Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
[V2]launcher.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\ProgramData\Corporation\recovery.dat
|
DOS executable (COM, 0x8C-variant)
|
dropped
|
||
C:\ProgramData\Dllhost\WinRing0x64.sys
|
PE32+ executable (native) x86-64, for MS Windows
|
dropped
|
||
C:\ProgramData\Dllhost\winlogson.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
modified
|
||
C:\Users\user\AppData\Local\Temp\Protect544cd51a.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\conhost.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\main\7z.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\main\7z.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\main\extracted\Installer.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\svchost.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\kwweifjdskdv\kwweifjdskdv.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\ProgramData\Corporation\recoverysol.dat
|
data
|
dropped
|
||
C:\ProgramData\HostData\logs.uce
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\Public\Desktop\Google Chrome.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working
directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:41 2023, mtime=Thu Oct 5 08:16:08 2023,
atime=Wed Sep 27 08:36:54 2023, length=3242272, window=hide
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegAsm.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegSvcs.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\[V2]launcher.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\kwweifjdskdv.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\svchost.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WDKI0JR2\4Ak49WQH0GE3Nr[1].htm
|
HTML document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Tmp7EF9.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Tmp7F58.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bwd4zlsu.pot.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cmrtr534.ssb.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nrd4oi3m.gz4.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pku1hg2v.u34.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_psnj3hnm.bhu.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tfitjqee.rkk.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_um24v1ju.u0x.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_up10tyrl.tpy.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\logs.uce
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\main\KillDuplicate.cmd
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\main\extracted\AntiAV.data
|
ASCII text, with very long lines (65536), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\main\extracted\file_1.zip
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\main\extracted\file_2.zip
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\main\file.bin
|
Zip archive data, at least v2.0 to extract, compression method=store
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\main\file.zip (copy)
|
Zip archive data, at least v2.0 to extract, compression method=store
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\main\main.bat
|
Unicode text, UTF-16, little-endian text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\76b53b3ec448f7ccdda2063b15d2bfc3_9e146be9-c76a-4720-bcdb-53011b87bd06
|
data
|
dropped
|
||
C:\logs.uce
|
ASCII text, with CRLF line terminators
|
dropped
|
||
\Device\ConDrv
|
ASCII text, with CRLF, CR line terminators
|
dropped
|
There are 32 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\[V2]launcher.exe
|
"C:\Users\user\Desktop\[V2]launcher.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
|
||
C:\Users\user\AppData\Local\Temp\conhost.exe
|
"C:\Users\user\AppData\Local\Temp\conhost.exe"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\main\main.bat" /S"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Users\user\AppData\Local\Temp\svchost.exe
|
"C:\Users\user\AppData\Local\Temp\svchost.exe"
|
||
C:\Users\user\AppData\Local\Temp\main\Installer.exe
|
"Installer.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"powershell.exe" Remove -ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'kwweifjdskdv';New-ItemProperty
-Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'kwweifjdskdv' -Value '"C:\Users\user\AppData\Local\kwweifjdskdv\kwweifjdskdv.exe"'
-PropertyType 'String'
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
|
||
C:\Windows\SysWOW64\cmd.exe
|
"cmd.exe" /C powershell -EncodedCommand "PAAjADEAUwBuAFQATQAjAD4AIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAFoATgBFAHQAcABSAFUAIwA+ACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAQAAoACQAZQBuAHYAOgBVAHMAZQByAFAAcgBvAGYAaQBsAGUALAAkAGUAbgB2ADoAUwB5AHMAdABlAG0ARAByAGkAdgBlACkAIAA8ACMAbwBWAHcAVABIAEcAYQBSADkAIwA+ACAALQBGAG8AcgBjAGUAIAA8ACMAVwBtAEQAWgAjAD4A"
& powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg
/x -standby-timeout-dc 0 & powercfg /hibernate off
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
powershell -EncodedCommand "PAAjADEAUwBuAFQATQAjAD4AIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAFoATgBFAHQAcABSAFUAIwA+ACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAQAAoACQAZQBuAHYAOgBVAHMAZQByAFAAcgBvAGYAaQBsAGUALAAkAGUAbgB2ADoAUwB5AHMAdABlAG0ARAByAGkAdgBlACkAIAA8ACMAbwBWAHcAVABIAEcAYQBSADkAIwA+ACAALQBGAG8AcgBjAGUAIAA8ACMAVwBtAEQAWgAjAD4A"
|
||
C:\Windows\SysWOW64\cmd.exe
|
"cmd.exe" /c SCHTASKS /CREATE /SC MINUTE /MO 5 /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"
|
||
C:\Windows\SysWOW64\cmd.exe
|
"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray\NvStrayService_bk9052" /TR "C:\ProgramData\Dllhost\dllhost.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\schtasks.exe
|
SCHTASKS /CREATE /SC MINUTE /MO 5 /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
SCHTASKS /CREATE /SC HOURLY /TN "NvStray\NvStrayService_bk9052" /TR "C:\ProgramData\Dllhost\dllhost.exe"
|
||
C:\Users\user\AppData\Local\kwweifjdskdv\kwweifjdskdv.exe
|
"C:\Users\user\AppData\Local\kwweifjdskdv\kwweifjdskdv.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
||
C:\Users\user\AppData\Local\kwweifjdskdv\kwweifjdskdv.exe
|
"C:\Users\user\AppData\Local\kwweifjdskdv\kwweifjdskdv.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
||
C:\Windows\System32\mode.com
|
mode 65,10
|
||
C:\Users\user\AppData\Local\Temp\main\7z.exe
|
7z.exe e file.zip -p146312891125116171371883110193 -oextracted
|
||
C:\Users\user\AppData\Local\Temp\main\7z.exe
|
7z.exe e extracted/file_2.zip -oextracted
|
||
C:\Users\user\AppData\Local\Temp\main\7z.exe
|
7z.exe e extracted/file_1.zip -oextracted
|
||
C:\Windows\System32\attrib.exe
|
attrib +H "Installer.exe"
|
||
C:\Windows\System32\wbem\WmiPrvSE.exe
|
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
|
There are 23 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
http://45.144.232.181/WatchDog.exeEhttp://45.144.232.181/lolMiner.exe?http://45.144.232.181/xmrig.ex
|
unknown
|
||
http://tempuri.org/Entity/Id23ResponseD
|
unknown
|
||
http://tempuri.org/Entity/Id12Response
|
unknown
|
||
http://tempuri.org/
|
unknown
|
||
http://tempuri.org/Entity/Id2Response
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
|
unknown
|
||
http://tempuri.org/Entity/Id21Response
|
unknown
|
||
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
|
unknown
|
||
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
|
unknown
|
||
http:///recovery.dat/recoverysol.dat;
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
|
unknown
|
||
http://195.20.16.153D
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wsat
|
unknown
|
||
http://tempuri.org/Entity/Id15Response
|
unknown
|
||
http://195.20.16.153/WatchDog.exeP
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/08/addressing/faultp9
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
|
unknown
|
||
https://joxi.net/4Ak49WQH0GE3Nr.mp3L
|
unknown
|
||
https://api.ip.sb/ip
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
http://tempuri.org/Entity/Id1ResponseD
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
http://tempuri.org/TimesheetCategoriesSet.xsd
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
|
unknown
|
||
http://tempuri.org/Entity/Id24Response
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
http://www.symauth.com/cps0(
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
|
unknown
|
||
http://tempuri.org/UsersSet.xsd
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
|
unknown
|
||
http://195.20.16.153/xmrig.exe
|
195.20.16.153
|
||
http://schemas.xmlsoap.org/ws/2004/08/addressing
|
unknown
|
||
http://tempuri.org/EventsSet.xsd
|
unknown
|
||
http://www.symauth.com/rpa00
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
http://195.20.16.153/svchost.exe
|
195.20.16.153
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
|
unknown
|
||
http://tempuri.org/IoBoardOutputsSet.xsd
|
unknown
|
||
https://joxi.net/4Ak49WQH0GE3Nr.mp3_
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
|
unknown
|
||
http://tempuri.org/TimesheetDetailsSet.xsd
|
unknown
|
||
http://pastebin.com
|
unknown
|
||
http://tempuri.org/Entity/Id5Response
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
|
unknown
|
||
http://45.144.232.181/xmrig.exe
|
unknown
|
||
http://tempuri.org/Entity/Id10Response
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
|
unknown
|
||
http://tempuri.org/DepartmentsSet.xsd
|
unknown
|
||
http://tempuri.org/Entity/Id8Response
|
unknown
|
||
http://ocsp.sectigo.com0
|
unknown
|
||
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
|
unknown
|
||
http://tempuri.org/CardsSet.xsd
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wsat/Rollback
|
unknown
|
||
http://tempuri.org/Entity/Id3ResponseD
|
unknown
|
||
https://joxi.net/q
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCT
|
unknown
|
||
http://tempuri.org/D
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/06/addressingex
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/security/trust/Nonce
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse
|
unknown
|
||
http://tempuri.org/CameraAuthenticationsSet.xsd
|
unknown
|
||
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ1510
|
unknown
|
||
http://45.144.232.181/lolMiner.exe
|
unknown
|
||
http://tempuri.org/TimesheetUsersDetailSet.xsd4HolidayAdjustmentPriorYear2HolidayAdjustmentThisYear2
|
unknown
|
||
http://195.20.16.153/conhost.exe
|
195.20.16.153
|
||
http://tempuri.org/Entity/Id13Response
|
unknown
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
|
unknown
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509SubjectKeyIdentif
|
unknown
|
||
http://tempuri.org/IoBoardsSet.xsd
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wsat/Committed
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/CK/PSHA1
|
unknown
|
||
http://45.15.156.43
|
unknown
|
||
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#ThumbprintSHA1
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/right/possessproperty
|
unknown
|
||
http://tempuri.org/IndividualAccessLevelsSet.xsd$SelectedTimezoneID
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/security/sc/sct
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgement
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
api.ip.sb
|
unknown
|
||
bg.microsoft.map.fastly.net
|
199.232.210.172
|
||
joxi.net
|
104.21.73.118
|
||
pastebin.com
|
104.20.3.235
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
45.15.156.167
|
unknown
|
Russian Federation
|
||
45.15.156.43
|
unknown
|
Russian Federation
|
||
104.20.3.235
|
pastebin.com
|
United States
|
||
104.21.73.118
|
joxi.net
|
United States
|
||
195.20.16.153
|
unknown
|
Finland
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
kwweifjdskdv
|
There are 26 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
402000
|
remote allocation
|
page execute and read and write
|
||
BB2000
|
unkown
|
page readonly
|
||
40A5000
|
trusted library allocation
|
page read and write
|
||
296B000
|
trusted library allocation
|
page read and write
|
||
CE2000
|
unkown
|
page readonly
|
||
2944000
|
trusted library allocation
|
page read and write
|
||
4F96000
|
trusted library allocation
|
page read and write
|
||
2948000
|
trusted library allocation
|
page read and write
|
||
3F0000
|
heap
|
page read and write
|
||
691D000
|
stack
|
page read and write
|
||
6D00000
|
trusted library allocation
|
page read and write
|
||
3389000
|
trusted library allocation
|
page read and write
|
||
56F0000
|
trusted library allocation
|
page read and write
|
||
E9C000
|
stack
|
page read and write
|
||
9B4C000
|
stack
|
page read and write
|
||
712F000
|
stack
|
page read and write
|
||
696C000
|
stack
|
page read and write
|
||
8E92000
|
trusted library allocation
|
page read and write
|
||
730C000
|
stack
|
page read and write
|
||
3310000
|
heap
|
page read and write
|
||
45E1000
|
trusted library allocation
|
page read and write
|
||
6D4F000
|
stack
|
page read and write
|
||
3D65000
|
trusted library allocation
|
page read and write
|
||
13E0000
|
heap
|
page read and write
|
||
6A20000
|
trusted library allocation
|
page read and write
|
||
616E000
|
stack
|
page read and write
|
||
123F000
|
stack
|
page read and write
|
||
54AE000
|
trusted library allocation
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
880E000
|
stack
|
page read and write
|
||
8B09000
|
trusted library allocation
|
page read and write
|
||
4D9E000
|
stack
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
D91000
|
unkown
|
page execute read
|
||
E4000
|
unkown
|
page readonly
|
||
2E00000
|
heap
|
page read and write
|
||
F50000
|
heap
|
page read and write
|
||
EB0000
|
trusted library allocation
|
page read and write
|
||
233E000
|
stack
|
page read and write
|
||
633E000
|
stack
|
page read and write
|
||
8E25000
|
trusted library allocation
|
page read and write
|
||
EF9000
|
stack
|
page read and write
|
||
2905000
|
trusted library allocation
|
page read and write
|
||
8B00000
|
trusted library allocation
|
page read and write
|
||
2D6C000
|
trusted library allocation
|
page read and write
|
||
3390000
|
trusted library allocation
|
page read and write
|
||
7030000
|
trusted library allocation
|
page execute and read and write
|
||
4546000
|
trusted library allocation
|
page read and write
|
||
79FC000
|
heap
|
page read and write
|
||
B5E0000
|
direct allocation
|
page read and write
|
||
1F01000
|
heap
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
28A2000
|
trusted library allocation
|
page read and write
|
||
10E5000
|
heap
|
page read and write
|
||
7A48000
|
heap
|
page read and write
|
||
3200000
|
heap
|
page read and write
|
||
DFC000
|
unkown
|
page write copy
|
||
6E60000
|
heap
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
F11000
|
trusted library allocation
|
page read and write
|
||
304E000
|
stack
|
page read and write
|
||
350C000
|
stack
|
page read and write
|
||
2FCD000
|
stack
|
page read and write
|
||
31A0000
|
heap
|
page read and write
|
||
2E3F000
|
trusted library allocation
|
page read and write
|
||
372C000
|
trusted library allocation
|
page read and write
|
||
6278000
|
trusted library allocation
|
page read and write
|
||
F1E000
|
stack
|
page read and write
|
||
16B1000
|
heap
|
page read and write
|
||
1618000
|
heap
|
page read and write
|
||
145D000
|
heap
|
page read and write
|
||
3DA8000
|
trusted library allocation
|
page read and write
|
||
459D000
|
trusted library allocation
|
page read and write
|
||
7C70000
|
trusted library allocation
|
page read and write
|
||
64AF000
|
trusted library allocation
|
page read and write
|
||
438A000
|
trusted library allocation
|
page read and write
|
||
6D7D000
|
stack
|
page read and write
|
||
6866000
|
trusted library allocation
|
page read and write
|
||
402000
|
remote allocation
|
page execute read
|
||
81B0000
|
trusted library allocation
|
page read and write
|
||
14BC000
|
heap
|
page read and write
|
||
309E000
|
stack
|
page read and write
|
||
4211000
|
trusted library allocation
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
6490000
|
trusted library allocation
|
page read and write
|
||
4F00000
|
heap
|
page read and write
|
||
F6C000
|
stack
|
page read and write
|
||
7CE0000
|
trusted library allocation
|
page read and write
|
||
2FFE000
|
stack
|
page read and write
|
||
1AD4000
|
heap
|
page read and write
|
||
4241000
|
trusted library allocation
|
page read and write
|
||
163B000
|
heap
|
page read and write
|
||
1B1C2849000
|
heap
|
page read and write
|
||
BC3000
|
trusted library allocation
|
page read and write
|
||
474F000
|
stack
|
page read and write
|
||
3410000
|
heap
|
page read and write
|
||
4820000
|
trusted library allocation
|
page read and write
|
||
108D000
|
trusted library allocation
|
page execute and read and write
|
||
1034000
|
heap
|
page read and write
|
||
8935000
|
heap
|
page read and write
|
||
2240B025000
|
heap
|
page read and write
|
||
3490000
|
trusted library allocation
|
page execute and read and write
|
||
6A28000
|
trusted library allocation
|
page read and write
|
||
5E2E000
|
stack
|
page read and write
|
||
1B1C2840000
|
heap
|
page read and write
|
||
360D000
|
heap
|
page read and write
|
||
9BB0000
|
heap
|
page read and write
|
||
11C5000
|
heap
|
page read and write
|
||
11F0000
|
heap
|
page read and write
|
||
4FC9000
|
trusted library allocation
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
267E000
|
stack
|
page read and write
|
||
117B000
|
trusted library allocation
|
page execute and read and write
|
||
6AE8C000
|
unkown
|
page read and write
|
||
4617000
|
trusted library allocation
|
page read and write
|
||
1130000
|
trusted library allocation
|
page read and write
|
||
7A32000
|
heap
|
page read and write
|
||
52E0000
|
trusted library allocation
|
page read and write
|
||
10A0000
|
trusted library allocation
|
page read and write
|
||
2FD0000
|
trusted library allocation
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
329F000
|
stack
|
page read and write
|
||
13BE000
|
stack
|
page read and write
|
||
987D000
|
heap
|
page read and write
|
||
1730000
|
heap
|
page execute and read and write
|
||
1244000
|
trusted library allocation
|
page read and write
|
||
68C0000
|
trusted library allocation
|
page read and write
|
||
55E000
|
heap
|
page read and write
|
||
15D4000
|
trusted library allocation
|
page read and write
|
||
767E000
|
stack
|
page read and write
|
||
52CB000
|
trusted library allocation
|
page read and write
|
||
9050000
|
trusted library allocation
|
page read and write
|
||
1B1C0DB0000
|
heap
|
page read and write
|
||
2240B030000
|
direct allocation
|
page read and write
|
||
2841000
|
trusted library allocation
|
page read and write
|
||
15F0000
|
trusted library allocation
|
page read and write
|
||
15DB000
|
trusted library allocation
|
page execute and read and write
|
||
5F60000
|
trusted library allocation
|
page read and write
|
||
9908000
|
heap
|
page read and write
|
||
3478000
|
trusted library allocation
|
page read and write
|
||
354C000
|
heap
|
page read and write
|
||
879000
|
trusted library allocation
|
page read and write
|
||
6875000
|
trusted library allocation
|
page read and write
|
||
1494000
|
trusted library allocation
|
page read and write
|
||
DDF000
|
unkown
|
page readonly
|
||
35EB000
|
heap
|
page read and write
|
||
3544000
|
trusted library allocation
|
page read and write
|
||
483E000
|
stack
|
page read and write
|
||
7EFA000
|
heap
|
page read and write
|
||
12A0000
|
heap
|
page read and write
|
||
49E6000
|
trusted library allocation
|
page read and write
|
||
57D3000
|
heap
|
page execute and read and write
|
||
8EC0000
|
trusted library allocation
|
page execute and read and write
|
||
1364000
|
heap
|
page read and write
|
||
1B1C0E90000
|
heap
|
page read and write
|
||
144F000
|
stack
|
page read and write
|
||
7700000
|
heap
|
page read and write
|
||
4F5E000
|
stack
|
page read and write
|
||
4525000
|
trusted library allocation
|
page read and write
|
||
4FB0000
|
heap
|
page read and write
|
||
52C0000
|
trusted library allocation
|
page read and write
|
||
33A2000
|
trusted library allocation
|
page read and write
|
||
18B3000
|
trusted library allocation
|
page read and write
|
||
5B0E000
|
heap
|
page read and write
|
||
2F0A000
|
trusted library allocation
|
page read and write
|
||
7600000
|
heap
|
page read and write
|
||
2D6F000
|
trusted library allocation
|
page read and write
|
||
842D000
|
stack
|
page read and write
|
||
1469000
|
heap
|
page read and write
|
||
646E000
|
trusted library allocation
|
page read and write
|
||
7AC0000
|
trusted library allocation
|
page read and write
|
||
EE0000
|
heap
|
page execute and read and write
|
||
66FF000
|
stack
|
page read and write
|
||
6760000
|
heap
|
page read and write
|
||
530000
|
direct allocation
|
page read and write
|
||
18BD000
|
trusted library allocation
|
page execute and read and write
|
||
9B4000
|
heap
|
page read and write
|
||
3679000
|
trusted library allocation
|
page read and write
|
||
1AEF000
|
heap
|
page read and write
|
||
8E60000
|
trusted library allocation
|
page read and write
|
||
118A000
|
heap
|
page read and write
|
||
6297000
|
trusted library allocation
|
page read and write
|
||
224095B0000
|
heap
|
page read and write
|
||
8957000
|
heap
|
page read and write
|
||
81C3000
|
trusted library allocation
|
page read and write
|
||
3065000
|
trusted library allocation
|
page read and write
|
||
43D7000
|
trusted library allocation
|
page read and write
|
||
22ECA960000
|
heap
|
page read and write
|
||
14AD000
|
trusted library allocation
|
page execute and read and write
|
||
10FB000
|
stack
|
page read and write
|
||
52E0000
|
trusted library allocation
|
page read and write
|
||
7060000
|
trusted library allocation
|
page read and write
|
||
87C0000
|
heap
|
page read and write
|
||
14BE000
|
heap
|
page read and write
|
||
6104000
|
trusted library allocation
|
page read and write
|
||
41A000
|
unkown
|
page readonly
|
||
557E000
|
stack
|
page read and write
|
||
5E6D000
|
stack
|
page read and write
|
||
740A000
|
trusted library allocation
|
page read and write
|
||
B760000
|
direct allocation
|
page read and write
|
||
244B000
|
heap
|
page read and write
|
||
6AE81000
|
unkown
|
page read and write
|
||
5745000
|
trusted library allocation
|
page read and write
|
||
2F5D000
|
trusted library allocation
|
page read and write
|
||
6869000
|
trusted library allocation
|
page read and write
|
||
823E000
|
stack
|
page read and write
|
||
9F5C000
|
stack
|
page read and write
|
||
5A1000
|
heap
|
page read and write
|
||
8970000
|
heap
|
page read and write
|
||
33C7000
|
trusted library allocation
|
page read and write
|
||
5FB0000
|
trusted library allocation
|
page read and write
|
||
BE7000
|
trusted library allocation
|
page execute and read and write
|
||
432000
|
remote allocation
|
page execute and read and write
|
||
3068000
|
trusted library allocation
|
page read and write
|
||
6AE83000
|
unkown
|
page write copy
|
||
2680000
|
direct allocation
|
page read and write
|
||
7250000
|
trusted library allocation
|
page read and write
|
||
604E000
|
stack
|
page read and write
|
||
611C000
|
trusted library allocation
|
page read and write
|
||
540F000
|
stack
|
page read and write
|
||
32FB000
|
stack
|
page read and write
|
||
5B90000
|
heap
|
page read and write
|
||
446000
|
remote allocation
|
page execute and read and write
|
||
5FBD000
|
trusted library allocation
|
page read and write
|
||
74CE000
|
trusted library allocation
|
page read and write
|
||
7E20000
|
trusted library allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
1140000
|
heap
|
page read and write
|
||
7F1D0000
|
trusted library allocation
|
page execute and read and write
|
||
307A000
|
trusted library allocation
|
page read and write
|
||
7200000
|
trusted library allocation
|
page read and write
|
||
5F2D000
|
stack
|
page read and write
|
||
D91000
|
unkown
|
page execute read
|
||
DFF000
|
unkown
|
page readonly
|
||
EDE000
|
stack
|
page read and write
|
||
13F4000
|
heap
|
page read and write
|
||
A8BE000
|
stack
|
page read and write
|
||
7E68000
|
heap
|
page read and write
|
||
371E000
|
trusted library allocation
|
page read and write
|
||
54BF000
|
stack
|
page read and write
|
||
2F66000
|
trusted library allocation
|
page read and write
|
||
43FF000
|
trusted library allocation
|
page read and write
|
||
42B6000
|
trusted library allocation
|
page read and write
|
||
62AE000
|
stack
|
page read and write
|
||
52EB000
|
trusted library allocation
|
page read and write
|
||
300F000
|
stack
|
page read and write
|
||
DFF000
|
unkown
|
page readonly
|
||
3DAA000
|
trusted library allocation
|
page read and write
|
||
317F000
|
stack
|
page read and write
|
||
4346000
|
trusted library allocation
|
page read and write
|
||
744E000
|
stack
|
page read and write
|
||
366F000
|
trusted library allocation
|
page read and write
|
||
4A3A000
|
trusted library allocation
|
page read and write
|
||
8EBA000
|
trusted library allocation
|
page read and write
|
||
56F0000
|
trusted library allocation
|
page read and write
|
||
7010000
|
trusted library allocation
|
page read and write
|
||
614E000
|
stack
|
page read and write
|
||
34AA000
|
trusted library allocation
|
page read and write
|
||
157E000
|
stack
|
page read and write
|
||
5BEE000
|
stack
|
page read and write
|
||
1530000
|
heap
|
page read and write
|
||
49F5000
|
trusted library allocation
|
page read and write
|
||
5A3D000
|
trusted library allocation
|
page read and write
|
||
6CE0000
|
trusted library allocation
|
page execute and read and write
|
||
2FBD000
|
trusted library allocation
|
page execute and read and write
|
||
5CB0000
|
heap
|
page read and write
|
||
1A34000
|
heap
|
page read and write
|
||
1614000
|
heap
|
page read and write
|
||
5D2E000
|
stack
|
page read and write
|
||
D1F000
|
stack
|
page read and write
|
||
3633000
|
heap
|
page read and write
|
||
4262000
|
trusted library allocation
|
page read and write
|
||
7C50000
|
heap
|
page read and write
|
||
4E30000
|
heap
|
page execute and read and write
|
||
113D000
|
trusted library allocation
|
page execute and read and write
|
||
890000
|
heap
|
page read and write
|
||
99C3000
|
heap
|
page read and write
|
||
3353000
|
trusted library allocation
|
page read and write
|
||
1707000
|
heap
|
page read and write
|
||
7E50000
|
heap
|
page read and write
|
||
877E000
|
stack
|
page read and write
|
||
2B90000
|
heap
|
page read and write
|
||
74CA000
|
trusted library allocation
|
page read and write
|
||
5F8000
|
heap
|
page read and write
|
||
570E000
|
trusted library allocation
|
page read and write
|
||
1740000
|
heap
|
page read and write
|
||
87BE000
|
stack
|
page read and write
|
||
3080000
|
trusted library allocation
|
page read and write
|
||
13BE000
|
stack
|
page read and write
|
||
4ED0000
|
heap
|
page execute and read and write
|
||
A000000
|
trusted library allocation
|
page read and write
|
||
57D0000
|
heap
|
page execute and read and write
|
||
D91000
|
unkown
|
page execute read
|
||
6540000
|
heap
|
page read and write
|
||
180E000
|
stack
|
page read and write
|
||
99BF000
|
heap
|
page read and write
|
||
5F50000
|
trusted library allocation
|
page read and write
|
||
598000
|
heap
|
page read and write
|
||
4642000
|
trusted library allocation
|
page read and write
|
||
2FE7000
|
trusted library allocation
|
page execute and read and write
|
||
66E9000
|
stack
|
page read and write
|
||
4DE0000
|
heap
|
page read and write
|
||
5A40000
|
heap
|
page execute and read and write
|
||
6AE64000
|
unkown
|
page readonly
|
||
340E000
|
trusted library allocation
|
page read and write
|
||
3775000
|
trusted library allocation
|
page read and write
|
||
1180000
|
heap
|
page read and write
|
||
2FB2000
|
heap
|
page read and write
|
||
1D9D000
|
trusted library allocation
|
page execute and read and write
|
||
1700000
|
heap
|
page read and write
|
||
15EE000
|
heap
|
page read and write
|
||
168D000
|
heap
|
page read and write
|
||
1DCB000
|
trusted library allocation
|
page execute and read and write
|
||
74BE000
|
stack
|
page read and write
|
||
A810000
|
trusted library allocation
|
page execute and read and write
|
||
3890000
|
heap
|
page read and write
|
||
EF6000
|
trusted library allocation
|
page read and write
|
||
6EE0000
|
heap
|
page execute and read and write
|
||
836E000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
22A000
|
unkown
|
page read and write
|
||
5B0E000
|
stack
|
page read and write
|
||
4FC0000
|
heap
|
page read and write
|
||
4235000
|
trusted library allocation
|
page read and write
|
||
5750000
|
trusted library allocation
|
page read and write
|
||
1250000
|
heap
|
page read and write
|
||
846E000
|
stack
|
page read and write
|
||
4C80000
|
trusted library allocation
|
page read and write
|
||
22EC8F2A000
|
heap
|
page read and write
|
||
1230000
|
trusted library allocation
|
page execute and read and write
|
||
56F4000
|
trusted library allocation
|
page read and write
|
||
2DE0000
|
trusted library allocation
|
page read and write
|
||
86F0000
|
heap
|
page read and write
|
||
5F84000
|
trusted library allocation
|
page read and write
|
||
165B000
|
heap
|
page read and write
|
||
600F000
|
stack
|
page read and write
|
||
36C7000
|
trusted library allocation
|
page read and write
|
||
666E000
|
stack
|
page read and write
|
||
1A1D000
|
heap
|
page read and write
|
||
651F000
|
stack
|
page read and write
|
||
35FE000
|
heap
|
page read and write
|
||
905E000
|
direct allocation
|
page read and write
|
||
7F6D0000
|
trusted library allocation
|
page execute and read and write
|
||
A8B000
|
heap
|
page read and write
|
||
4F4E000
|
stack
|
page read and write
|
||
7CED000
|
stack
|
page read and write
|
||
42C6000
|
trusted library allocation
|
page read and write
|
||
5B46000
|
heap
|
page read and write
|
||
22EC8F00000
|
direct allocation
|
page read and write
|
||
423000
|
unkown
|
page readonly
|
||
3350000
|
trusted library allocation
|
page read and write
|
||
78FE000
|
stack
|
page read and write
|
||
43D0000
|
trusted library allocation
|
page read and write
|
||
10B7000
|
trusted library allocation
|
page execute and read and write
|
||
1134000
|
trusted library allocation
|
page read and write
|
||
7040000
|
heap
|
page execute and read and write
|
||
349E000
|
trusted library allocation
|
page read and write
|
||
652E000
|
stack
|
page read and write
|
||
1510000
|
heap
|
page read and write
|
||
1285000
|
heap
|
page read and write
|
||
8959000
|
heap
|
page read and write
|
||
5ACD000
|
stack
|
page read and write
|
||
42E2000
|
trusted library allocation
|
page read and write
|
||
8710000
|
trusted library allocation
|
page read and write
|
||
510E000
|
stack
|
page read and write
|
||
39EE000
|
stack
|
page read and write
|
||
4268000
|
trusted library allocation
|
page read and write
|
||
56CE000
|
stack
|
page read and write
|
||
5A2A000
|
trusted library allocation
|
page read and write
|
||
376A000
|
trusted library allocation
|
page read and write
|
||
3880000
|
heap
|
page read and write
|
||
1A42000
|
heap
|
page read and write
|
||
708A000
|
trusted library allocation
|
page read and write
|
||
56AE000
|
stack
|
page read and write
|
||
14C4000
|
trusted library allocation
|
page read and write
|
||
864000
|
trusted library allocation
|
page read and write
|
||
6E55000
|
heap
|
page read and write
|
||
43E9000
|
trusted library allocation
|
page read and write
|
||
3894000
|
trusted library allocation
|
page read and write
|
||
5FE0000
|
trusted library allocation
|
page read and write
|
||
1960000
|
heap
|
page read and write
|
||
15C0000
|
trusted library allocation
|
page read and write
|
||
D0000
|
unkown
|
page readonly
|
||
67ED000
|
stack
|
page read and write
|
||
314C000
|
stack
|
page read and write
|
||
5A64000
|
trusted library allocation
|
page read and write
|
||
5FBA000
|
trusted library allocation
|
page read and write
|
||
568E000
|
stack
|
page read and write
|
||
34E7000
|
trusted library allocation
|
page read and write
|
||
29E0000
|
heap
|
page read and write
|
||
31F0000
|
trusted library allocation
|
page read and write
|
||
662F000
|
stack
|
page read and write
|
||
2240AFD0000
|
direct allocation
|
page read and write
|
||
52F6000
|
trusted library allocation
|
page read and write
|
||
32EF000
|
stack
|
page read and write
|
||
7769000
|
heap
|
page read and write
|
||
34F3000
|
trusted library allocation
|
page read and write
|
||
20F701D9000
|
heap
|
page read and write
|
||
318E000
|
stack
|
page read and write
|
||
15C0000
|
trusted library allocation
|
page read and write
|
||
8329000
|
stack
|
page read and write
|
||
4D4E000
|
trusted library allocation
|
page read and write
|
||
65BE000
|
stack
|
page read and write
|
||
550000
|
heap
|
page read and write
|
||
7260000
|
trusted library allocation
|
page read and write
|
||
14B5000
|
heap
|
page read and write
|
||
3668000
|
trusted library allocation
|
page read and write
|
||
49F7000
|
trusted library allocation
|
page read and write
|
||
74A9000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
heap
|
page read and write
|
||
74A5000
|
trusted library allocation
|
page read and write
|
||
7770000
|
heap
|
page read and write
|
||
20F701D0000
|
heap
|
page read and write
|
||
DDF000
|
unkown
|
page readonly
|
||
40A1000
|
trusted library allocation
|
page read and write
|
||
6ADE0000
|
unkown
|
page readonly
|
||
4309000
|
trusted library allocation
|
page read and write
|
||
F1F000
|
stack
|
page read and write
|
||
164B000
|
trusted library allocation
|
page execute and read and write
|
||
5E2E000
|
stack
|
page read and write
|
||
744E000
|
stack
|
page read and write
|
||
8A0000
|
trusted library allocation
|
page read and write
|
||
B4E0000
|
direct allocation
|
page read and write
|
||
67DF000
|
stack
|
page read and write
|
||
1330000
|
heap
|
page read and write
|
||
11BA000
|
heap
|
page read and write
|
||
74FA000
|
stack
|
page read and write
|
||
DDC000
|
stack
|
page read and write
|
||
42FD000
|
trusted library allocation
|
page read and write
|
||
6F66000
|
trusted library allocation
|
page read and write
|
||
3655000
|
trusted library allocation
|
page read and write
|
||
6BC0000
|
trusted library allocation
|
page read and write
|
||
6ADB000
|
stack
|
page read and write
|
||
15A5000
|
heap
|
page read and write
|
||
2908000
|
trusted library allocation
|
page read and write
|
||
7407000
|
trusted library allocation
|
page read and write
|
||
1030000
|
heap
|
page read and write
|
||
D40000
|
unkown
|
page readonly
|
||
12F7000
|
stack
|
page read and write
|
||
52DE000
|
stack
|
page read and write
|
||
3600000
|
heap
|
page read and write
|
||
E1F000
|
stack
|
page read and write
|
||
627D000
|
trusted library allocation
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
47FB000
|
stack
|
page read and write
|
||
5A19000
|
trusted library allocation
|
page read and write
|
||
5F74000
|
trusted library allocation
|
page read and write
|
||
A547000
|
direct allocation
|
page read and write
|
||
1190000
|
trusted library allocation
|
page read and write
|
||
157F000
|
stack
|
page read and write
|
||
BBD000
|
trusted library allocation
|
page execute and read and write
|
||
6A40000
|
trusted library allocation
|
page read and write
|
||
6720000
|
heap
|
page read and write
|
||
7CB0000
|
trusted library allocation
|
page read and write
|
||
52F0000
|
trusted library allocation
|
page read and write
|
||
994F000
|
heap
|
page read and write
|
||
124A000
|
trusted library allocation
|
page read and write
|
||
1080000
|
heap
|
page read and write
|
||
5BCF000
|
stack
|
page read and write
|
||
5FB8000
|
trusted library allocation
|
page read and write
|
||
627A000
|
trusted library allocation
|
page read and write
|
||
300F000
|
heap
|
page read and write
|
||
A80000
|
heap
|
page read and write
|
||
12C0000
|
trusted library allocation
|
page read and write
|
||
300E000
|
heap
|
page read and write
|
||
6471000
|
trusted library allocation
|
page read and write
|
||
691D000
|
stack
|
page read and write
|
||
5850000
|
heap
|
page read and write
|
||
8932000
|
heap
|
page read and write
|
||
2C10000
|
trusted library allocation
|
page read and write
|
||
6ED6000
|
heap
|
page read and write
|
||
3684000
|
trusted library allocation
|
page read and write
|
||
5F96000
|
trusted library allocation
|
page read and write
|
||
8A5000
|
trusted library allocation
|
page execute and read and write
|
||
8AEBEFF000
|
stack
|
page read and write
|
||
4E06000
|
trusted library allocation
|
page read and write
|
||
33C0000
|
trusted library allocation
|
page read and write
|
||
7C90000
|
trusted library allocation
|
page read and write
|
||
53BB7BE000
|
stack
|
page read and write
|
||
41E000
|
unkown
|
page read and write
|
||
1070000
|
trusted library allocation
|
page read and write
|
||
11A8000
|
heap
|
page read and write
|
||
1490000
|
trusted library allocation
|
page read and write
|
||
8E50000
|
trusted library allocation
|
page read and write
|
||
2820000
|
trusted library allocation
|
page read and write
|
||
3350000
|
trusted library allocation
|
page read and write
|
||
32E7000
|
trusted library allocation
|
page read and write
|
||
147B000
|
heap
|
page read and write
|
||
6741000
|
heap
|
page read and write
|
||
9FAE000
|
stack
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
7AB0000
|
trusted library allocation
|
page execute and read and write
|
||
927000
|
heap
|
page read and write
|
||
3848000
|
direct allocation
|
page execute and read and write
|
||
45D8000
|
trusted library allocation
|
page read and write
|
||
5FF0000
|
heap
|
page read and write
|
||
2DEC000
|
trusted library allocation
|
page read and write
|
||
5CA1000
|
heap
|
page read and write
|
||
487E000
|
stack
|
page read and write
|
||
9850000
|
heap
|
page read and write
|
||
6B60000
|
heap
|
page read and write
|
||
6BAD000
|
stack
|
page read and write
|
||
3869000
|
trusted library allocation
|
page read and write
|
||
2B20000
|
direct allocation
|
page read and write
|
||
8850000
|
trusted library allocation
|
page read and write
|
||
43C3000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
4011000
|
trusted library allocation
|
page read and write
|
||
96E000
|
heap
|
page read and write
|
||
30FE000
|
stack
|
page read and write
|
||
16F4000
|
stack
|
page read and write
|
||
1175000
|
trusted library allocation
|
page execute and read and write
|
||
7F0F000
|
heap
|
page read and write
|
||
2FDE000
|
stack
|
page read and write
|
||
2C8C000
|
stack
|
page read and write
|
||
DDF000
|
unkown
|
page readonly
|
||
18C0000
|
trusted library allocation
|
page read and write
|
||
32FD000
|
stack
|
page read and write
|
||
2DC0000
|
heap
|
page read and write
|
||
5A30000
|
trusted library allocation
|
page read and write
|
||
F30000
|
trusted library allocation
|
page read and write
|
||
571C000
|
trusted library allocation
|
page read and write
|
||
6ADE1000
|
unkown
|
page execute read
|
||
1120000
|
trusted library allocation
|
page read and write
|
||
2915000
|
trusted library allocation
|
page read and write
|
||
29E8000
|
trusted library allocation
|
page read and write
|
||
6842000
|
trusted library allocation
|
page read and write
|
||
4293000
|
trusted library allocation
|
page read and write
|
||
745A000
|
trusted library section
|
page read and write
|
||
73A0000
|
trusted library section
|
page read and write
|
||
6E4E000
|
stack
|
page read and write
|
||
58B3000
|
heap
|
page read and write
|
||
4FB9000
|
trusted library allocation
|
page read and write
|
||
257E000
|
stack
|
page read and write
|
||
42B8000
|
trusted library allocation
|
page read and write
|
||
4DC0000
|
trusted library allocation
|
page read and write
|
||
7FC80000
|
trusted library allocation
|
page execute and read and write
|
||
401000
|
unkown
|
page execute read
|
||
5FD9000
|
trusted library allocation
|
page read and write
|
||
81F0000
|
trusted library allocation
|
page execute and read and write
|
||
7FC98000
|
trusted library allocation
|
page execute and read and write
|
||
A980000
|
trusted library allocation
|
page execute and read and write
|
||
4289000
|
trusted library allocation
|
page read and write
|
||
2D8A000
|
trusted library allocation
|
page read and write
|
||
63EE000
|
stack
|
page read and write
|
||
126D000
|
trusted library allocation
|
page execute and read and write
|
||
3D61000
|
trusted library allocation
|
page read and write
|
||
6D0E000
|
stack
|
page read and write
|
||
5F59000
|
trusted library allocation
|
page read and write
|
||
5A10000
|
trusted library allocation
|
page read and write
|
||
F35000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
439B000
|
trusted library allocation
|
page read and write
|
||
C00000
|
trusted library allocation
|
page read and write
|
||
3648000
|
trusted library allocation
|
page read and write
|
||
5068000
|
trusted library allocation
|
page read and write
|
||
5F02000
|
trusted library allocation
|
page read and write
|
||
7EB8000
|
heap
|
page read and write
|
||
1D7E000
|
stack
|
page read and write
|
||
6840000
|
heap
|
page read and write
|
||
455D000
|
trusted library allocation
|
page read and write
|
||
430000
|
heap
|
page read and write
|
||
3220000
|
trusted library allocation
|
page read and write
|
||
57C2000
|
trusted library allocation
|
page read and write
|
||
32F1000
|
trusted library allocation
|
page read and write
|
||
57A4000
|
trusted library allocation
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
2FE0000
|
heap
|
page read and write
|
||
35F4000
|
heap
|
page read and write
|
||
5A25000
|
trusted library allocation
|
page read and write
|
||
51BC000
|
stack
|
page read and write
|
||
6F61000
|
trusted library allocation
|
page read and write
|
||
52E9000
|
trusted library allocation
|
page read and write
|
||
505C000
|
trusted library allocation
|
page read and write
|
||
2D61000
|
trusted library allocation
|
page read and write
|
||
3190000
|
heap
|
page read and write
|
||
72EE000
|
stack
|
page read and write
|
||
3882000
|
heap
|
page read and write
|
||
22EC8EE0000
|
heap
|
page read and write
|
||
7DB0000
|
trusted library allocation
|
page read and write
|
||
136A000
|
heap
|
page read and write
|
||
1660000
|
trusted library allocation
|
page read and write
|
||
6DC0000
|
trusted library allocation
|
page read and write
|
||
AA1000
|
heap
|
page read and write
|
||
2DF0000
|
heap
|
page execute and read and write
|
||
82F000
|
stack
|
page read and write
|
||
3885000
|
heap
|
page read and write
|
||
2240AFA0000
|
direct allocation
|
page read and write
|
||
28A0000
|
trusted library allocation
|
page read and write
|
||
5320000
|
heap
|
page read and write
|
||
478D000
|
stack
|
page read and write
|
||
5ACC000
|
stack
|
page read and write
|
||
18F0000
|
trusted library allocation
|
page read and write
|
||
6476000
|
trusted library allocation
|
page read and write
|
||
6311000
|
trusted library allocation
|
page read and write
|
||
1240000
|
trusted library allocation
|
page read and write
|
||
1310000
|
trusted library allocation
|
page execute and read and write
|
||
FF5000
|
heap
|
page read and write
|
||
4551000
|
trusted library allocation
|
page read and write
|
||
1340000
|
heap
|
page read and write
|
||
EA0000
|
trusted library allocation
|
page execute and read and write
|
||
1620000
|
heap
|
page read and write
|
||
5A40000
|
trusted library allocation
|
page read and write
|
||
1AD8000
|
heap
|
page read and write
|
||
6EE0000
|
heap
|
page read and write
|
||
48F1000
|
trusted library allocation
|
page read and write
|
||
E80000
|
heap
|
page read and write
|
||
348B000
|
trusted library allocation
|
page read and write
|
||
5A85000
|
trusted library allocation
|
page read and write
|
||
7050000
|
trusted library allocation
|
page execute and read and write
|
||
15E0000
|
heap
|
page read and write
|
||
BB0000
|
trusted library allocation
|
page read and write
|
||
7D2E000
|
stack
|
page read and write
|
||
6DE0000
|
heap
|
page read and write
|
||
15A0000
|
heap
|
page read and write
|
||
571D000
|
trusted library allocation
|
page read and write
|
||
7240000
|
trusted library allocation
|
page read and write
|
||
7C80000
|
trusted library allocation
|
page read and write
|
||
4707000
|
trusted library allocation
|
page read and write
|
||
490000
|
heap
|
page read and write
|
||
369000
|
unkown
|
page readonly
|
||
1F12000
|
heap
|
page read and write
|
||
2DE0000
|
heap
|
page execute and read and write
|
||
4243000
|
trusted library allocation
|
page read and write
|
||
5F54000
|
trusted library allocation
|
page read and write
|
||
60E0000
|
trusted library allocation
|
page execute and read and write
|
||
4362000
|
trusted library allocation
|
page read and write
|
||
3739000
|
trusted library allocation
|
page read and write
|
||
5FD0000
|
trusted library allocation
|
page read and write
|
||
11AD000
|
heap
|
page read and write
|
||
81C0000
|
trusted library allocation
|
page read and write
|
||
7528000
|
trusted library section
|
page read and write
|
||
2962000
|
trusted library allocation
|
page read and write
|
||
130E000
|
stack
|
page read and write
|
||
4686000
|
trusted library allocation
|
page read and write
|
||
4B28000
|
trusted library allocation
|
page read and write
|
||
2D50000
|
heap
|
page read and write
|
||
5FA0000
|
trusted library allocation
|
page execute and read and write
|
||
3062000
|
trusted library allocation
|
page read and write
|
||
49DE000
|
stack
|
page read and write
|
||
29E2000
|
trusted library allocation
|
page read and write
|
||
55EE000
|
stack
|
page read and write
|
||
3DA2000
|
trusted library allocation
|
page read and write
|
||
457E000
|
trusted library allocation
|
page read and write
|
||
57B4000
|
trusted library allocation
|
page read and write
|
||
140E000
|
stack
|
page read and write
|
||
E5A000
|
heap
|
page read and write
|
||
4FF8000
|
trusted library allocation
|
page read and write
|
||
993E000
|
heap
|
page read and write
|
||
5722000
|
trusted library allocation
|
page read and write
|
||
636D000
|
stack
|
page read and write
|
||
57FB000
|
trusted library allocation
|
page read and write
|
||
5A97000
|
trusted library allocation
|
page read and write
|
||
426D000
|
trusted library allocation
|
page read and write
|
||
995F000
|
heap
|
page read and write
|
||
4636000
|
trusted library allocation
|
page read and write
|
||
2441000
|
heap
|
page read and write
|
||
43B6000
|
trusted library allocation
|
page read and write
|
||
943000
|
heap
|
page read and write
|
||
3376000
|
heap
|
page read and write
|
||
15DD000
|
trusted library allocation
|
page execute and read and write
|
||
1607000
|
trusted library allocation
|
page read and write
|
||
6B1E000
|
stack
|
page read and write
|
||
2B4F000
|
stack
|
page read and write
|
||
5F31000
|
trusted library allocation
|
page read and write
|
||
5A54000
|
trusted library allocation
|
page read and write
|
||
1156000
|
trusted library allocation
|
page execute and read and write
|
||
71F0000
|
trusted library allocation
|
page read and write
|
||
DFF000
|
unkown
|
page readonly
|
||
45A7000
|
trusted library allocation
|
page read and write
|
||
4304000
|
trusted library allocation
|
page read and write
|
||
50C7000
|
trusted library allocation
|
page read and write
|
||
FB0000
|
heap
|
page read and write
|
||
98F2000
|
heap
|
page read and write
|
||
374D000
|
trusted library allocation
|
page read and write
|
||
9905000
|
heap
|
page read and write
|
||
1DAD000
|
trusted library allocation
|
page execute and read and write
|
||
2D94000
|
trusted library allocation
|
page read and write
|
||
57C0000
|
trusted library allocation
|
page read and write
|
||
884E000
|
stack
|
page read and write
|
||
F02000
|
trusted library allocation
|
page read and write
|
||
2992000
|
trusted library allocation
|
page read and write
|
||
15C6000
|
trusted library allocation
|
page execute and read and write
|
||
6D61000
|
heap
|
page read and write
|
||
76BE000
|
stack
|
page read and write
|
||
6970000
|
trusted library allocation
|
page read and write
|
||
999F000
|
heap
|
page read and write
|
||
3070000
|
trusted library allocation
|
page read and write
|
||
865E000
|
direct allocation
|
page read and write
|
||
7A6F000
|
heap
|
page read and write
|
||
4F03000
|
heap
|
page read and write
|
||
F1D000
|
trusted library allocation
|
page read and write
|
||
A87D000
|
stack
|
page read and write
|
||
31F1000
|
trusted library allocation
|
page read and write
|
||
8C50000
|
trusted library allocation
|
page read and write
|
||
12F8000
|
stack
|
page read and write
|
||
361F000
|
heap
|
page read and write
|
||
5781000
|
trusted library allocation
|
page read and write
|
||
E20000
|
trusted library allocation
|
page execute and read and write
|
||
F54000
|
heap
|
page read and write
|
||
3480000
|
heap
|
page read and write
|
||
6450000
|
trusted library allocation
|
page execute and read and write
|
||
89B6000
|
heap
|
page read and write
|
||
DFF000
|
unkown
|
page readonly
|
||
98DD000
|
heap
|
page read and write
|
||
1067000
|
heap
|
page read and write
|
||
1D94000
|
trusted library allocation
|
page read and write
|
||
9957000
|
heap
|
page read and write
|
||
4D40000
|
heap
|
page read and write
|
||
42F2000
|
trusted library allocation
|
page read and write
|
||
BE2000
|
trusted library allocation
|
page read and write
|
||
48E000
|
stack
|
page read and write
|
||
5590000
|
heap
|
page execute and read and write
|
||
6A1D000
|
stack
|
page read and write
|
||
BCD000
|
trusted library allocation
|
page execute and read and write
|
||
52FA000
|
trusted library allocation
|
page read and write
|
||
A25000
|
heap
|
page read and write
|
||
71C0000
|
trusted library allocation
|
page read and write
|
||
427E000
|
trusted library allocation
|
page read and write
|
||
98C7000
|
heap
|
page read and write
|
||
12A2000
|
trusted library allocation
|
page read and write
|
||
5A80000
|
trusted library section
|
page read and write
|
||
64B5000
|
trusted library allocation
|
page read and write
|
||
31A1000
|
heap
|
page read and write
|
||
83AF000
|
stack
|
page read and write
|
||
527E000
|
stack
|
page read and write
|
||
5F10000
|
heap
|
page read and write
|
||
1A3B000
|
heap
|
page read and write
|
||
9BA0000
|
heap
|
page read and write
|
||
32B10FF000
|
stack
|
page read and write
|
||
4319000
|
trusted library allocation
|
page read and write
|
||
7450000
|
trusted library allocation
|
page read and write
|
||
355E000
|
stack
|
page read and write
|
||
73FA000
|
stack
|
page read and write
|
||
8E54000
|
trusted library allocation
|
page read and write
|
||
35CE000
|
stack
|
page read and write
|
||
5A80000
|
heap
|
page read and write
|
||
5F57000
|
trusted library allocation
|
page read and write
|
||
3746000
|
trusted library allocation
|
page read and write
|
||
28F4000
|
trusted library allocation
|
page read and write
|
||
5AA0000
|
heap
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
123E000
|
stack
|
page read and write
|
||
7EDA000
|
heap
|
page read and write
|
||
20FE000
|
stack
|
page read and write
|
||
E1E000
|
stack
|
page read and write
|
||
3361000
|
trusted library allocation
|
page read and write
|
||
692E000
|
stack
|
page read and write
|
||
56BA000
|
trusted library allocation
|
page read and write
|
||
98D8000
|
heap
|
page read and write
|
||
46A0000
|
trusted library allocation
|
page read and write
|
||
1DBA000
|
trusted library allocation
|
page execute and read and write
|
||
58546FC000
|
stack
|
page read and write
|
||
1B1C2760000
|
heap
|
page read and write
|
||
6AE81000
|
unkown
|
page read and write
|
||
3301000
|
trusted library allocation
|
page read and write
|
||
D39000
|
stack
|
page read and write
|
||
7CD0000
|
trusted library allocation
|
page read and write
|
||
52BE000
|
stack
|
page read and write
|
||
42B3000
|
trusted library allocation
|
page read and write
|
||
62EE000
|
stack
|
page read and write
|
||
4720000
|
trusted library allocation
|
page read and write
|
||
375F000
|
trusted library allocation
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
2B8C000
|
stack
|
page read and write
|
||
6AE81000
|
unkown
|
page read and write
|
||
10A0000
|
heap
|
page read and write
|
||
4717000
|
trusted library allocation
|
page read and write
|
||
345E000
|
stack
|
page read and write
|
||
1DA3000
|
trusted library allocation
|
page read and write
|
||
2FEC000
|
heap
|
page read and write
|
||
18D0000
|
trusted library allocation
|
page read and write
|
||
7D30000
|
heap
|
page read and write
|
||
6861000
|
trusted library allocation
|
page read and write
|
||
4DEB000
|
trusted library allocation
|
page read and write
|
||
3364000
|
trusted library allocation
|
page read and write
|
||
8AF1000
|
trusted library allocation
|
page read and write
|
||
15D0000
|
trusted library allocation
|
page read and write
|
||
12A0000
|
trusted library allocation
|
page read and write
|
||
6F5B000
|
trusted library allocation
|
page read and write
|
||
3528000
|
heap
|
page read and write
|
||
549D000
|
trusted library allocation
|
page read and write
|
||
732E000
|
stack
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
43EF000
|
trusted library allocation
|
page read and write
|
||
1D3E000
|
stack
|
page read and write
|
||
716F000
|
stack
|
page read and write
|
||
3C20000
|
direct allocation
|
page read and write
|
||
57CE000
|
stack
|
page read and write
|
||
998F000
|
heap
|
page read and write
|
||
456D000
|
trusted library allocation
|
page read and write
|
||
1910000
|
heap
|
page execute and read and write
|
||
57E0000
|
trusted library allocation
|
page execute and read and write
|
||
337F000
|
trusted library allocation
|
page read and write
|
||
368F000
|
trusted library allocation
|
page read and write
|
||
650A000
|
stack
|
page read and write
|
||
F16000
|
trusted library allocation
|
page read and write
|
||
1A12000
|
heap
|
page read and write
|
||
7FD00000
|
trusted library allocation
|
page execute and read and write
|
||
36E0000
|
remote allocation
|
page read and write
|
||
7A16000
|
heap
|
page read and write
|
||
900000
|
heap
|
page read and write
|
||
8EFD000
|
trusted library allocation
|
page read and write
|
||
5A5E000
|
stack
|
page read and write
|
||
22ECA969000
|
heap
|
page read and write
|
||
8E68000
|
trusted library allocation
|
page read and write
|
||
2905000
|
heap
|
page read and write
|
||
4F8E000
|
stack
|
page read and write
|
||
7E30000
|
trusted library allocation
|
page read and write
|
||
5EFE000
|
stack
|
page read and write
|
||
DCE000
|
stack
|
page read and write
|
||
45F4000
|
trusted library allocation
|
page read and write
|
||
8E95000
|
trusted library allocation
|
page read and write
|
||
EC4000
|
trusted library allocation
|
page read and write
|
||
500000
|
heap
|
page read and write
|
||
E9E000
|
stack
|
page read and write
|
||
16AE000
|
stack
|
page read and write
|
||
C3B000
|
stack
|
page read and write
|
||
BDA000
|
trusted library allocation
|
page execute and read and write
|
||
305E000
|
stack
|
page read and write
|
||
39FC000
|
trusted library allocation
|
page read and write
|
||
440F000
|
trusted library allocation
|
page read and write
|
||
470B000
|
trusted library allocation
|
page read and write
|
||
1085000
|
heap
|
page read and write
|
||
338B000
|
trusted library allocation
|
page read and write
|
||
6FD0000
|
trusted library allocation
|
page read and write
|
||
2A4E000
|
stack
|
page read and write
|
||
7EC1000
|
heap
|
page read and write
|
||
5CBE000
|
heap
|
page read and write
|
||
4601000
|
trusted library allocation
|
page read and write
|
||
2FE0000
|
trusted library allocation
|
page read and write
|
||
7210000
|
trusted library allocation
|
page read and write
|
||
45D1000
|
trusted library allocation
|
page read and write
|
||
4274000
|
trusted library allocation
|
page read and write
|
||
88E0000
|
heap
|
page read and write
|
||
79EC000
|
heap
|
page read and write
|
||
31A2000
|
heap
|
page read and write
|
||
56A000
|
stack
|
page read and write
|
||
6E5A000
|
heap
|
page read and write
|
||
1520000
|
trusted library allocation
|
page read and write
|
||
40C1000
|
trusted library allocation
|
page read and write
|
||
10F9000
|
stack
|
page read and write
|
||
6FA0000
|
trusted library allocation
|
page read and write
|
||
7CA0000
|
trusted library allocation
|
page read and write
|
||
5F5E000
|
stack
|
page read and write
|
||
301F000
|
stack
|
page read and write
|
||
64B0000
|
trusted library allocation
|
page read and write
|
||
12AB000
|
trusted library allocation
|
page execute and read and write
|
||
6B5A000
|
stack
|
page read and write
|
||
55A000
|
heap
|
page read and write
|
||
7B10000
|
trusted library allocation
|
page read and write
|
||
620E000
|
stack
|
page read and write
|
||
EC000
|
unkown
|
page read and write
|
||
15D3000
|
trusted library allocation
|
page execute and read and write
|
||
1388000
|
heap
|
page read and write
|
||
1177000
|
trusted library allocation
|
page execute and read and write
|
||
9D00000
|
heap
|
page read and write
|
||
7612000
|
heap
|
page read and write
|
||
850000
|
trusted library allocation
|
page read and write
|
||
6FF2000
|
heap
|
page read and write
|
||
A8C0000
|
direct allocation
|
page read and write
|
||
547E000
|
stack
|
page read and write
|
||
602F000
|
stack
|
page read and write
|
||
89A2000
|
heap
|
page read and write
|
||
595F000
|
stack
|
page read and write
|
||
73BD000
|
stack
|
page read and write
|
||
5280000
|
heap
|
page read and write
|
||
31E0000
|
heap
|
page read and write
|
||
8AEBB3C000
|
stack
|
page read and write
|
||
1290000
|
heap
|
page read and write
|
||
4348000
|
trusted library allocation
|
page read and write
|
||
1B01000
|
heap
|
page read and write
|
||
6D8C000
|
stack
|
page read and write
|
||
10C7000
|
trusted library allocation
|
page execute and read and write
|
||
32DF000
|
stack
|
page read and write
|
||
1280000
|
trusted library allocation
|
page read and write
|
||
684B000
|
trusted library allocation
|
page read and write
|
||
1802000
|
heap
|
page read and write
|
||
5891000
|
trusted library allocation
|
page read and write
|
||
2E20000
|
heap
|
page read and write
|
||
4409000
|
trusted library allocation
|
page read and write
|
||
3360000
|
trusted library allocation
|
page read and write
|
||
81F000
|
stack
|
page read and write
|
||
6494000
|
trusted library allocation
|
page read and write
|
||
A89000
|
heap
|
page read and write
|
||
F20000
|
heap
|
page read and write
|
||
4624000
|
trusted library allocation
|
page read and write
|
||
6E4F000
|
heap
|
page read and write
|
||
2830000
|
heap
|
page read and write
|
||
2C20000
|
heap
|
page read and write
|
||
4F1E000
|
stack
|
page read and write
|
||
1143000
|
trusted library allocation
|
page read and write
|
||
1380000
|
heap
|
page read and write
|
||
4330000
|
trusted library allocation
|
page read and write
|
||
33F8000
|
trusted library allocation
|
page read and write
|
||
4519000
|
trusted library allocation
|
page read and write
|
||
6A30000
|
trusted library allocation
|
page read and write
|
||
E90000
|
heap
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
421F000
|
trusted library allocation
|
page read and write
|
||
5DFE000
|
stack
|
page read and write
|
||
6118000
|
trusted library allocation
|
page read and write
|
||
6A5A000
|
stack
|
page read and write
|
||
1B1C2950000
|
direct allocation
|
page read and write
|
||
5DE0000
|
trusted library allocation
|
page read and write
|
||
18AF000
|
stack
|
page read and write
|
||
6960000
|
trusted library allocation
|
page read and write
|
||
FE0000
|
heap
|
page read and write
|
||
31A0000
|
heap
|
page read and write
|
||
860000
|
trusted library allocation
|
page read and write
|
||
459A000
|
trusted library allocation
|
page read and write
|
||
8E00000
|
trusted library allocation
|
page read and write
|
||
DFC000
|
unkown
|
page read and write
|
||
371E000
|
stack
|
page read and write
|
||
33DC000
|
trusted library allocation
|
page read and write
|
||
4476000
|
trusted library allocation
|
page read and write
|
||
3567000
|
trusted library allocation
|
page read and write
|
||
1604000
|
trusted library allocation
|
page read and write
|
||
628E000
|
trusted library allocation
|
page read and write
|
||
15E1000
|
trusted library allocation
|
page read and write
|
||
530000
|
direct allocation
|
page read and write
|
||
863000
|
trusted library allocation
|
page execute and read and write
|
||
590F000
|
stack
|
page read and write
|
||
36E0000
|
remote allocation
|
page read and write
|
||
6BDE000
|
stack
|
page read and write
|
||
D90000
|
unkown
|
page readonly
|
||
2440000
|
heap
|
page read and write
|
||
543D000
|
stack
|
page read and write
|
||
707E000
|
stack
|
page read and write
|
||
43A8000
|
trusted library allocation
|
page read and write
|
||
4577000
|
trusted library allocation
|
page read and write
|
||
532E000
|
stack
|
page read and write
|
||
8860000
|
trusted library allocation
|
page read and write
|
||
EFB000
|
trusted library allocation
|
page read and write
|
||
7DA0000
|
trusted library allocation
|
page read and write
|
||
6102000
|
trusted library allocation
|
page read and write
|
||
45E4000
|
trusted library allocation
|
page read and write
|
||
42A5000
|
trusted library allocation
|
page read and write
|
||
2FB1000
|
heap
|
page read and write
|
||
643E000
|
stack
|
page read and write
|
||
AE5000
|
heap
|
page read and write
|
||
4F90000
|
heap
|
page read and write
|
||
58548FF000
|
stack
|
page read and write
|
||
D0000
|
unkown
|
page readonly
|
||
1DC7000
|
trusted library allocation
|
page execute and read and write
|
||
42E8000
|
trusted library allocation
|
page read and write
|
||
64BE000
|
stack
|
page read and write
|
||
4FFE000
|
stack
|
page read and write
|
||
495000
|
heap
|
page read and write
|
||
437000
|
remote allocation
|
page execute and read and write
|
||
19DE000
|
stack
|
page read and write
|
||
5B52000
|
heap
|
page read and write
|
||
31C0000
|
trusted library allocation
|
page read and write
|
||
440000
|
heap
|
page read and write
|
||
381F000
|
stack
|
page read and write
|
||
4337000
|
trusted library allocation
|
page read and write
|
||
14BE000
|
stack
|
page read and write
|
||
424C000
|
trusted library allocation
|
page read and write
|
||
34E2000
|
trusted library allocation
|
page read and write
|
||
33D5000
|
trusted library allocation
|
page read and write
|
||
4668000
|
trusted library allocation
|
page read and write
|
||
A820000
|
heap
|
page read and write
|
||
4E0B000
|
trusted library allocation
|
page read and write
|
||
4F5000
|
heap
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
DFF000
|
unkown
|
page readonly
|
||
1328000
|
heap
|
page read and write
|
||
33E7000
|
trusted library allocation
|
page read and write
|
||
3403000
|
trusted library allocation
|
page read and write
|
||
2444000
|
heap
|
page read and write
|
||
1330000
|
heap
|
page read and write
|
||
2240B020000
|
heap
|
page read and write
|
||
58547FF000
|
stack
|
page read and write
|
||
12A7000
|
trusted library allocation
|
page execute and read and write
|
||
429A000
|
trusted library allocation
|
page read and write
|
||
5289000
|
trusted library allocation
|
page read and write
|
||
7F19000
|
heap
|
page read and write
|
||
8EF0000
|
trusted library allocation
|
page read and write
|
||
34CB000
|
trusted library allocation
|
page read and write
|
||
74F000
|
stack
|
page read and write
|
||
15D7000
|
trusted library allocation
|
page execute and read and write
|
||
151E000
|
stack
|
page read and write
|
||
5FE3000
|
trusted library allocation
|
page read and write
|
||
13A0000
|
heap
|
page read and write
|
||
8AEBFFF000
|
stack
|
page read and write
|
||
5A1B000
|
trusted library allocation
|
page read and write
|
||
8C0000
|
trusted library allocation
|
page read and write
|
||
4697000
|
trusted library allocation
|
page read and write
|
||
43E2000
|
trusted library allocation
|
page read and write
|
||
3211000
|
trusted library allocation
|
page read and write
|
||
114D000
|
trusted library allocation
|
page execute and read and write
|
||
8CC0000
|
trusted library allocation
|
page read and write
|
||
7BFE000
|
stack
|
page read and write
|
||
1A0B000
|
heap
|
page read and write
|
||
519E000
|
stack
|
page read and write
|
||
5F4D000
|
trusted library allocation
|
page read and write
|
||
6C3E000
|
stack
|
page read and write
|
||
31C0000
|
trusted library allocation
|
page execute and read and write
|
||
2FC0000
|
trusted library allocation
|
page read and write
|
||
56EE000
|
stack
|
page read and write
|
||
602E000
|
stack
|
page read and write
|
||
6ECE000
|
heap
|
page read and write
|
||
89E000
|
heap
|
page read and write
|
||
BD2000
|
trusted library allocation
|
page read and write
|
||
2FEB000
|
trusted library allocation
|
page execute and read and write
|
||
71AD000
|
stack
|
page read and write
|
||
4E35000
|
heap
|
page execute and read and write
|
||
53BB6BC000
|
stack
|
page read and write
|
||
3520000
|
heap
|
page read and write
|
||
DD0000
|
heap
|
page execute and read and write
|
||
6A9D000
|
stack
|
page read and write
|
||
6100000
|
heap
|
page execute and read and write
|
||
28EC000
|
trusted library allocation
|
page read and write
|
||
3494000
|
trusted library allocation
|
page read and write
|
||
71E0000
|
trusted library allocation
|
page read and write
|
||
20F703B0000
|
heap
|
page read and write
|
||
10BA000
|
trusted library allocation
|
page execute and read and write
|
||
8CD0000
|
trusted library allocation
|
page read and write
|
||
433A000
|
trusted library allocation
|
page read and write
|
||
D1000
|
unkown
|
page execute read
|
||
4584000
|
trusted library allocation
|
page read and write
|
||
BAC000
|
stack
|
page read and write
|
||
71B0000
|
trusted library allocation
|
page read and write
|
||
301C000
|
trusted library allocation
|
page read and write
|
||
1B1C2850000
|
heap
|
page read and write
|
||
6FB0000
|
trusted library allocation
|
page execute and read and write
|
||
5ADE000
|
heap
|
page read and write
|
||
46FA000
|
trusted library allocation
|
page read and write
|
||
EC0000
|
trusted library allocation
|
page read and write
|
||
18CA000
|
trusted library allocation
|
page execute and read and write
|
||
E5B000
|
stack
|
page read and write
|
||
43F3000
|
trusted library allocation
|
page read and write
|
||
4343000
|
trusted library allocation
|
page read and write
|
||
79B0000
|
heap
|
page read and write
|
||
5330000
|
heap
|
page execute and read and write
|
||
4DF0000
|
heap
|
page execute and read and write
|
||
5CEE000
|
stack
|
page read and write
|
||
7C3D000
|
stack
|
page read and write
|
||
22409600000
|
heap
|
page read and write
|
||
69DE000
|
stack
|
page read and write
|
||
8060000
|
trusted library allocation
|
page read and write
|
||
6BD5000
|
trusted library allocation
|
page read and write
|
||
685E000
|
trusted library allocation
|
page read and write
|
||
8992000
|
heap
|
page read and write
|
||
7087000
|
trusted library allocation
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
6AE8A000
|
unkown
|
page read and write
|
||
7E64000
|
heap
|
page read and write
|
||
20F702D0000
|
heap
|
page read and write
|
||
D3C000
|
stack
|
page read and write
|
||
5F63000
|
trusted library allocation
|
page read and write
|
||
4D52000
|
trusted library allocation
|
page read and write
|
||
5C53000
|
heap
|
page read and write
|
||
53BB73E000
|
stack
|
page read and write
|
||
4631000
|
trusted library allocation
|
page read and write
|
||
3758000
|
trusted library allocation
|
page read and write
|
||
137E000
|
stack
|
page read and write
|
||
3534000
|
trusted library allocation
|
page read and write
|
||
1610000
|
heap
|
page read and write
|
||
31EE000
|
stack
|
page read and write
|
||
1667000
|
heap
|
page read and write
|
||
70EE000
|
stack
|
page read and write
|
||
359D000
|
heap
|
page read and write
|
||
3674000
|
trusted library allocation
|
page read and write
|
||
E50000
|
heap
|
page read and write
|
||
2F60000
|
trusted library allocation
|
page read and write
|
||
90D000
|
heap
|
page read and write
|
||
3352000
|
trusted library allocation
|
page read and write
|
||
64EF000
|
stack
|
page read and write
|
||
8870000
|
trusted library allocation
|
page read and write
|
||
4598000
|
trusted library allocation
|
page read and write
|
||
52E2000
|
trusted library allocation
|
page read and write
|
||
102E000
|
stack
|
page read and write
|
||
4F71000
|
trusted library allocation
|
page read and write
|
||
7CF0000
|
trusted library allocation
|
page read and write
|
||
4180000
|
direct allocation
|
page read and write
|
||
2F1E000
|
stack
|
page read and write
|
||
41F1000
|
trusted library allocation
|
page read and write
|
||
42D1000
|
trusted library allocation
|
page read and write
|
||
5226000
|
trusted library allocation
|
page read and write
|
||
B2E000
|
stack
|
page read and write
|
||
4EDE000
|
stack
|
page read and write
|
||
10A2000
|
heap
|
page read and write
|
||
22ECA8C0000
|
direct allocation
|
page read and write
|
||
98E8000
|
heap
|
page read and write
|
||
7E02000
|
trusted library allocation
|
page read and write
|
||
505E000
|
trusted library allocation
|
page read and write
|
||
34C0000
|
heap
|
page read and write
|
||
1000000
|
heap
|
page read and write
|
||
15FD000
|
trusted library allocation
|
page read and write
|
||
ABE000
|
heap
|
page read and write
|
||
5F10000
|
trusted library allocation
|
page execute and read and write
|
||
168F000
|
stack
|
page read and write
|
||
4232000
|
trusted library allocation
|
page read and write
|
||
1264000
|
trusted library allocation
|
page read and write
|
||
B6E0000
|
direct allocation
|
page read and write
|
||
1250000
|
trusted library allocation
|
page read and write
|
||
6BD0000
|
trusted library allocation
|
page read and write
|
||
26BE000
|
stack
|
page read and write
|
||
7E8000
|
heap
|
page read and write
|
||
716E000
|
stack
|
page read and write
|
||
DFE000
|
stack
|
page read and write
|
||
8E90000
|
trusted library allocation
|
page read and write
|
||
7D10000
|
trusted library allocation
|
page read and write
|
||
1D80000
|
trusted library allocation
|
page read and write
|
||
1D93000
|
trusted library allocation
|
page execute and read and write
|
||
6442000
|
trusted library allocation
|
page read and write
|
||
3011000
|
trusted library allocation
|
page read and write
|
||
478C000
|
trusted library allocation
|
page read and write
|
||
4DA0000
|
trusted library allocation
|
page read and write
|
||
E58000
|
heap
|
page read and write
|
||
22EC8EB0000
|
heap
|
page read and write
|
||
699E000
|
stack
|
page read and write
|
||
6C8A000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
11EF000
|
stack
|
page read and write
|
||
6F72000
|
trusted library allocation
|
page read and write
|
||
522D000
|
stack
|
page read and write
|
||
6DD0000
|
heap
|
page read and write
|
||
146E000
|
stack
|
page read and write
|
||
2927000
|
trusted library allocation
|
page read and write
|
||
2FB0000
|
heap
|
page read and write
|
||
14B0000
|
heap
|
page read and write
|
||
5A50000
|
trusted library allocation
|
page read and write
|
||
4DFE000
|
trusted library allocation
|
page read and write
|
||
2FD6000
|
trusted library allocation
|
page execute and read and write
|
||
5DCE000
|
stack
|
page read and write
|
||
6DB0000
|
trusted library allocation
|
page execute and read and write
|
||
DA0000
|
heap
|
page read and write
|
||
1150000
|
trusted library allocation
|
page read and write
|
||
369000
|
unkown
|
page readonly
|
||
42A7000
|
trusted library allocation
|
page read and write
|
||
5BC2000
|
trusted library allocation
|
page read and write
|
||
5218000
|
trusted library allocation
|
page read and write
|
||
306D000
|
trusted library allocation
|
page read and write
|
||
4D80000
|
heap
|
page execute and read and write
|
||
4323000
|
trusted library allocation
|
page read and write
|
||
D90000
|
unkown
|
page readonly
|
||
4633000
|
trusted library allocation
|
page read and write
|
||
894C000
|
heap
|
page read and write
|
||
1A2B000
|
heap
|
page read and write
|
||
370D000
|
trusted library allocation
|
page read and write
|
||
57B8000
|
trusted library allocation
|
page read and write
|
||
4DFD000
|
stack
|
page read and write
|
||
7C70000
|
trusted library allocation
|
page read and write
|
||
3841000
|
trusted library allocation
|
page read and write
|
||
3A71000
|
trusted library allocation
|
page read and write
|
||
8E48000
|
trusted library allocation
|
page read and write
|
||
424E000
|
trusted library allocation
|
page read and write
|
||
5B38000
|
heap
|
page read and write
|
||
1270000
|
trusted library allocation
|
page read and write
|
||
5F90000
|
heap
|
page execute and read and write
|
||
C10000
|
heap
|
page read and write
|
||
3780000
|
trusted library allocation
|
page read and write
|
||
425B000
|
trusted library allocation
|
page read and write
|
||
7B0E000
|
stack
|
page read and write
|
||
DFF000
|
unkown
|
page readonly
|
||
7A1C000
|
heap
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
18D7000
|
trusted library allocation
|
page execute and read and write
|
||
4279000
|
trusted library allocation
|
page read and write
|
||
6846000
|
trusted library allocation
|
page read and write
|
||
DDF000
|
unkown
|
page readonly
|
||
1160000
|
heap
|
page read and write
|
||
40E8000
|
trusted library allocation
|
page read and write
|
||
42DE000
|
trusted library allocation
|
page read and write
|
||
F10000
|
heap
|
page read and write
|
||
1DE0000
|
trusted library allocation
|
page read and write
|
||
31AF000
|
stack
|
page read and write
|
||
30A1000
|
trusted library allocation
|
page read and write
|
||
E5E000
|
stack
|
page read and write
|
||
128A000
|
trusted library allocation
|
page execute and read and write
|
||
6AD6000
|
heap
|
page read and write
|
||
7460000
|
trusted library allocation
|
page read and write
|
||
4D60000
|
trusted library allocation
|
page execute and read and write
|
||
63AF000
|
stack
|
page read and write
|
||
7D00000
|
trusted library allocation
|
page read and write
|
||
70E000
|
stack
|
page read and write
|
||
3633000
|
heap
|
page read and write
|
||
1401000
|
heap
|
page read and write
|
||
9FEE000
|
stack
|
page read and write
|
||
32FD000
|
trusted library allocation
|
page read and write
|
||
5A20000
|
trusted library allocation
|
page read and write
|
||
3F36000
|
trusted library allocation
|
page read and write
|
||
BB4000
|
trusted library allocation
|
page read and write
|
||
349C000
|
trusted library allocation
|
page read and write
|
||
66AE000
|
stack
|
page read and write
|
||
34DD000
|
trusted library allocation
|
page read and write
|
||
2CED000
|
stack
|
page read and write
|
||
6FE0000
|
trusted library allocation
|
page read and write
|
||
1624000
|
trusted library allocation
|
page read and write
|
||
6350000
|
trusted library allocation
|
page execute and read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
7ECA000
|
heap
|
page read and write
|
||
2BF0000
|
heap
|
page read and write
|
||
243F000
|
stack
|
page read and write
|
||
7090000
|
trusted library allocation
|
page read and write
|
||
2FD2000
|
trusted library allocation
|
page read and write
|
||
74A7000
|
trusted library allocation
|
page read and write
|
||
2EFF000
|
stack
|
page read and write
|
||
32B0FFF000
|
stack
|
page read and write
|
||
365D000
|
trusted library allocation
|
page read and write
|
||
6CDF000
|
stack
|
page read and write
|
||
464E000
|
trusted library allocation
|
page read and write
|
||
5C59000
|
heap
|
page read and write
|
||
149D000
|
trusted library allocation
|
page execute and read and write
|
||
31D0000
|
trusted library allocation
|
page read and write
|
||
7A4E000
|
heap
|
page read and write
|
||
8EAF000
|
trusted library allocation
|
page read and write
|
||
B6E000
|
stack
|
page read and write
|
||
7230000
|
trusted library allocation
|
page read and write
|
||
14AB000
|
heap
|
page read and write
|
||
432A000
|
trusted library allocation
|
page read and write
|
||
BB3000
|
trusted library allocation
|
page execute and read and write
|
||
630E000
|
stack
|
page read and write
|
||
4EFD000
|
stack
|
page read and write
|
||
339A000
|
trusted library allocation
|
page execute and read and write
|
||
DDF000
|
unkown
|
page readonly
|
||
53AC000
|
stack
|
page read and write
|
||
5880000
|
trusted library allocation
|
page execute and read and write
|
||
61AE000
|
stack
|
page read and write
|
||
2F55000
|
trusted library allocation
|
page read and write
|
||
D91000
|
unkown
|
page execute read
|
||
3842000
|
direct allocation
|
page execute and read and write
|
||
2E8E000
|
unkown
|
page read and write
|
||
6940000
|
heap
|
page read and write
|
||
28FC000
|
trusted library allocation
|
page read and write
|
||
57B0000
|
heap
|
page read and write
|
||
3A7C000
|
trusted library allocation
|
page read and write
|
||
3AA4000
|
trusted library allocation
|
page read and write
|
||
6AE8C000
|
unkown
|
page read and write
|
||
113E000
|
stack
|
page read and write
|
||
2D2E000
|
stack
|
page read and write
|
||
2D5B000
|
heap
|
page read and write
|
||
8E40000
|
trusted library allocation
|
page read and write
|
||
18D5000
|
trusted library allocation
|
page execute and read and write
|
||
6FC0000
|
trusted library allocation
|
page read and write
|
||
12A5000
|
heap
|
page read and write
|
||
C18000
|
heap
|
page read and write
|
||
1258000
|
heap
|
page read and write
|
||
160C000
|
heap
|
page read and write
|
||
870000
|
trusted library allocation
|
page read and write
|
||
47B5000
|
heap
|
page execute and read and write
|
||
6A1E000
|
stack
|
page read and write
|
||
E17000
|
stack
|
page read and write
|
||
5B6D000
|
heap
|
page read and write
|
||
11F0000
|
trusted library allocation
|
page read and write
|
||
121E000
|
stack
|
page read and write
|
||
1A22000
|
heap
|
page read and write
|
||
6AE7E000
|
unkown
|
page read and write
|
||
13F0000
|
heap
|
page read and write
|
||
5DD0000
|
heap
|
page read and write
|
||
6124000
|
trusted library allocation
|
page read and write
|
||
3765000
|
trusted library allocation
|
page read and write
|
||
6B70000
|
heap
|
page read and write
|
||
134B000
|
stack
|
page read and write
|
||
76FE000
|
stack
|
page read and write
|
||
79A0000
|
trusted library allocation
|
page read and write
|
||
33F3000
|
trusted library allocation
|
page read and write
|
||
1090000
|
heap
|
page read and write
|
||
71DF000
|
stack
|
page read and write
|
||
1760000
|
heap
|
page read and write
|
||
1C3E000
|
stack
|
page read and write
|
||
19E0000
|
heap
|
page read and write
|
||
10C0000
|
heap
|
page read and write
|
||
408000
|
remote allocation
|
page readonly
|
||
361F000
|
heap
|
page read and write
|
||
2240B029000
|
heap
|
page read and write
|
||
4FA0000
|
trusted library allocation
|
page read and write
|
||
75FB000
|
stack
|
page read and write
|
||
18DB000
|
trusted library allocation
|
page execute and read and write
|
||
5F99000
|
trusted library allocation
|
page read and write
|
||
6E3F000
|
heap
|
page read and write
|
||
1E01000
|
heap
|
page read and write
|
||
2240AEA0000
|
heap
|
page read and write
|
||
84AF000
|
stack
|
page read and write
|
||
3366000
|
trusted library allocation
|
page read and write
|
||
358F000
|
unkown
|
page read and write
|
||
32AC000
|
trusted library allocation
|
page read and write
|
||
2D81000
|
trusted library allocation
|
page read and write
|
||
30A5000
|
trusted library allocation
|
page execute and read and write
|
||
56ED000
|
stack
|
page read and write
|
||
42BE000
|
trusted library allocation
|
page read and write
|
||
6A40000
|
heap
|
page execute and read and write
|
||
26A0000
|
direct allocation
|
page read and write
|
||
32B8000
|
trusted library allocation
|
page read and write
|
||
15D2000
|
trusted library allocation
|
page read and write
|
||
7E40000
|
heap
|
page read and write
|
||
592D000
|
stack
|
page read and write
|
||
7DE000
|
stack
|
page read and write
|
||
682C000
|
stack
|
page read and write
|
||
118E000
|
heap
|
page read and write
|
||
1570000
|
heap
|
page read and write
|
||
2EAE000
|
stack
|
page read and write
|
||
5BCD000
|
stack
|
page read and write
|
||
2680000
|
direct allocation
|
page read and write
|
||
7ED0000
|
heap
|
page read and write
|
||
60D0000
|
heap
|
page read and write
|
||
E90000
|
heap
|
page read and write
|
||
3445000
|
trusted library allocation
|
page read and write
|
||
8D0000
|
heap
|
page readonly
|
||
4532000
|
trusted library allocation
|
page read and write
|
||
2B6F000
|
stack
|
page read and write
|
||
ED0000
|
trusted library allocation
|
page read and write
|
||
22EC8F20000
|
heap
|
page read and write
|
||
68DE000
|
stack
|
page read and write
|
||
42A0000
|
trusted library allocation
|
page read and write
|
||
6AE8A000
|
unkown
|
page read and write
|
||
468B000
|
trusted library allocation
|
page read and write
|
||
4DB0000
|
trusted library allocation
|
page read and write
|
||
4EBF000
|
stack
|
page read and write
|
||
115A000
|
trusted library allocation
|
page execute and read and write
|
||
3AD0000
|
trusted library allocation
|
page read and write
|
||
45EF000
|
trusted library allocation
|
page read and write
|
||
4340000
|
trusted library allocation
|
page read and write
|
||
45A2000
|
trusted library allocation
|
page read and write
|
||
15D0000
|
trusted library allocation
|
page read and write
|
||
D1000
|
unkown
|
page execute read
|
||
584E000
|
stack
|
page read and write
|
||
56FB000
|
trusted library allocation
|
page read and write
|
||
1DC2000
|
trusted library allocation
|
page read and write
|
||
300F000
|
heap
|
page read and write
|
||
6D90000
|
trusted library allocation
|
page read and write
|
||
FBA000
|
stack
|
page read and write
|
||
5300000
|
heap
|
page read and write
|
||
842F000
|
stack
|
page read and write
|
||
1380000
|
heap
|
page read and write
|
||
1646000
|
heap
|
page read and write
|
||
3460000
|
heap
|
page readonly
|
||
20F703D0000
|
heap
|
page read and write
|
||
6F7E000
|
trusted library allocation
|
page read and write
|
||
1647000
|
trusted library allocation
|
page execute and read and write
|
||
1480000
|
trusted library allocation
|
page read and write
|
||
740C000
|
stack
|
page read and write
|
||
155E000
|
stack
|
page read and write
|
||
4FAC000
|
trusted library allocation
|
page read and write
|
||
1A4D000
|
heap
|
page read and write
|
||
362E000
|
trusted library allocation
|
page read and write
|
||
463B000
|
trusted library allocation
|
page read and write
|
||
6E15000
|
heap
|
page read and write
|
||
D90000
|
unkown
|
page readonly
|
||
9FD000
|
stack
|
page read and write
|
||
6FE0000
|
heap
|
page execute and read and write
|
||
763E000
|
stack
|
page read and write
|
||
9AB000
|
heap
|
page read and write
|
||
72AE000
|
stack
|
page read and write
|
||
579D000
|
trusted library allocation
|
page read and write
|
||
DFC000
|
unkown
|
page read and write
|
||
632F000
|
stack
|
page read and write
|
||
2DAD000
|
stack
|
page read and write
|
||
3000000
|
trusted library allocation
|
page read and write
|
||
6E4A000
|
heap
|
page read and write
|
||
10C2000
|
trusted library allocation
|
page read and write
|
||
34C8000
|
heap
|
page read and write
|
||
F58000
|
heap
|
page read and write
|
||
6DCE000
|
stack
|
page read and write
|
||
9CDB000
|
stack
|
page read and write
|
||
16C0000
|
heap
|
page read and write
|
||
3450000
|
heap
|
page read and write
|
||
6F4F000
|
stack
|
page read and write
|
||
5FA5000
|
trusted library allocation
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
8EE0000
|
trusted library allocation
|
page read and write
|
||
10B0000
|
trusted library allocation
|
page read and write
|
||
2ED0000
|
heap
|
page read and write
|
||
D90000
|
unkown
|
page readonly
|
||
2800000
|
heap
|
page read and write
|
||
14A0000
|
trusted library allocation
|
page read and write
|
||
11A0000
|
heap
|
page execute and read and write
|
||
45DB000
|
trusted library allocation
|
page read and write
|
||
3399000
|
trusted library allocation
|
page read and write
|
||
86D000
|
trusted library allocation
|
page execute and read and write
|
||
64C0000
|
trusted library allocation
|
page read and write
|
||
5AA0000
|
trusted library allocation
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
1720000
|
trusted library allocation
|
page read and write
|
||
DFC000
|
unkown
|
page write copy
|
||
EC000
|
unkown
|
page write copy
|
||
7A12000
|
heap
|
page read and write
|
||
6974000
|
trusted library allocation
|
page read and write
|
||
315F000
|
unkown
|
page read and write
|
||
4DA2000
|
trusted library allocation
|
page read and write
|
||
13CB000
|
heap
|
page read and write
|
||
1172000
|
trusted library allocation
|
page read and write
|
||
988D000
|
heap
|
page read and write
|
||
6E3A000
|
heap
|
page read and write
|
||
6AD8000
|
heap
|
page read and write
|
||
530000
|
direct allocation
|
page read and write
|
||
38A0000
|
heap
|
page execute and read and write
|
||
46CE000
|
trusted library allocation
|
page read and write
|
||
4B0000
|
heap
|
page read and write
|
||
6520000
|
trusted library allocation
|
page read and write
|
||
1B1C0E9B000
|
heap
|
page read and write
|
||
1600000
|
trusted library allocation
|
page execute and read and write
|
||
8F8000
|
stack
|
page read and write
|
||
4413000
|
trusted library allocation
|
page read and write
|
||
3160000
|
heap
|
page read and write
|
||
467A000
|
trusted library allocation
|
page read and write
|
||
6AE8E000
|
unkown
|
page readonly
|
||
D91000
|
unkown
|
page execute read
|
||
6AE7E000
|
unkown
|
page read and write
|
||
7F03000
|
heap
|
page read and write
|
||
6962000
|
trusted library allocation
|
page read and write
|
||
57F0000
|
trusted library allocation
|
page read and write
|
||
36E0000
|
remote allocation
|
page read and write
|
||
42B0000
|
trusted library allocation
|
page read and write
|
||
9A5E000
|
direct allocation
|
page read and write
|
||
434E000
|
trusted library allocation
|
page read and write
|
||
1500000
|
heap
|
page read and write
|
||
3363000
|
trusted library allocation
|
page execute and read and write
|
||
22ECA7C0000
|
heap
|
page read and write
|
||
118B000
|
stack
|
page read and write
|
||
2FB4000
|
trusted library allocation
|
page read and write
|
||
5498000
|
trusted library allocation
|
page read and write
|
||
7020000
|
trusted library allocation
|
page read and write
|
||
1133000
|
trusted library allocation
|
page execute and read and write
|
||
2F5E000
|
stack
|
page read and write
|
||
400000
|
remote allocation
|
page readonly
|
||
7E60000
|
heap
|
page read and write
|
||
98A0000
|
heap
|
page read and write
|
||
88F0000
|
heap
|
page read and write
|
||
520000
|
heap
|
page read and write
|
||
46C2000
|
trusted library allocation
|
page read and write
|
||
7C7D000
|
trusted library allocation
|
page read and write
|
||
68BE000
|
stack
|
page read and write
|
||
5AAD000
|
stack
|
page read and write
|
||
244A000
|
heap
|
page read and write
|
||
6854000
|
trusted library allocation
|
page read and write
|
||
458B000
|
trusted library allocation
|
page read and write
|
||
1420000
|
heap
|
page read and write
|
||
45E7000
|
trusted library allocation
|
page read and write
|
||
34C4000
|
trusted library allocation
|
page read and write
|
||
2E40000
|
heap
|
page read and write
|
||
8EAA000
|
trusted library allocation
|
page read and write
|
||
4594000
|
trusted library allocation
|
page read and write
|
||
6001000
|
heap
|
page read and write
|
||
548E000
|
stack
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page execute and read and write
|
||
3090000
|
heap
|
page execute and read and write
|
||
46E8000
|
trusted library allocation
|
page read and write
|
||
3380000
|
trusted library allocation
|
page read and write
|
||
5FE0000
|
trusted library allocation
|
page read and write
|
||
42EB000
|
trusted library allocation
|
page read and write
|
||
5AA4000
|
heap
|
page read and write
|
||
E4000
|
unkown
|
page readonly
|
||
11B5000
|
heap
|
page read and write
|
||
16CE000
|
stack
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
5A70000
|
heap
|
page read and write
|
||
3717000
|
trusted library allocation
|
page read and write
|
||
A45E000
|
direct allocation
|
page read and write
|
||
57A7000
|
trusted library allocation
|
page read and write
|
||
7B7E000
|
stack
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
3F01000
|
trusted library allocation
|
page read and write
|
||
1D90000
|
trusted library allocation
|
page read and write
|
||
2FE2000
|
trusted library allocation
|
page read and write
|
||
FDF000
|
stack
|
page read and write
|
||
13C0000
|
heap
|
page read and write
|
||
1263000
|
trusted library allocation
|
page execute and read and write
|
||
1083000
|
trusted library allocation
|
page execute and read and write
|
||
34B7000
|
trusted library allocation
|
page read and write
|
||
6F10000
|
trusted library allocation
|
page read and write
|
||
5740000
|
trusted library allocation
|
page read and write
|
||
6482000
|
trusted library allocation
|
page read and write
|
||
8A2000
|
trusted library allocation
|
page read and write
|
||
14A8000
|
heap
|
page read and write
|
||
56BE000
|
trusted library allocation
|
page read and write
|
||
2A11000
|
heap
|
page read and write
|
||
46DB000
|
trusted library allocation
|
page read and write
|
||
5AA3000
|
trusted library allocation
|
page read and write
|
||
7E5C000
|
heap
|
page read and write
|
||
16AE000
|
heap
|
page read and write
|
||
16F0000
|
trusted library allocation
|
page read and write
|
||
F53000
|
stack
|
page read and write
|
||
1DF0000
|
heap
|
page read and write
|
||
5F71000
|
trusted library allocation
|
page read and write
|
||
361D000
|
trusted library allocation
|
page read and write
|
||
5BB0000
|
heap
|
page read and write
|
||
1279000
|
heap
|
page read and write
|
||
16D5000
|
heap
|
page read and write
|
||
EFE000
|
trusted library allocation
|
page read and write
|
||
DFC000
|
unkown
|
page read and write
|
||
3417000
|
heap
|
page read and write
|
||
3633000
|
heap
|
page read and write
|
||
5A79000
|
trusted library allocation
|
page read and write
|
||
7A23000
|
heap
|
page read and write
|
||
3320000
|
trusted library allocation
|
page read and write
|
||
151E000
|
stack
|
page read and write
|
||
110E000
|
stack
|
page read and write
|
||
88A000
|
trusted library allocation
|
page execute and read and write
|
||
43A4000
|
trusted library allocation
|
page read and write
|
||
B8E0000
|
direct allocation
|
page read and write
|
||
14F4000
|
stack
|
page read and write
|
||
F25000
|
trusted library allocation
|
page read and write
|
||
462D000
|
trusted library allocation
|
page read and write
|
||
5BA0000
|
trusted library allocation
|
page execute and read and write
|
||
A830000
|
trusted library allocation
|
page execute and read and write
|
||
9E0D000
|
stack
|
page read and write
|
||
BC0000
|
trusted library allocation
|
page read and write
|
||
1295000
|
heap
|
page read and write
|
||
167F000
|
stack
|
page read and write
|
||
13D0000
|
heap
|
page read and write
|
||
5BAC000
|
stack
|
page read and write
|
||
2FB0000
|
trusted library allocation
|
page read and write
|
||
577E000
|
trusted library allocation
|
page read and write
|
||
14C3000
|
trusted library allocation
|
page execute and read and write
|
||
5A45000
|
trusted library allocation
|
page read and write
|
||
DDF000
|
unkown
|
page readonly
|
||
2F1E000
|
unkown
|
page read and write
|
||
32A1000
|
trusted library allocation
|
page read and write
|
||
6115000
|
trusted library allocation
|
page read and write
|
||
4DF5000
|
trusted library allocation
|
page read and write
|
||
4E7E000
|
stack
|
page read and write
|
||
580E000
|
stack
|
page read and write
|
||
7980000
|
trusted library allocation
|
page read and write
|
||
E30000
|
trusted library allocation
|
page read and write
|
||
53BE000
|
stack
|
page read and write
|
||
423000
|
unkown
|
page readonly
|
||
4628000
|
trusted library allocation
|
page read and write
|
||
7080000
|
trusted library allocation
|
page read and write
|
||
22ECA970000
|
direct allocation
|
page read and write
|
||
1493000
|
trusted library allocation
|
page execute and read and write
|
||
BB0000
|
unkown
|
page readonly
|
||
5CA4000
|
heap
|
page read and write
|
||
45CB000
|
trusted library allocation
|
page read and write
|
||
EF0000
|
trusted library allocation
|
page read and write
|
||
466F000
|
trusted library allocation
|
page read and write
|
||
530000
|
direct allocation
|
page read and write
|
||
161E000
|
stack
|
page read and write
|
||
26EE000
|
heap
|
page read and write
|
||
5A94000
|
heap
|
page read and write
|
||
49F1000
|
trusted library allocation
|
page read and write
|
||
153E000
|
stack
|
page read and write
|
||
2EB0000
|
heap
|
page read and write
|
||
1090000
|
heap
|
page read and write
|
||
20F704D0000
|
heap
|
page read and write
|
||
16B0000
|
trusted library allocation
|
page execute and read and write
|
||
52B0000
|
trusted library allocation
|
page execute and read and write
|
||
4562000
|
trusted library allocation
|
page read and write
|
||
CE0000
|
unkown
|
page readonly
|
||
1279000
|
heap
|
page read and write
|
||
2446000
|
heap
|
page read and write
|
||
224095E0000
|
heap
|
page read and write
|
||
1290000
|
trusted library allocation
|
page read and write
|
||
33A0000
|
trusted library allocation
|
page read and write
|
||
6E0D000
|
stack
|
page read and write
|
||
674A000
|
heap
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
3370000
|
heap
|
page read and write
|
||
1648000
|
heap
|
page read and write
|
||
6AE80000
|
unkown
|
page write copy
|
||
20F704D5000
|
heap
|
page read and write
|
||
33BA000
|
trusted library allocation
|
page read and write
|
||
BA0000
|
trusted library allocation
|
page read and write
|
||
30A6000
|
trusted library allocation
|
page read and write
|
||
4E9C000
|
stack
|
page read and write
|
||
4891000
|
trusted library allocation
|
page read and write
|
||
27F6000
|
heap
|
page read and write
|
||
33A5000
|
trusted library allocation
|
page execute and read and write
|
||
8ED0000
|
trusted library allocation
|
page read and write
|
||
2D6D000
|
stack
|
page read and write
|
||
2240960B000
|
heap
|
page read and write
|
||
41E000
|
unkown
|
page write copy
|
||
32B0EFC000
|
stack
|
page read and write
|
||
2441000
|
heap
|
page read and write
|
||
2F52000
|
trusted library allocation
|
page read and write
|
||
42A1000
|
trusted library allocation
|
page read and write
|
||
75BE000
|
stack
|
page read and write
|
||
8E99000
|
trusted library allocation
|
page read and write
|
||
5DCE000
|
stack
|
page read and write
|
||
6AAC000
|
stack
|
page read and write
|
||
5CCF000
|
stack
|
page read and write
|
||
2DAE000
|
stack
|
page read and write
|
||
12A5000
|
heap
|
page read and write
|
||
757E000
|
stack
|
page read and write
|
||
32F0000
|
heap
|
page read and write
|
||
43AA000
|
trusted library allocation
|
page read and write
|
||
5730000
|
trusted library allocation
|
page read and write
|
||
83EE000
|
stack
|
page read and write
|
||
37FF000
|
stack
|
page read and write
|
||
10C0000
|
trusted library allocation
|
page read and write
|
||
991B000
|
heap
|
page read and write
|
||
8EA8000
|
trusted library allocation
|
page read and write
|
||
3330000
|
heap
|
page read and write
|
||
7892000
|
heap
|
page read and write
|
||
996E000
|
heap
|
page read and write
|
||
10CB000
|
trusted library allocation
|
page execute and read and write
|
||
2FE5000
|
trusted library allocation
|
page execute and read and write
|
||
5FCD000
|
stack
|
page read and write
|
||
45E9000
|
trusted library allocation
|
page read and write
|
||
9E5C000
|
stack
|
page read and write
|
||
8E8000
|
trusted library allocation
|
page read and write
|
||
6763000
|
heap
|
page read and write
|
||
A32000
|
heap
|
page read and write
|
||
5C50000
|
heap
|
page read and write
|
||
199000
|
stack
|
page read and write
|
||
345E000
|
stack
|
page read and write
|
||
5300000
|
trusted library allocation
|
page read and write
|
||
1A00000
|
heap
|
page read and write
|
||
649E000
|
stack
|
page read and write
|
||
5FD9000
|
trusted library allocation
|
page read and write
|
||
9FD000
|
heap
|
page read and write
|
||
D3F000
|
stack
|
page execute and read and write
|
||
31E0000
|
trusted library allocation
|
page read and write
|
||
58FA000
|
trusted library allocation
|
page read and write
|
||
1B1C0F90000
|
heap
|
page read and write
|
||
5FF6000
|
heap
|
page read and write
|
||
224094D0000
|
heap
|
page read and write
|
||
388A000
|
trusted library allocation
|
page read and write
|
||
32EF000
|
trusted library allocation
|
page read and write
|
||
2FCD000
|
trusted library allocation
|
page execute and read and write
|
||
6E25000
|
heap
|
page read and write
|
||
63DE000
|
stack
|
page read and write
|
||
5F80000
|
trusted library allocation
|
page read and write
|
||
27BF000
|
stack
|
page read and write
|
||
6462000
|
trusted library allocation
|
page read and write
|
||
1240000
|
trusted library allocation
|
page execute and read and write
|
||
434E000
|
trusted library allocation
|
page read and write
|
||
6AD0000
|
heap
|
page read and write
|
||
5720000
|
heap
|
page execute and read and write
|
||
2986000
|
trusted library allocation
|
page read and write
|
||
5FDB000
|
trusted library allocation
|
page read and write
|
||
B7E0000
|
direct allocation
|
page read and write
|
||
697A000
|
trusted library allocation
|
page read and write
|
||
4FC4000
|
heap
|
page read and write
|
||
BD6000
|
trusted library allocation
|
page execute and read and write
|
||
59B000
|
heap
|
page read and write
|
||
7B30000
|
heap
|
page execute and read and write
|
||
2DD0000
|
heap
|
page read and write
|
||
34A0000
|
trusted library allocation
|
page read and write
|
||
57BA000
|
trusted library allocation
|
page read and write
|
||
15CA000
|
trusted library allocation
|
page execute and read and write
|
||
66EE000
|
stack
|
page read and write
|
||
430E000
|
trusted library allocation
|
page read and write
|
||
6FB0000
|
heap
|
page read and write
|
||
1610000
|
heap
|
page read and write
|
||
11EE000
|
stack
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
2A6E000
|
stack
|
page read and write
|
||
164D000
|
heap
|
page read and write
|
||
31DF000
|
unkown
|
page read and write
|
||
57A9000
|
trusted library allocation
|
page read and write
|
||
7270000
|
trusted library allocation
|
page read and write
|
||
6454000
|
trusted library allocation
|
page read and write
|
||
7B22000
|
trusted library allocation
|
page read and write
|
||
1274000
|
heap
|
page read and write
|
||
5A2E000
|
stack
|
page read and write
|
||
340E000
|
stack
|
page read and write
|
||
57D0000
|
trusted library allocation
|
page read and write
|
||
6E20000
|
heap
|
page read and write
|
||
6AE8C000
|
unkown
|
page read and write
|
||
5F79000
|
trusted library allocation
|
page read and write
|
||
4FB1000
|
trusted library allocation
|
page read and write
|
||
543D000
|
stack
|
page read and write
|
||
1320000
|
trusted library allocation
|
page read and write
|
||
7C50000
|
trusted library allocation
|
page read and write
|
||
7C40000
|
trusted library allocation
|
page execute and read and write
|
||
558D000
|
stack
|
page read and write
|
||
6EBF000
|
heap
|
page read and write
|
||
EDE000
|
stack
|
page read and write
|
||
71AE000
|
stack
|
page read and write
|
||
38EE000
|
stack
|
page read and write
|
||
7F1E8000
|
trusted library allocation
|
page execute and read and write
|
||
14FE000
|
stack
|
page read and write
|
||
6BDA000
|
trusted library allocation
|
page read and write
|
||
5690000
|
heap
|
page execute and read and write
|
||
338D000
|
trusted library allocation
|
page read and write
|
||
8880000
|
trusted library allocation
|
page execute and read and write
|
||
36AE000
|
stack
|
page read and write
|
||
6450000
|
trusted library allocation
|
page read and write
|
||
5FCE000
|
trusted library allocation
|
page read and write
|
||
7C7B000
|
trusted library allocation
|
page read and write
|
||
8E30000
|
trusted library allocation
|
page read and write
|
||
330F000
|
stack
|
page read and write
|
||
5C48000
|
heap
|
page read and write
|
||
7CC0000
|
trusted library allocation
|
page read and write
|
||
109D000
|
heap
|
page read and write
|
||
558E000
|
stack
|
page read and write
|
||
7C80000
|
trusted library allocation
|
page read and write
|
||
2FAE000
|
stack
|
page read and write
|
||
7030000
|
trusted library allocation
|
page read and write
|
||
332B000
|
trusted library allocation
|
page read and write
|
||
7E54000
|
heap
|
page read and write
|
||
5A0E000
|
stack
|
page read and write
|
||
83AD000
|
stack
|
page read and write
|
||
8700000
|
trusted library allocation
|
page execute and read and write
|
||
1150000
|
heap
|
page read and write
|
||
2F01000
|
trusted library allocation
|
page read and write
|
||
363B000
|
trusted library allocation
|
page read and write
|
||
7780000
|
heap
|
page read and write
|
||
4D50000
|
trusted library allocation
|
page read and write
|
||
6850000
|
trusted library allocation
|
page read and write
|
||
6A6E000
|
stack
|
page read and write
|
||
2D2F000
|
stack
|
page read and write
|
||
42EA000
|
trusted library allocation
|
page read and write
|
||
6F41000
|
heap
|
page read and write
|
||
35AE000
|
stack
|
page read and write
|
||
5AD2000
|
heap
|
page read and write
|
||
336D000
|
trusted library allocation
|
page execute and read and write
|
||
461E000
|
trusted library allocation
|
page read and write
|
||
52A0000
|
heap
|
page execute and read and write
|
||
F40000
|
trusted library allocation
|
page read and write
|
||
71D0000
|
trusted library allocation
|
page read and write
|
||
1DC5000
|
trusted library allocation
|
page execute and read and write
|
||
1084000
|
trusted library allocation
|
page read and write
|
||
98F7000
|
heap
|
page read and write
|
||
5F4000
|
heap
|
page read and write
|
||
195E000
|
stack
|
page read and write
|
||
5711000
|
trusted library allocation
|
page read and write
|
||
606E000
|
stack
|
page read and write
|
||
54E0000
|
trusted library allocation
|
page read and write
|
||
458F000
|
trusted library allocation
|
page read and write
|
||
52F0000
|
trusted library allocation
|
page read and write
|
||
4558000
|
trusted library allocation
|
page read and write
|
||
34FE000
|
trusted library allocation
|
page read and write
|
||
1165000
|
heap
|
page read and write
|
||
5FD7000
|
trusted library allocation
|
page read and write
|
||
33C000
|
stack
|
page read and write
|
||
2FB3000
|
trusted library allocation
|
page execute and read and write
|
||
27FE000
|
stack
|
page read and write
|
||
5770000
|
trusted library allocation
|
page read and write
|
||
7E92000
|
heap
|
page read and write
|
||
1360000
|
heap
|
page read and write
|
||
2C20000
|
direct allocation
|
page read and write
|
||
1A64000
|
heap
|
page read and write
|
||
7F08000
|
heap
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
74C5000
|
trusted library allocation
|
page read and write
|
||
EF4000
|
trusted library allocation
|
page read and write
|
||
465B000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
heap
|
page read and write
|
||
1287000
|
heap
|
page read and write
|
||
7450000
|
trusted library allocation
|
page execute and read and write
|
||
937000
|
heap
|
page read and write
|
||
5AA8000
|
heap
|
page read and write
|
||
1B1C27A0000
|
direct allocation
|
page read and write
|
||
58B0000
|
heap
|
page read and write
|
||
32E0000
|
heap
|
page read and write
|
||
6700000
|
trusted library allocation
|
page execute and read and write
|
||
1609000
|
trusted library allocation
|
page read and write
|
||
6D8E000
|
stack
|
page read and write
|
||
645B000
|
trusted library allocation
|
page read and write
|
||
3840000
|
direct allocation
|
page execute and read and write
|
||
2E14000
|
trusted library allocation
|
page read and write
|
||
344E000
|
unkown
|
page read and write
|
||
100F000
|
heap
|
page read and write
|
||
2E90000
|
heap
|
page read and write
|
||
2D40000
|
trusted library allocation
|
page read and write
|
||
1287000
|
trusted library allocation
|
page execute and read and write
|
||
42AA000
|
trusted library allocation
|
page read and write
|
||
35F1000
|
heap
|
page read and write
|
||
647D000
|
trusted library allocation
|
page read and write
|
||
6FF0000
|
trusted library allocation
|
page execute and read and write
|
||
29E6000
|
trusted library allocation
|
page read and write
|
||
74B0000
|
trusted library allocation
|
page read and write
|
||
35EE000
|
heap
|
page read and write
|
||
5F91000
|
trusted library allocation
|
page read and write
|
||
4B80000
|
direct allocation
|
page read and write
|
||
2E9C000
|
heap
|
page read and write
|
||
ED8000
|
trusted library allocation
|
page read and write
|
||
69A2000
|
trusted library allocation
|
page read and write
|
||
1012000
|
heap
|
page read and write
|
||
4628000
|
trusted library allocation
|
page read and write
|
||
7E58000
|
heap
|
page read and write
|
||
7220000
|
trusted library allocation
|
page read and write
|
||
695B000
|
stack
|
page read and write
|
||
6AD0000
|
trusted library allocation
|
page execute and read and write
|
||
E88000
|
heap
|
page read and write
|
||
4F60000
|
heap
|
page read and write
|
||
16B4000
|
heap
|
page read and write
|
||
5C8E000
|
stack
|
page read and write
|
||
3720000
|
trusted library allocation
|
page read and write
|
||
18C6000
|
trusted library allocation
|
page execute and read and write
|
||
1620000
|
trusted library allocation
|
page read and write
|
||
5A4A000
|
heap
|
page execute and read and write
|
||
39F1000
|
trusted library allocation
|
page read and write
|
||
8EBF000
|
trusted library allocation
|
page read and write
|
||
33EE000
|
trusted library allocation
|
page read and write
|
||
83A0000
|
trusted library section
|
page read and write
|
||
B70000
|
heap
|
page read and write
|
||
4ED9000
|
trusted library allocation
|
page read and write
|
||
3363000
|
trusted library allocation
|
page read and write
|
||
3D86000
|
trusted library allocation
|
page read and write
|
||
57A0000
|
trusted library allocation
|
page read and write
|
||
F22000
|
trusted library allocation
|
page read and write
|
||
319B000
|
heap
|
page read and write
|
||
11E1000
|
heap
|
page read and write
|
||
34D6000
|
trusted library allocation
|
page read and write
|
||
3108000
|
trusted library allocation
|
page read and write
|
||
5716000
|
trusted library allocation
|
page read and write
|
||
7D7E000
|
stack
|
page read and write
|
||
22ECA965000
|
heap
|
page read and write
|
||
31D0000
|
heap
|
page execute and read and write
|
||
378000
|
stack
|
page read and write
|
||
5A36000
|
trusted library allocation
|
page read and write
|
||
26C0000
|
direct allocation
|
page read and write
|
||
4701000
|
trusted library allocation
|
page read and write
|
||
8E4B000
|
trusted library allocation
|
page read and write
|
||
33AD000
|
trusted library allocation
|
page read and write
|
||
1083000
|
heap
|
page read and write
|
||
6AE8A000
|
unkown
|
page read and write
|
||
8DF0000
|
trusted library allocation
|
page execute and read and write
|
||
11AF000
|
heap
|
page read and write
|
||
6AE7E000
|
unkown
|
page read and write
|
||
295A000
|
trusted library allocation
|
page read and write
|
||
6112000
|
heap
|
page execute and read and write
|
||
2937000
|
trusted library allocation
|
page read and write
|
||
2D57000
|
heap
|
page read and write
|
||
32AF000
|
stack
|
page read and write
|
||
30A0000
|
heap
|
page read and write
|
||
1A92000
|
heap
|
page read and write
|
||
DFC000
|
unkown
|
page write copy
|
||
BEB000
|
trusted library allocation
|
page execute and read and write
|
||
1DC0000
|
trusted library allocation
|
page read and write
|
||
1DB6000
|
trusted library allocation
|
page execute and read and write
|
||
56C0000
|
trusted library allocation
|
page read and write
|
||
582D000
|
stack
|
page read and write
|
||
57B0000
|
trusted library allocation
|
page read and write
|
||
3780000
|
direct allocation
|
page read and write
|
||
4681000
|
trusted library allocation
|
page read and write
|
||
7000000
|
trusted library allocation
|
page execute and read and write
|
||
6F00000
|
trusted library allocation
|
page execute and read and write
|
||
6980000
|
trusted library allocation
|
page execute and read and write
|
||
D91000
|
unkown
|
page execute read
|
||
88D0000
|
trusted library allocation
|
page read and write
|
||
6844000
|
trusted library allocation
|
page read and write
|
||
1170000
|
trusted library allocation
|
page read and write
|
||
2DED000
|
stack
|
page read and write
|
||
3070000
|
heap
|
page execute and read and write
|
||
7C60000
|
trusted library allocation
|
page execute and read and write
|
||
2780000
|
direct allocation
|
page read and write
|
||
2D30000
|
trusted library allocation
|
page read and write
|
||
1250000
|
heap
|
page read and write
|
||
42A7000
|
trusted library allocation
|
page read and write
|
||
750000
|
heap
|
page read and write
|
||
13B8000
|
heap
|
page read and write
|
||
58B9000
|
trusted library allocation
|
page read and write
|
||
46EF000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
heap
|
page execute and read and write
|
||
5A76000
|
trusted library allocation
|
page read and write
|
||
5F70000
|
trusted library allocation
|
page read and write
|
||
3881000
|
heap
|
page read and write
|
||
F0E000
|
trusted library allocation
|
page read and write
|
||
7BBF000
|
stack
|
page read and write
|
||
33A2000
|
trusted library allocation
|
page read and write
|
||
637E000
|
stack
|
page read and write
|
||
3558000
|
heap
|
page read and write
|
||
3626000
|
trusted library allocation
|
page read and write
|
||
5B7E000
|
heap
|
page read and write
|
||
5CB6000
|
heap
|
page read and write
|
||
8987000
|
heap
|
page read and write
|
||
1B1C2780000
|
direct allocation
|
page read and write
|
||
3050000
|
heap
|
page read and write
|
||
A83000
|
heap
|
page read and write
|
||
52AA000
|
heap
|
page execute and read and write
|
||
4F0000
|
heap
|
page read and write
|
||
22EC8F40000
|
heap
|
page read and write
|
||
22EC8DD0000
|
heap
|
page read and write
|
||
5AAC000
|
heap
|
page read and write
|
||
4620000
|
direct allocation
|
page read and write
|
||
647E000
|
stack
|
page read and write
|
||
1B1C2845000
|
heap
|
page read and write
|
||
EDC000
|
stack
|
page read and write
|
||
7D90000
|
trusted library allocation
|
page read and write
|
||
D90000
|
unkown
|
page readonly
|
||
4880000
|
heap
|
page read and write
|
||
5F20000
|
trusted library allocation
|
page execute and read and write
|
||
8EB5000
|
trusted library allocation
|
page read and write
|
||
65FE000
|
stack
|
page read and write
|
||
42C5000
|
trusted library allocation
|
page read and write
|
||
15EA000
|
heap
|
page read and write
|
||
57C0000
|
trusted library allocation
|
page read and write
|
||
14D0000
|
heap
|
page read and write
|
||
D90000
|
unkown
|
page readonly
|
||
7C60000
|
trusted library allocation
|
page read and write
|
||
13AB000
|
heap
|
page read and write
|
||
4A38000
|
trusted library allocation
|
page read and write
|
||
18D2000
|
trusted library allocation
|
page read and write
|
||
71AE000
|
stack
|
page read and write
|
||
35E6000
|
heap
|
page read and write
|
||
2EBF000
|
heap
|
page read and write
|
||
753E000
|
stack
|
page read and write
|
||
5F99000
|
trusted library allocation
|
page read and write
|
||
8050000
|
trusted library allocation
|
page read and write
|
||
DDC000
|
stack
|
page read and write
|
||
122C000
|
stack
|
page read and write
|
||
1900000
|
trusted library allocation
|
page execute and read and write
|
||
64A0000
|
trusted library allocation
|
page read and write
|
||
382A000
|
trusted library allocation
|
page read and write
|
||
64AC000
|
trusted library allocation
|
page read and write
|
||
3D67000
|
trusted library allocation
|
page read and write
|
||
2240AFC0000
|
direct allocation
|
page read and write
|
||
7463000
|
trusted library allocation
|
page read and write
|
||
31BC000
|
stack
|
page read and write
|
||
1640000
|
trusted library allocation
|
page read and write
|
||
41A000
|
unkown
|
page readonly
|
||
33FC000
|
stack
|
page read and write
|
||
1258000
|
heap
|
page read and write
|
||
98B6000
|
heap
|
page read and write
|
There are 1890 hidden memdumps, click here to show them.