|
page read and write
|
||
224F888B000
|
heap
|
page read and write
|
||
12ECEC5A000
|
heap
|
page read and write
|
||
1C7BE2B2000
|
heap
|
page read and write
|
||
201D9454000
|
heap
|
page read and write
|
||
224F88AF000
|
heap
|
page read and write
|
||
224F9329000
|
heap
|
page read and write
|
||
2CF05D00000
|
heap
|
page read and write
|
||
224F935C000
|
heap
|
page read and write
|
||
21068093000
|
heap
|
page read and write
|
||
2CF05C02000
|
heap
|
page read and write
|
||
2106877A000
|
heap
|
page read and write
|
||
1D0000
|
unclassified section
|
page readonly
|
||
224F937F000
|
heap
|
page read and write
|
||
1F6BBE2A000
|
heap
|
page read and write
|
||
36540000
|
trusted library allocation
|
page read and write
|
||
26D557F000
|
stack
|
page read and write
|
||
21068144000
|
heap
|
page read and write
|
||
210677FE000
|
heap
|
page read and write
|
||
21067F95000
|
heap
|
page read and write
|
||
224F932F000
|
heap
|
page read and write
|
||
210680ED000
|
heap
|
page read and write
|
||
341CB000
|
trusted library allocation
|
page read and write
|
||
2CF05824000
|
unkown
|
page read and write
|
||
2106800C000
|
heap
|
page read and write
|
||
21067779000
|
heap
|
page read and write
|
||
224F937D000
|
heap
|
page read and write
|
||
210680A5000
|
heap
|
page read and write
|
||
32FB1000
|
heap
|
page read and write
|
||
98000
|
stack
|
page read and write
|
||
3810000
|
heap
|
page read and write
|
||
21067F5B000
|
heap
|
page read and write
|
||
224F9365000
|
heap
|
page read and write
|
||
224F9A9E000
|
heap
|
page read and write
|
||
2106808D000
|
heap
|
page read and write
|
||
21068743000
|
heap
|
page read and write
|
||
487CEFD000
|
stack
|
page read and write
|
||
224F8888000
|
heap
|
page read and write
|
||
2106809B000
|
heap
|
page read and write
|
||
DA8ABFB000
|
stack
|
page read and write
|
||
21068712000
|
heap
|
page read and write
|
||
24269098000
|
heap
|
page read and write
|
||
224F9393000
|
heap
|
page read and write
|
||
224F9130000
|
remote allocation
|
page read and write
|
||
210677C4000
|
heap
|
page read and write
|
||
224F893D000
|
heap
|
page read and write
|
||
224F889A000
|
heap
|
page read and write
|
||
21287EA5000
|
heap
|
page read and write
|
||
224F9340000
|
heap
|
page read and write
|
||
3960000
|
heap
|
page read and write
|
||
3AEA000
|
heap
|
page read and write
|
||
3AC6000
|
heap
|
page read and write
|
||
33C9E000
|
stack
|
page read and write
|
||
21067FDB000
|
heap
|
page read and write
|
||
37D0000
|
heap
|
page read and write
|
||
21067F97000
|
heap
|
page read and write
|
||
224F935B000
|
heap
|
page read and write
|
||
21068080000
|
heap
|
page read and write
|
||
21067FD2000
|
heap
|
page read and write
|
||
210680AD000
|
heap
|
page read and write
|
||
21068045000
|
heap
|
page read and write
|
||
21067766000
|
heap
|
page read and write
|
||
364D0000
|
trusted library allocation
|
page read and write
|
||
33D3E000
|
stack
|
page read and write
|
||
2106811F000
|
heap
|
page read and write
|
||
27494C40000
|
heap
|
page read and write
|
||
210680E6000
|
heap
|
page read and write
|
||
32FB1000
|
heap
|
page read and write
|
||
21068144000
|
heap
|
page read and write
|
||
21287E40000
|
heap
|
page read and write
|
||
210686B7000
|
heap
|
page read and write
|
||
21287E9A000
|
heap
|
page read and write
|
||
1C7BE293000
|
heap
|
page read and write
|
||
210680B1000
|
heap
|
page read and write
|
||
224F893D000
|
heap
|
page read and write
|
||
224F9396000
|
heap
|
page read and write
|
||
3AD9000
|
heap
|
page read and write
|
||
2CF05902000
|
trusted library allocation
|
page read and write
|
||
210686FE000
|
heap
|
page read and write
|
||
210680B8000
|
heap
|
page read and write
|
||
210680A8000
|
heap
|
page read and write
|
||
21068144000
|
heap
|
page read and write
|
||
2106813F000
|
heap
|
page read and write
|
||
210687BC000
|
heap
|
page read and write
|
||
24269041000
|
heap
|
page read and write
|
||
3A8E000
|
heap
|
page read and write
|
||
21067FA8000
|
heap
|
page read and write
|
||
210680F1000
|
heap
|
page read and write
|
||
25F0000
|
heap
|
page read and write
|
||
3378E000
|
stack
|
page read and write
|
||
21068787000
|
heap
|
page read and write
|
||
2106774B000
|
heap
|
page read and write
|
||
21067F66000
|
heap
|
page read and write
|
||
224F9355000
|
heap
|
page read and write
|
||
224F8840000
|
heap
|
page read and write
|
||
27494C82000
|
heap
|
page read and write
|
||
3A90000
|
heap
|
page read and write
|
||
2106813B000
|
heap
|
page read and write
|
||
21288802000
|
trusted library allocation
|
page read and write
|
||
21067FCD000
|
heap
|
page read and write
|
||
10059000
|
trusted library allocation
|
page read and write
|
||
210680EC000
|
heap
|
page read and write
|
||
32FB1000
|
heap
|
page read and write
|
||
12ECEC5C000
|
heap
|
page read and write
|
||
21287DC0000
|
heap
|
page read and write
|
||
21067F96000
|
heap
|
page read and write
|
||
210680A8000
|
heap
|
page read and write
|
||
21067FB8000
|
heap
|
page read and write
|
||
21067765000
|
heap
|
page read and write
|
||
224F9A0C000
|
heap
|
page read and write
|
||
21068097000
|
heap
|
page read and write
|
||
21067FC1000
|
heap
|
page read and write
|
||
224F86F0000
|
heap
|
page read and write
|
||
224F9AB3000
|
heap
|
page read and write
|
||
21068787000
|
heap
|
page read and write
|
||
27495602000
|
heap
|
page read and write
|
||
12ECEC13000
|
heap
|
page read and write
|
||
21068787000
|
heap
|
page read and write
|
||
36530000
|
trusted library allocation
|
page read and write
|
||
201D947D000
|
heap
|
page read and write
|
||
1C7BE1B0000
|
heap
|
page read and write
|
||
210680E8000
|
heap
|
page read and write
|
||
210680E6000
|
heap
|
page read and write
|
||
210680AB000
|
heap
|
page read and write
|
||
2CF0587C000
|
heap
|
page read and write
|
||
224F9A12000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
33A00000
|
trusted library allocation
|
page read and write
|
||
3ABB000
|
heap
|
page read and write
|
||
2106813C000
|
heap
|
page read and write
|
||
2106875D000
|
heap
|
page read and write
|
||
224F9215000
|
heap
|
page read and write
|
||
1C7BE240000
|
heap
|
page read and write
|
||
210680F1000
|
heap
|
page read and write
|
||
210680F3000
|
heap
|
page read and write
|
||
21067FBD000
|
heap
|
page read and write
|
||
21068920000
|
heap
|
page read and write
|
||
32FB1000
|
heap
|
page read and write
|
||
2106892C000
|
heap
|
page read and write
|
||
201D9449000
|
heap
|
page read and write
|
||
32FB1000
|
heap
|
page read and write
|
||
27494C6E000
|
heap
|
page read and write
|
||
2CF05900000
|
trusted library allocation
|
page read and write
|
||
3AB2000
|
heap
|
page read and write
|
||
33D00000
|
remote allocation
|
page read and write
|
||
77C000
|
unkown
|
page read and write
|
||
224F8813000
|
heap
|
page read and write
|
||
224F932D000
|
heap
|
page read and write
|
||
21068730000
|
heap
|
page read and write
|
||
DA8A979000
|
stack
|
page read and write
|
||
2106897B000
|
heap
|
page read and write
|
||
3AA1000
|
heap
|
page read and write
|
||
21068144000
|
heap
|
page read and write
|
||
21067F55000
|
heap
|
page read and write
|
||
210680A4000
|
heap
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
1F6BBE00000
|
heap
|
page read and write
|
||
2106813B000
|
heap
|
page read and write
|
||
21068094000
|
heap
|
page read and write
|
||
12ECEBA0000
|
unclassified section
|
page readonly
|
||
364C0000
|
trusted library allocation
|
page read and write
|
||
210680B1000
|
heap
|
page read and write
|
||
12ECEC4A000
|
heap
|
page read and write
|
||
34180000
|
heap
|
page execute and read and write
|
||
21068650000
|
remote allocation
|
page read and write
|
||
2CF05940000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
224F937A000
|
heap
|
page read and write
|
||
21068680000
|
heap
|
page read and write
|
||
21068045000
|
heap
|
page read and write
|
||
1F6BBE59000
|
heap
|
page read and write
|
||
210680AC000
|
heap
|
page read and write
|
||
364D0000
|
trusted library allocation
|
page read and write
|
||
12ECEC9D000
|
heap
|
page read and write
|
||
3AC0000
|
heap
|
page read and write
|
||
32FB1000
|
heap
|
page read and write
|
||
1C7BE292000
|
heap
|
page read and write
|
||
2106815C000
|
heap
|
page read and write
|
||
210677C4000
|
heap
|
page read and write
|
||
21068104000
|
heap
|
page read and write
|
||
2106780E000
|
heap
|
page read and write
|
||
3A59000
|
heap
|
page read and write
|
||
224F9332000
|
heap
|
page read and write
|
||
7A4000
|
unkown
|
page read and write
|
||
21067779000
|
heap
|
page read and write
|
||
A8CC78B000
|
stack
|
page read and write
|
||
210680B1000
|
heap
|
page read and write
|
||
142E1FF000
|
stack
|
page read and write
|
||
12ECEAF0000
|
heap
|
page read and write
|
||
24269075000
|
heap
|
page read and write
|
||
1C7BE228000
|
heap
|
page read and write
|
||
B50000
|
heap
|
page read and write
|
||
21068705000
|
heap
|
page read and write
|
||
C09677E000
|
stack
|
page read and write
|
||
341B6000
|
trusted library allocation
|
page read and write
|
||
21068138000
|
heap
|
page read and write
|
||
34291000
|
trusted library allocation
|
page read and write
|
||
A8CCAFD000
|
stack
|
page read and write
|
||
33FB0000
|
trusted library allocation
|
page read and write
|
||
21067FA0000
|
heap
|
page read and write
|
||
21068690000
|
heap
|
page read and write
|
||
1F6BBE13000
|
heap
|
page read and write
|
||
224F9329000
|
heap
|
page read and write
|
||
21068093000
|
heap
|
page read and write
|
||
224F932F000
|
heap
|
page read and write
|
||
12ECEC00000
|
heap
|
page read and write
|
||
210680A8000
|
heap
|
page read and write
|
||
364D0000
|
trusted library allocation
|
page read and write
|
||
21068094000
|
heap
|
page read and write
|
||
3AFF000
|
heap
|
page read and write
|
||
2106875A000
|
heap
|
page read and write
|
||
210680C3000
|
heap
|
page read and write
|
||
3A90000
|
heap
|
page read and write
|
||
A8CCD78000
|
stack
|
page read and write
|
||
21068045000
|
heap
|
page read and write
|
||
364D0000
|
trusted library allocation
|
page read and write
|
||
364D0000
|
trusted library allocation
|
page read and write
|
||
33F87000
|
stack
|
page read and write
|
||
21068764000
|
heap
|
page read and write
|
||
2106811A000
|
heap
|
page read and write
|
||
210677FE000
|
heap
|
page read and write
|
||
224F9374000
|
heap
|
page read and write
|
||
210686FE000
|
heap
|
page read and write
|
||
21068144000
|
heap
|
page read and write
|
||
21067929000
|
heap
|
page read and write
|
||
210686FE000
|
heap
|
page read and write
|
||
224F9376000
|
heap
|
page read and write
|
||
32FCD000
|
heap
|
page read and write
|
||
224F893D000
|
heap
|
page read and write
|
||
210677F5000
|
heap
|
page read and write
|
||
210680B1000
|
heap
|
page read and write
|
||
1F6BBE6E000
|
heap
|
page read and write
|
||
242690A3000
|
heap
|
page read and write
|
||
210677E3000
|
heap
|
page read and write
|
||
210677F7000
|
heap
|
page read and write
|
||
2CF05802000
|
unkown
|
page read and write
|
||
3AEE000
|
heap
|
page read and write
|
||
C09687E000
|
stack
|
page read and write
|
||
21068712000
|
heap
|
page read and write
|
||
224F9341000
|
heap
|
page read and write
|
||
21068764000
|
heap
|
page read and write
|
||
2106815D000
|
heap
|
page read and write
|
||
210687AC000
|
heap
|
page read and write
|
||
3A87000
|
heap
|
page read and write
|
||
21067FFC000
|
heap
|
page read and write
|
||
224F891C000
|
heap
|
page read and write
|
||
487C5DF000
|
stack
|
page read and write
|
||
201D941A000
|
heap
|
page read and write
|
||
339CC000
|
stack
|
page read and write
|
||
210680F3000
|
heap
|
page read and write
|
||
21068743000
|
heap
|
page read and write
|
||
224F9340000
|
heap
|
page read and write
|
||
21067FD9000
|
heap
|
page read and write
|
||
210680E8000
|
heap
|
page read and write
|
||
201D944F000
|
heap
|
page read and write
|
||
224F8896000
|
heap
|
page read and write
|
||
21067FE9000
|
heap
|
page read and write
|
||
53F9000
|
trusted library allocation
|
page read and write
|
||
21067600000
|
heap
|
page read and write
|
||
201D9486000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
224F937F000
|
heap
|
page read and write
|
||
21067FC1000
|
heap
|
page read and write
|
||
201D942A000
|
heap
|
page read and write
|
||
3AB1000
|
heap
|
page read and write
|
||
21068969000
|
heap
|
page read and write
|
||
210680ED000
|
heap
|
page read and write
|
||
364E0000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
21068123000
|
heap
|
page read and write
|
||
395E000
|
stack
|
page read and write
|
||
21287E86000
|
heap
|
page read and write
|
||
210686FE000
|
heap
|
page read and write
|
||
36730000
|
heap
|
page execute and read and write
|
||
2106815C000
|
heap
|
page read and write
|
||
21068963000
|
heap
|
page read and write
|
||
201D9440000
|
heap
|
page read and write
|
||
224F937C000
|
heap
|
page read and write
|
||
2106809E000
|
heap
|
page read and write
|
||
224F8879000
|
heap
|
page read and write
|
||
1C7BE282000
|
heap
|
page read and write
|
||
21288680000
|
trusted library allocation
|
page read and write
|
||
224F9329000
|
heap
|
page read and write
|
||
2106792D000
|
heap
|
page read and write
|
||
224F9396000
|
heap
|
page read and write
|
||
24269129000
|
heap
|
page read and write
|
||
210677FE000
|
heap
|
page read and write
|
||
2CF05760000
|
trusted library allocation
|
page read and write
|
||
210680F3000
|
heap
|
page read and write
|
||
2106792D000
|
heap
|
page read and write
|
||
32FB1000
|
heap
|
page read and write
|
||
224F932B000
|
heap
|
page read and write
|
||
3A10000
|
heap
|
page read and write
|
||
210680A5000
|
heap
|
page read and write
|
||
224F930F000
|
heap
|
page read and write
|
||
27494AE0000
|
heap
|
page read and write
|
||
2106775A000
|
heap
|
page read and write
|
||
224F9370000
|
heap
|
page read and write
|
||
32FB1000
|
heap
|
page read and write
|
||
32FB1000
|
heap
|
page read and write
|
||
2106813A000
|
heap
|
page read and write
|
||
21067764000
|
heap
|
page read and write
|
||
210680F0000
|
heap
|
page read and write
|
||
21068967000
|
heap
|
page read and write
|
||
224F893C000
|
heap
|
page read and write
|
||
33FCD000
|
trusted library allocation
|
page execute and read and write
|
||
21068688000
|
heap
|
page read and write
|
||
C09697A000
|
stack
|
page read and write
|
||
21068045000
|
heap
|
page read and write
|
||
224F937C000
|
heap
|
page read and write
|
||
DA8A49B000
|
stack
|
page read and write
|
||
2106811A000
|
heap
|
page read and write
|
||
12ECEC58000
|
heap
|
page read and write
|
||
21067FE9000
|
heap
|
page read and write
|
||
210687C5000
|
heap
|
page read and write
|
||
12ECEC4F000
|
heap
|
page read and write
|
||
224F9A9E000
|
heap
|
page read and write
|
||
21067925000
|
heap
|
page read and write
|
||
224F932C000
|
heap
|
page read and write
|
||
33FE6000
|
trusted library allocation
|
page execute and read and write
|
||
2106811D000
|
heap
|
page read and write
|
||
224F935C000
|
heap
|
page read and write
|
||
210689B3000
|
heap
|
page read and write
|
||
1C7BE271000
|
heap
|
page read and write
|
||
21068115000
|
heap
|
page read and write
|
||
210680BF000
|
heap
|
page read and write
|
||
21068098000
|
heap
|
page read and write
|
||
210677C4000
|
heap
|
page read and write
|
||
2106813B000
|
heap
|
page read and write
|
||
210680A4000
|
heap
|
page read and write
|
||
2106897B000
|
heap
|
page read and write
|
||
21067765000
|
heap
|
page read and write
|
||
3428E000
|
trusted library allocation
|
page read and write
|
||
224F9381000
|
heap
|
page read and write
|
||
3403E000
|
stack
|
page read and write
|
||
1C7BE2AC000
|
heap
|
page read and write
|
||
210680DA000
|
heap
|
page read and write
|
||
210680D4000
|
heap
|
page read and write
|
||
364D0000
|
trusted library allocation
|
page read and write
|
||
224F88A7000
|
heap
|
page read and write
|
||
210680C2000
|
heap
|
page read and write
|
||
36530000
|
trusted library allocation
|
page read and write
|
||
3ACB000
|
heap
|
page read and write
|
||
224F9378000
|
heap
|
page read and write
|
||
21067FFC000
|
heap
|
page read and write
|
||
2106780E000
|
heap
|
page read and write
|
||
210686B7000
|
heap
|
page read and write
|
||
224F9386000
|
heap
|
page read and write
|
||
26D577E000
|
stack
|
page read and write
|
||
224F933B000
|
heap
|
page read and write
|
||
21068743000
|
heap
|
page read and write
|
||
84BF1AF000
|
stack
|
page read and write
|
||
224F9329000
|
heap
|
page read and write
|
||
30F0000
|
direct allocation
|
page read and write
|
||
26AE000
|
stack
|
page read and write
|
||
21068103000
|
heap
|
page read and write
|
||
21068104000
|
heap
|
page read and write
|
||
224F9390000
|
heap
|
page read and write
|
||
210680DB000
|
heap
|
page read and write
|
||
24269117000
|
heap
|
page read and write
|
||
224F9386000
|
heap
|
page read and write
|
||
210686F1000
|
heap
|
page read and write
|
||
224F9130000
|
remote allocation
|
page read and write
|
||
2106811D000
|
heap
|
page read and write
|
||
224F88BC000
|
heap
|
page read and write
|
||
224F9A8D000
|
heap
|
page read and write
|
||
224F937C000
|
heap
|
page read and write
|
||
210680B0000
|
heap
|
page read and write
|
||
364D0000
|
trusted library allocation
|
page read and write
|
||
32FB1000
|
heap
|
page read and write
|
||
224F9396000
|
heap
|
page read and write
|
||
3364E000
|
stack
|
page read and write
|
||
3A97000
|
heap
|
page read and write
|
||
21067779000
|
heap
|
page read and write
|
||
33FC4000
|
trusted library allocation
|
page read and write
|
||
1C7BE289000
|
heap
|
page read and write
|
||
210680CF000
|
heap
|
page read and write
|
||
210686FE000
|
heap
|
page read and write
|
||
21287E9E000
|
heap
|
page read and write
|
||
224F88B8000
|
heap
|
page read and write
|
||
33E8B000
|
stack
|
page read and write
|
||
32FB1000
|
heap
|
page read and write
|
||
26D547E000
|
stack
|
page read and write
|
||
21068120000
|
heap
|
page read and write
|
||
21068712000
|
heap
|
page read and write
|
||
210677DB000
|
heap
|
page read and write
|
||
364C0000
|
trusted library allocation
|
page read and write
|
||
10005000
|
unkown
|
page readonly
|
||
24269000000
|
heap
|
page read and write
|
||
21067FD9000
|
heap
|
page read and write
|
||
210680B7000
|
heap
|
page read and write
|
||
210680F1000
|
heap
|
page read and write
|
||
21068081000
|
heap
|
page read and write
|
||
2106811F000
|
heap
|
page read and write
|
||
12ECEC6A000
|
heap
|
page read and write
|
||
210686B0000
|
heap
|
page read and write
|
||
364D0000
|
trusted library allocation
|
page read and write
|
||
21068650000
|
remote allocation
|
page read and write
|
||
224F9393000
|
heap
|
page read and write
|
||
32FB1000
|
heap
|
page read and write
|
||
570D8FE000
|
stack
|
page read and write
|
||
21068712000
|
heap
|
page read and write
|
||
21067FD5000
|
heap
|
page read and write
|
||
21287D70000
|
heap
|
page read and write
|
||
2106811F000
|
heap
|
page read and write
|
||
1F6BC680000
|
trusted library allocation
|
page read and write
|
||
21068982000
|
heap
|
page read and write
|
||
21068092000
|
heap
|
page read and write
|
||
21067FE0000
|
heap
|
page read and write
|
||
224F936D000
|
heap
|
page read and write
|
||
210677C4000
|
heap
|
page read and write
|
||
21067F50000
|
heap
|
page read and write
|
||
12ECEC60000
|
heap
|
page read and write
|
||
1B30000
|
remote allocation
|
page execute and read and write
|
||
B84000
|
heap
|
page read and write
|
||
364D0000
|
trusted library allocation
|
page read and write
|
||
201D9350000
|
unclassified section
|
page readonly
|
||
27494C13000
|
heap
|
page read and write
|
||
21068112000
|
heap
|
page read and write
|
||
21068123000
|
heap
|
page read and write
|
||
2CF05D13000
|
heap
|
page read and write
|
||
210677FE000
|
heap
|
page read and write
|
||
201D9310000
|
heap
|
page read and write
|
||
1C7BEA15000
|
heap
|
page read and write
|
||
7A6000
|
unkown
|
page read and write
|
||
32FB1000
|
heap
|
page read and write
|
||
210680E8000
|
heap
|
page read and write
|
||
338CD000
|
stack
|
page read and write
|
||
210680ED000
|
heap
|
page read and write
|
||
12ECEC98000
|
heap
|
page read and write
|
||
224F9396000
|
heap
|
page read and write
|
||
26D53FF000
|
stack
|
page read and write
|
||
21068134000
|
heap
|
page read and write
|
||
21068755000
|
heap
|
page read and write
|
||
224F9332000
|
heap
|
page read and write
|
||
224F9329000
|
heap
|
page read and write
|
||
210686D5000
|
heap
|
page read and write
|
||
21068754000
|
heap
|
page read and write
|
||
224F8876000
|
heap
|
page read and write
|
||
36530000
|
trusted library allocation
|
page read and write
|
||
2106875A000
|
heap
|
page read and write
|
||
3A9D000
|
heap
|
page read and write
|
||
21068758000
|
heap
|
page read and write
|
||
210686CB000
|
heap
|
page read and write
|
||
364C0000
|
trusted library allocation
|
page read and write
|
||
32FB1000
|
heap
|
page read and write
|
||
224F9386000
|
heap
|
page read and write
|
||
21067779000
|
heap
|
page read and write
|
||
210680A5000
|
heap
|
page read and write
|
||
201D9413000
|
heap
|
page read and write
|
||
10020000
|
trusted library allocation
|
page read and write
|
||
21068709000
|
heap
|
page read and write
|
||
12ECEC55000
|
heap
|
page read and write
|
||
32FB1000
|
heap
|
page read and write
|
||
210680C7000
|
heap
|
page read and write
|
||
21068123000
|
heap
|
page read and write
|
||
32FB1000
|
heap
|
page read and write
|
||
210680AC000
|
heap
|
page read and write
|
||
224F9A70000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1F6BBE6A000
|
heap
|
page read and write
|
||
224F893D000
|
heap
|
page read and write
|
||
24268FE0000
|
trusted library allocation
|
page read and write
|
||
21067FB2000
|
heap
|
page read and write
|
||
224F9378000
|
heap
|
page read and write
|
||
21068134000
|
heap
|
page read and write
|
||
2106809B000
|
heap
|
page read and write
|
||
21067764000
|
heap
|
page read and write
|
||
21068045000
|
heap
|
page read and write
|
||
26D567B000
|
stack
|
page read and write
|
||
1C7BE302000
|
heap
|
page read and write
|
||
210680A2000
|
heap
|
page read and write
|
||
12ECEB60000
|
heap
|
page read and write
|
||
224F9AA7000
|
heap
|
page read and write
|
||
ABBCE7C000
|
stack
|
page read and write
|
||
224F9329000
|
heap
|
page read and write
|
||
210680A8000
|
heap
|
page read and write
|
||
ABBD47B000
|
stack
|
page read and write
|
||
2106875D000
|
heap
|
page read and write
|
||
21068139000
|
heap
|
page read and write
|
||
210677FA000
|
heap
|
page read and write
|
||
21068963000
|
heap
|
page read and write
|
||
32FB1000
|
heap
|
page read and write
|
||
21067FC3000
|
heap
|
page read and write
|
||
12ECEC29000
|
heap
|
page read and write
|
||
224F9350000
|
heap
|
page read and write
|
||
224F887E000
|
heap
|
page read and write
|
||
53B0000
|
trusted library allocation
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
210687AC000
|
heap
|
page read and write
|
||
3AAA000
|
heap
|
page read and write
|
||
21067809000
|
heap
|
page read and write
|
||
C0961AC000
|
stack
|
page read and write
|
||
786000
|
unkown
|
page read and write
|
||
32FB1000
|
heap
|
page read and write
|
||
24269013000
|
heap
|
page read and write
|
||
2106800C000
|
heap
|
page read and write
|
||
32FB1000
|
heap
|
page read and write
|
||
210686B4000
|
heap
|
page read and write
|
||
364D0000
|
trusted library allocation
|
page read and write
|
||
201D92B0000
|
heap
|
page read and write
|
||
210677C4000
|
heap
|
page read and write
|
||
21068110000
|
heap
|
page read and write
|
||
210677FE000
|
heap
|
page read and write
|
||
487CAFD000
|
stack
|
page read and write
|
||
210680EF000
|
heap
|
page read and write
|
||
224F9376000
|
heap
|
page read and write
|
||
210687A0000
|
heap
|
page read and write
|
||
224F9A7F000
|
heap
|
page read and write
|
||
84BF8FC000
|
stack
|
page read and write
|
||
21068045000
|
heap
|
page read and write
|
||
21067FCE000
|
heap
|
page read and write
|
||
21068097000
|
heap
|
page read and write
|
||
2106811A000
|
heap
|
page read and write
|
||
782000
|
unkown
|
page read and write
|
||
21067930000
|
heap
|
page read and write
|
||
210686CB000
|
heap
|
page read and write
|
||
84BF6FF000
|
stack
|
page read and write
|
||
224F9396000
|
heap
|
page read and write
|
||
210680D4000
|
heap
|
page read and write
|
||
1C7BE26E000
|
heap
|
page read and write
|
||
21068144000
|
heap
|
page read and write
|
||
224F9376000
|
heap
|
page read and write
|
||
2106813C000
|
heap
|
page read and write
|
||
363C6000
|
heap
|
page read and write
|
||
33FF2000
|
trusted library allocation
|
page read and write
|
||
E20000
|
heap
|
page read and write
|
||
364E0000
|
trusted library allocation
|
page read and write
|
||
2426908C000
|
heap
|
page read and write
|
||
3ADF000
|
heap
|
page read and write
|
||
224F9376000
|
heap
|
page read and write
|
||
2106809A000
|
heap
|
page read and write
|
||
21067800000
|
heap
|
page read and write
|
||
21287E82000
|
heap
|
page read and write
|
||
2106870B000
|
heap
|
page read and write
|
||
364D6000
|
trusted library allocation
|
page read and write
|
||
224F9381000
|
heap
|
page read and write
|
||
224F9329000
|
heap
|
page read and write
|
||
21068120000
|
heap
|
page read and write
|
||
224F9376000
|
heap
|
page read and write
|
||
32FB1000
|
heap
|
page read and write
|
||
21068094000
|
heap
|
page read and write
|
||
2CF05D00000
|
heap
|
page read and write
|
||
224F932C000
|
heap
|
page read and write
|
||
32FB1000
|
heap
|
page read and write
|
||
21067764000
|
heap
|
page read and write
|
||
5420000
|
direct allocation
|
page execute and read and write
|
||
7AB000
|
unkown
|
page read and write
|
||
210680F1000
|
heap
|
page read and write
|
||
32FB1000
|
heap
|
page read and write
|
||
210676F0000
|
trusted library allocation
|
page read and write
|
||
7CE000
|
unkown
|
page read and write
|
||
351E1000
|
trusted library allocation
|
page read and write
|
||
21067FD9000
|
heap
|
page read and write
|
||
84BFD7F000
|
stack
|
page read and write
|
||
224F9350000
|
heap
|
page read and write
|
||
210680B2000
|
heap
|
page read and write
|
||
210680D7000
|
heap
|
page read and write
|
||
1C7BE298000
|
heap
|
page read and write
|
||
32FB1000
|
heap
|
page read and write
|
||
33B9E000
|
stack
|
page read and write
|
||
2106875D000
|
heap
|
page read and write
|
||
1F6BBE71000
|
heap
|
page read and write
|
||
210680F1000
|
heap
|
page read and write
|
||
B8C000
|
heap
|
page read and write
|
||
210680E6000
|
heap
|
page read and write
|
||
4A20000
|
direct allocation
|
page execute and read and write
|
||
21067F67000
|
heap
|
page read and write
|
||
224F9340000
|
heap
|
page read and write
|
||
21068098000
|
heap
|
page read and write
|
||
3ADC000
|
heap
|
page read and write
|
||
364B5000
|
trusted library allocation
|
page read and write
|
||
21067765000
|
heap
|
page read and write
|
||
21068045000
|
heap
|
page read and write
|
||
3AA9000
|
heap
|
page read and write
|
||
21287E95000
|
heap
|
page read and write
|
||
32FB1000
|
heap
|
page read and write
|
||
224F9378000
|
heap
|
page read and write
|
||
210680A8000
|
heap
|
page read and write
|
||
1F6BBE41000
|
heap
|
page read and write
|
||
224F885F000
|
heap
|
page read and write
|
||
21068085000
|
heap
|
page read and write
|
||
32FB1000
|
heap
|
page read and write
|
||
12ECF470000
|
trusted library allocation
|
page read and write
|
||
210680C3000
|
heap
|
page read and write
|
||
21067FA0000
|
heap
|
page read and write
|
||
12ECEC42000
|
heap
|
page read and write
|
||
210686A8000
|
heap
|
page read and write
|
||
32FB1000
|
heap
|
page read and write
|
||
21067717000
|
heap
|
page read and write
|
||
21068094000
|
heap
|
page read and write
|
||
12ECEC61000
|
heap
|
page read and write
|
||
21068712000
|
heap
|
page read and write
|
||
32FB1000
|
heap
|
page read and write
|
||
21067F75000
|
heap
|
page read and write
|
||
224F9200000
|
heap
|
page read and write
|
||
210680B1000
|
heap
|
page read and write
|
||
2106774B000
|
heap
|
page read and write
|
||
224F937F000
|
heap
|
page read and write
|
||
224F930E000
|
heap
|
page read and write
|
||
210680E7000
|
heap
|
page read and write
|
||
210677DB000
|
heap
|
page read and write
|
||
224F888F000
|
heap
|
page read and write
|
||
224F9396000
|
heap
|
page read and write
|
||
210680CD000
|
heap
|
page read and write
|
||
210680C6000
|
heap
|
page read and write
|
||
33A4E000
|
stack
|
page read and write
|
||
210680B2000
|
heap
|
page read and write
|
||
B93000
|
heap
|
page read and write
|
||
33D00000
|
remote allocation
|
page read and write
|
||
364C0000
|
trusted library allocation
|
page read and write
|
||
210680A4000
|
heap
|
page read and write
|
||
210677FF000
|
heap
|
page read and write
|
||
2CAF000
|
stack
|
page read and write
|
||
21068104000
|
heap
|
page read and write
|
||
34190000
|
trusted library allocation
|
page execute and read and write
|
||
210680AD000
|
heap
|
page read and write
|
||
224F9388000
|
heap
|
page read and write
|
||
210686AF000
|
heap
|
page read and write
|
||
21067FB2000
|
heap
|
page read and write
|
||
2F5D000
|
stack
|
page read and write
|
||
2426904C000
|
heap
|
page read and write
|
||
210677C4000
|
heap
|
page read and write
|
||
224F9356000
|
heap
|
page read and write
|
||
210680AE000
|
heap
|
page read and write
|
||
21068110000
|
heap
|
page read and write
|
||
224F937C000
|
heap
|
page read and write
|
||
21068082000
|
heap
|
page read and write
|
||
27494C2A000
|
heap
|
page read and write
|
||
ABBCFFF000
|
stack
|
page read and write
|
||
201D9421000
|
heap
|
page read and write
|
||
33FD0000
|
trusted library allocation
|
page read and write
|
||
210680B0000
|
heap
|
page read and write
|
||
BB1000
|
heap
|
page read and write
|
||
224F937F000
|
heap
|
page read and write
|
||
210677FE000
|
heap
|
page read and write
|
||
1C7BE282000
|
heap
|
page read and write
|
||
210677C4000
|
heap
|
page read and write
|
||
32FB1000
|
heap
|
page read and write
|
||
21287E56000
|
heap
|
page read and write
|
||
487CF7F000
|
stack
|
page read and write
|
||
21287E2B000
|
heap
|
page read and write
|
||
1C7BE090000
|
heap
|
page read and write
|
||
32FB1000
|
heap
|
page read and write
|
||
21068045000
|
heap
|
page read and write
|
||
21067809000
|
heap
|
page read and write
|
||
224F935E000
|
heap
|
page read and write
|
||
1C7BE313000
|
heap
|
page read and write
|
||
BA5000
|
heap
|
page read and write
|
||
2F30000
|
remote allocation
|
page execute and read and write
|
||
12ECEC6E000
|
heap
|
page read and write
|
||
21067F59000
|
heap
|
page read and write
|
||
224F9330000
|
heap
|
page read and write
|
||
21287E3B000
|
heap
|
page read and write
|
||
21068094000
|
heap
|
page read and write
|
||
32FB1000
|
heap
|
page read and write
|
||
210680A8000
|
heap
|
page read and write
|
||
224F8897000
|
heap
|
page read and write
|
||
224F9396000
|
heap
|
page read and write
|
||
224F9385000
|
heap
|
page read and write
|
||
27494D02000
|
heap
|
page read and write
|
||
210680B1000
|
heap
|
page read and write
|
||
210680B0000
|
heap
|
page read and write
|
||
210680DA000
|
heap
|
page read and write
|
||
7D0000
|
unkown
|
page readonly
|
||
21068097000
|
heap
|
page read and write
|
||
21068119000
|
heap
|
page read and write
|
||
21068144000
|
heap
|
page read and write
|
||
21067FC4000
|
heap
|
page read and write
|
||
224F936B000
|
heap
|
page read and write
|
||
33FF0000
|
trusted library allocation
|
page read and write
|
||
27494C26000
|
heap
|
page read and write
|
||
224F9329000
|
heap
|
page read and write
|
||
27494E00000
|
heap
|
page read and write
|
||
21068754000
|
heap
|
page read and write
|
||
27494BF0000
|
unclassified section
|
page readonly
|
||
224F9393000
|
heap
|
page read and write
|
||
21067779000
|
heap
|
page read and write
|
||
364D0000
|
trusted library allocation
|
page read and write
|
||
21067F82000
|
heap
|
page read and write
|
||
224F9351000
|
heap
|
page read and write
|
||
341D0000
|
heap
|
page read and write
|
||
32FB1000
|
heap
|
page read and write
|
||
210680BC000
|
heap
|
page read and write
|
||
224F9332000
|
heap
|
page read and write
|
||
2106811D000
|
heap
|
page read and write
|
||
32FB1000
|
heap
|
page read and write
|
||
35209000
|
trusted library allocation
|
page read and write
|
||
32FB1000
|
heap
|
page read and write
|
||
21067779000
|
heap
|
page read and write
|
||
210677DB000
|
heap
|
page read and write
|
||
7E9000
|
unkown
|
page readonly
|
||
21068102000
|
heap
|
page read and write
|
||
27495600000
|
heap
|
page read and write
|
||
ABBD279000
|
stack
|
page read and write
|
||
21068017000
|
heap
|
page read and write
|
||
210677F1000
|
heap
|
page read and write
|
||
210687A0000
|
heap
|
page read and write
|
||
210680D7000
|
heap
|
page read and write
|
||
210680F1000
|
heap
|
page read and write
|
||
201D9421000
|
heap
|
page read and write
|
||
224F930E000
|
heap
|
page read and write
|
||
210680EF000
|
heap
|
page read and write
|
||
1C7BE25E000
|
heap
|
page read and write
|
||
DA8A87E000
|
stack
|
page read and write
|
||
224F9396000
|
heap
|
page read and write
|
||
21068084000
|
heap
|
page read and write
|
||
224F893C000
|
heap
|
page read and write
|
||
210680E3000
|
heap
|
page read and write
|
||
364D0000
|
trusted library allocation
|
page read and write
|
||
21068963000
|
heap
|
page read and write
|
||
210686A0000
|
heap
|
page read and write
|
||
21067F67000
|
heap
|
page read and write
|
||
224F9A00000
|
heap
|
page read and write
|
||
210680F1000
|
heap
|
page read and write
|
||
210680B7000
|
heap
|
page read and write
|
||
3A1B000
|
heap
|
page read and write
|
||
210686B7000
|
heap
|
page read and write
|
||
201D9431000
|
heap
|
page read and write
|
||
1C7BE297000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
21287E79000
|
heap
|
page read and write
|
||
224F87A0000
|
unclassified section
|
page readonly
|
||
224F9332000
|
heap
|
page read and write
|
||
142DF7E000
|
stack
|
page read and write
|
||
32FB1000
|
heap
|
page read and write
|
||
2CF05842000
|
heap
|
page read and write
|
||
210680BB000
|
heap
|
page read and write
|
||
224F9392000
|
heap
|
page read and write
|
||
21068759000
|
heap
|
page read and write
|
||
242690A4000
|
heap
|
page read and write
|
||
224F893C000
|
heap
|
page read and write
|
||
21067FD1000
|
heap
|
page read and write
|
||
210680AC000
|
heap
|
page read and write
|
||
2106809A000
|
heap
|
page read and write
|
||
36530000
|
trusted library allocation
|
page read and write
|
||
B8F000
|
heap
|
page read and write
|
||
21068709000
|
heap
|
page read and write
|
||
33250000
|
heap
|
page read and write
|
||
21068787000
|
heap
|
page read and write
|
||
21068045000
|
heap
|
page read and write
|
||
201D9E02000
|
trusted library allocation
|
page read and write
|
||
21067FFC000
|
heap
|
page read and write
|
||
21068095000
|
heap
|
page read and write
|
||
224F87B0000
|
heap
|
page read and write
|
||
12ECEC4D000
|
heap
|
page read and write
|
||
210686FD000
|
heap
|
page read and write
|
||
36380000
|
heap
|
page read and write
|
||
224F9355000
|
heap
|
page read and write
|
||
ABBD4FE000
|
stack
|
page read and write
|
||
1F6BBE7B000
|
heap
|
page read and write
|
||
224F9362000
|
heap
|
page read and write
|
||
21068089000
|
heap
|
page read and write
|
||
12ECEC89000
|
heap
|
page read and write
|
||
32FB1000
|
heap
|
page read and write
|
||
1C7BE22B000
|
heap
|
page read and write
|
||
21287E13000
|
heap
|
page read and write
|
||
7E0000
|
unkown
|
page readonly
|
||
1C7BE213000
|
heap
|
page read and write
|
||
224F9393000
|
heap
|
page read and write
|
||
24269098000
|
heap
|
page read and write
|
||
35D0000
|
trusted library allocation
|
page read and write
|
||
224F937C000
|
heap
|
page read and write
|
||
3AA7000
|
heap
|
page read and write
|
||
21068787000
|
heap
|
page read and write
|
||
224F9329000
|
heap
|
page read and write
|
||
24268FA0000
|
trusted library allocation
|
page read and write
|
||
3A99000
|
heap
|
page read and write
|
||
364C0000
|
trusted library allocation
|
page read and write
|
||
24268DC0000
|
heap
|
page read and write
|
||
1F6BBD70000
|
heap
|
page read and write
|
||
2106811A000
|
heap
|
page read and write
|
||
21068706000
|
heap
|
page read and write
|
||
224F932E000
|
heap
|
page read and write
|
||
21287E00000
|
heap
|
page read and write
|
||
224F9070000
|
trusted library allocation
|
page read and write
|
||
364E0000
|
trusted library allocation
|
page read and write
|
||
2106811C000
|
heap
|
page read and write
|
||
21068134000
|
heap
|
page read and write
|
||
32FB1000
|
heap
|
page read and write
|
||
224F9A72000
|
heap
|
page read and write
|
||
224F88BE000
|
heap
|
page read and write
|
||
224F88FE000
|
heap
|
page read and write
|
||
84BF4FF000
|
stack
|
page read and write
|
||
21068712000
|
heap
|
page read and write
|
||
3A87000
|
heap
|
page read and write
|
||
210677F5000
|
heap
|
page read and write
|
||
3AEF000
|
heap
|
page read and write
|
||
2106808B000
|
heap
|
page read and write
|
||
210689B2000
|
heap
|
page read and write
|
||
DA8A9FF000
|
stack
|
page read and write
|
||
210677C4000
|
heap
|
page read and write
|
||
33FE0000
|
trusted library allocation
|
page read and write
|
||
210680CF000
|
heap
|
page read and write
|
||
487C87D000
|
stack
|
page read and write
|
||
12ECEC66000
|
heap
|
page read and write
|
||
32FCD000
|
heap
|
page read and write
|
||
3A8E000
|
heap
|
page read and write
|
||
224F9A23000
|
heap
|
page read and write
|
||
2106792D000
|
heap
|
page read and write
|
||
1C7BE9A0000
|
trusted library allocation
|
page read and write
|
||
210677E3000
|
heap
|
page read and write
|
||
351E7000
|
trusted library allocation
|
page read and write
|
||
2426AA02000
|
trusted library allocation
|
page read and write
|
||
32FB1000
|
heap
|
page read and write
|
||
210687C5000
|
heap
|
page read and write
|
||
32FB1000
|
heap
|
page read and write
|
||
224F8800000
|
heap
|
page read and write
|
||
1C7BE200000
|
heap
|
page read and write
|
||
224F937C000
|
heap
|
page read and write
|
||
210680D9000
|
heap
|
page read and write
|
||
210680EF000
|
heap
|
page read and write
|
||
21068144000
|
heap
|
page read and write
|
||
224F935C000
|
heap
|
page read and write
|
||
B94000
|
heap
|
page read and write
|
||
210677C4000
|
heap
|
page read and write
|
||
2426A9B0000
|
remote allocation
|
page read and write
|
||
224F9374000
|
heap
|
page read and write
|
||
21068743000
|
heap
|
page read and write
|
||
364D0000
|
trusted library allocation
|
page read and write
|
||
201D93B0000
|
trusted library allocation
|
page read and write
|
||
210686D5000
|
heap
|
page read and write
|
||
12ECEC6F000
|
heap
|
page read and write
|
||
201D947E000
|
heap
|
page read and write
|
||
224F9396000
|
heap
|
page read and write
|
||
210680FB000
|
heap
|
page read and write
|
||
21067779000
|
heap
|
page read and write
|
||
210680A5000
|
heap
|
page read and write
|
||
331D0000
|
direct allocation
|
page read and write
|
||
21068969000
|
heap
|
page read and write
|
||
21068743000
|
heap
|
page read and write
|
||
364E0000
|
trusted library allocation
|
page read and write
|
||
364D0000
|
trusted library allocation
|
page read and write
|
||
2106875B000
|
heap
|
page read and write
|
||
21067FE9000
|
heap
|
page read and write
|
||
364F0000
|
trusted library allocation
|
page read and write
|
||
21068143000
|
heap
|
page read and write
|
||
32FB1000
|
heap
|
page read and write
|
||
21068712000
|
heap
|
page read and write
|
||
210680AB000
|
heap
|
page read and write
|
||
224F891B000
|
heap
|
page read and write
|
||
224F9386000
|
heap
|
page read and write
|
||
27494A70000
|
heap
|
page read and write
|
||
1C7BE030000
|
heap
|
page read and write
|
||
32FB1000
|
heap
|
page read and write
|
||
12ECEC71000
|
heap
|
page read and write
|
||
21068138000
|
heap
|
page read and write
|
||
2106813B000
|
heap
|
page read and write
|
||
12ECEC6B000
|
heap
|
page read and write
|
||
2106811F000
|
heap
|
page read and write
|
||
10001000
|
unkown
|
page execute read
|
||
32FB1000
|
heap
|
page read and write
|
||
224F9AB5000
|
heap
|
page read and write
|
||
ABBD2FE000
|
stack
|
page read and write
|
||
32FB1000
|
heap
|
page read and write
|
||
210686A0000
|
heap
|
page read and write
|
||
2106811C000
|
heap
|
page read and write
|
||
224F88B4000
|
heap
|
page read and write
|
||
1C7BE27E000
|
heap
|
page read and write
|
||
1130000
|
remote allocation
|
page execute and read and write
|
||
210680E8000
|
heap
|
page read and write
|
||
210680E8000
|
heap
|
page read and write
|
||
224F934B000
|
heap
|
page read and write
|
||
2864000
|
heap
|
page read and write
|
||
21068091000
|
heap
|
page read and write
|
||
12ECEC43000
|
heap
|
page read and write
|
||
210680A4000
|
heap
|
page read and write
|
||
224F9378000
|
heap
|
page read and write
|
||
21067F5B000
|
heap
|
page read and write
|
||
341A0000
|
trusted library allocation
|
page read and write
|
||
26D56FF000
|
stack
|
page read and write
|
||
21068120000
|
heap
|
page read and write
|
||
210680A1000
|
heap
|
page read and write
|
||
DA8AAFB000
|
stack
|
page read and write
|
||
21067764000
|
heap
|
page read and write
|
||
DA8A59F000
|
stack
|
page read and write
|
||
3413E000
|
stack
|
page read and write
|
||
224F9378000
|
heap
|
page read and write
|
||
224F9329000
|
heap
|
page read and write
|
||
27494C7D000
|
heap
|
page read and write
|
||
21068123000
|
heap
|
page read and write
|
||
21068095000
|
heap
|
page read and write
|
||
36530000
|
trusted library allocation
|
page read and write
|
||
2CF05730000
|
heap
|
page read and write
|
||
21287F02000
|
heap
|
page read and write
|
||
36540000
|
trusted library allocation
|
page read and write
|
||
32FB1000
|
heap
|
page read and write
|
||
32FB0000
|
heap
|
page read and write
|
||
21068712000
|
heap
|
page read and write
|
||
210680C2000
|
heap
|
page read and write
|
||
210686B0000
|
heap
|
page read and write
|
||
21068134000
|
heap
|
page read and write
|
||
3AD9000
|
heap
|
page read and write
|
||
142DE7B000
|
stack
|
page read and write
|
||
210677F8000
|
heap
|
page read and write
|
||
224F935F000
|
heap
|
page read and write
|
||
21068081000
|
heap
|
page read and write
|
||
1F6BBF02000
|
heap
|
page read and write
|
||
21067F5B000
|
heap
|
page read and write
|
||
210680E6000
|
heap
|
page read and write
|
||
27494C00000
|
heap
|
page read and write
|
||
21068123000
|
heap
|
page read and write
|
||
210677E5000
|
heap
|
page read and write
|
||
224F9329000
|
heap
|
page read and write
|
||
3AC0000
|
heap
|
page read and write
|
||
201D946F000
|
heap
|
page read and write
|
||
21067FA0000
|
heap
|
page read and write
|
||
21068681000
|
heap
|
page read and write
|
||
391E000
|
stack
|
page read and write
|
||
210680D1000
|
heap
|
page read and write
|
||
210680F3000
|
heap
|
page read and write
|
||
210677F8000
|
heap
|
page read and write
|
||
24269085000
|
heap
|
page read and write
|
||
487D07E000
|
stack
|
page read and write
|
||
210680D0000
|
heap
|
page read and write
|
||
210680A3000
|
heap
|
page read and write
|
||
3A78000
|
heap
|
page read and write
|
||
2DA0000
|
heap
|
page read and write
|
||
224F9356000
|
heap
|
page read and write
|
||
21068743000
|
heap
|
page read and write
|
||
33B4E000
|
stack
|
page read and write
|
||
21068743000
|
heap
|
page read and write
|
||
2106792C000
|
heap
|
page read and write
|
||
21068706000
|
heap
|
page read and write
|
||
224F9378000
|
heap
|
page read and write
|
||
224F9332000
|
heap
|
page read and write
|
||
27494C9D000
|
heap
|
page read and write
|
||
224F9329000
|
heap
|
page read and write
|
||
32FB1000
|
heap
|
page read and write
|
||
3660000
|
unclassified section
|
page readonly
|
||
342A5000
|
trusted library allocation
|
page read and write
|
||
32FB1000
|
heap
|
page read and write
|
||
2530000
|
remote allocation
|
page execute and read and write
|
||
33D00000
|
remote allocation
|
page read and write
|
There are 1418 hidden memdumps, click here to show them.