Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Program Files\Windows Media Player\graph\graph.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\random[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\random[2].exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\random[1].exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\random[2].exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\random[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\random[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\random[2].exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1019522001\0516ff61af.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1019523001\abcebc1047.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1019524001\6eea3e30e9.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1019525001\8aec52a3fa.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1019526001\1b73492cb0.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1019527001\ed15fdf974.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\e458d263c0\Gxtuum.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\main\extracted\in.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Intel_PTT_EK_Recertification.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5f
|
PNG image data, 438 x 438, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5fzip
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\json[1].json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\output[1].png
|
PNG image data, 438 x 438, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\sendMessage[1].json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_20xasgg3.h1z.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ishseepu.0zw.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nuy5ucmd.rba.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_z3huhx22.ctr.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\main\7z.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\main\7z.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\main\KillDuplicate.cmd
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\main\extracted\AntiAV.data
|
ASCII text, with very long lines (65536), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\main\extracted\file_1.zip
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\main\extracted\file_2.zip
|
Zip archive data, at least v1.0 to extract, compression method=store
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\main\extracted\file_3.zip
|
Zip archive data, at least v1.0 to extract, compression method=store
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\main\extracted\file_4.zip
|
Zip archive data, at least v1.0 to extract, compression method=store
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\main\extracted\file_5.zip
|
Zip archive data, at least v1.0 to extract, compression method=store
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\main\extracted\file_6.zip
|
Zip archive data, at least v1.0 to extract, compression method=store
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\main\extracted\file_7.zip
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\main\file.bin
|
Zip archive data, at least v2.0 to extract, compression method=store
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\main\file.zip (copy)
|
Zip archive data, at least v2.0 to extract, compression method=store
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\main\main.bat
|
Unicode text, UTF-16, little-endian text, with no line terminators
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\json[1].json
|
JSON data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\output[1].png
|
PNG image data, 438 x 438, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\sendMessage[1].json
|
JSON data
|
dropped
|
||
C:\Windows\Tasks\Gxtuum.job
|
data
|
dropped
|
||
C:\Windows\Tasks\skotes.job
|
data
|
dropped
|
||
\Device\ConDrv
|
ASCII text, with CRLF, CR line terminators
|
dropped
|
There are 40 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
|
"C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
|
||
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
|
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
|
||
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
|
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
|
||
C:\Users\user\AppData\Local\Temp\1019522001\0516ff61af.exe
|
"C:\Users\user\AppData\Local\Temp\1019522001\0516ff61af.exe"
|
||
C:\Users\user\AppData\Local\Temp\1019523001\abcebc1047.exe
|
"C:\Users\user\AppData\Local\Temp\1019523001\abcebc1047.exe"
|
||
C:\Users\user\AppData\Local\Temp\e458d263c0\Gxtuum.exe
|
"C:\Users\user\AppData\Local\Temp\e458d263c0\Gxtuum.exe"
|
||
C:\Users\user\AppData\Local\Temp\e458d263c0\Gxtuum.exe
|
C:\Users\user\AppData\Local\Temp\e458d263c0\Gxtuum.exe
|
||
C:\Users\user\AppData\Local\Temp\1019524001\6eea3e30e9.exe
|
"C:\Users\user\AppData\Local\Temp\1019524001\6eea3e30e9.exe"
|
||
C:\Users\user\AppData\Local\Temp\1019524001\6eea3e30e9.exe
|
C:\Users\user\AppData\Local\Temp\1019524001\6eea3e30e9.exe
|
||
C:\Users\user\AppData\Local\Temp\1019525001\8aec52a3fa.exe
|
"C:\Users\user\AppData\Local\Temp\1019525001\8aec52a3fa.exe"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\main\main.bat" /S"
|
||
C:\Windows\System32\attrib.exe
|
attrib +H "in.exe"
|
||
C:\Users\user\AppData\Local\Temp\main\in.exe
|
"in.exe"
|
||
C:\Windows\System32\attrib.exe
|
attrib +H +S C:\Users\user\AppData\Roaming\Intel_PTT_EK_Recertification.exe
|
||
C:\Windows\System32\attrib.exe
|
attrib +H C:\Users\user\AppData\Roaming\Intel_PTT_EK_Recertification.exe
|
||
C:\Windows\System32\schtasks.exe
|
schtasks /f /CREATE /TN "Intel_PTT_EK_Recertification" /TR "C:\Users\user\AppData\Roaming\Intel_PTT_EK_Recertification.exe"
/SC MINUTE
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell ping 127.0.0.1; del in.exe
|
||
C:\Users\user\AppData\Roaming\Intel_PTT_EK_Recertification.exe
|
C:\Users\user\AppData\Roaming\Intel_PTT_EK_Recertification.exe
|
||
C:\Windows\explorer.exe
|
explorer.exe
|
||
C:\Windows\System32\PING.EXE
|
"C:\Windows\system32\PING.EXE" 127.0.0.1
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell ping 127.1.10.1; del Intel_PTT_EK_Recertification.exe
|
||
C:\Windows\System32\PING.EXE
|
"C:\Windows\system32\PING.EXE" 127.1.10.1
|
||
C:\Users\user\AppData\Local\Temp\1019526001\1b73492cb0.exe
|
"C:\Users\user\AppData\Local\Temp\1019526001\1b73492cb0.exe"
|
||
C:\Users\user\AppData\Local\Temp\1019527001\ed15fdf974.exe
|
"C:\Users\user\AppData\Local\Temp\1019527001\ed15fdf974.exe"
|
||
C:\Users\user\AppData\Roaming\Intel_PTT_EK_Recertification.exe
|
C:\Users\user\AppData\Roaming\Intel_PTT_EK_Recertification.exe
|
||
C:\Users\user\AppData\Local\Temp\e458d263c0\Gxtuum.exe
|
C:\Users\user\AppData\Local\Temp\e458d263c0\Gxtuum.exe
|
||
C:\Program Files\Windows Media Player\graph\graph.exe
|
"C:\Program Files\Windows Media Player\graph\graph.exe"
|
||
C:\Program Files\Windows Media Player\graph\graph.exe
|
"C:\Program Files\Windows Media Player\graph\graph.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\mode.com
|
mode 65,10
|
||
C:\Users\user\AppData\Local\Temp\main\7z.exe
|
7z.exe e file.zip -p24291711423417250691697322505 -oextracted
|
||
C:\Users\user\AppData\Local\Temp\main\7z.exe
|
7z.exe e extracted/file_7.zip -oextracted
|
||
C:\Users\user\AppData\Local\Temp\main\7z.exe
|
7z.exe e extracted/file_6.zip -oextracted
|
||
C:\Users\user\AppData\Local\Temp\main\7z.exe
|
7z.exe e extracted/file_5.zip -oextracted
|
||
C:\Users\user\AppData\Local\Temp\main\7z.exe
|
7z.exe e extracted/file_4.zip -oextracted
|
||
C:\Users\user\AppData\Local\Temp\main\7z.exe
|
7z.exe e extracted/file_3.zip -oextracted
|
||
C:\Users\user\AppData\Local\Temp\main\7z.exe
|
7z.exe e extracted/file_2.zip -oextracted
|
||
C:\Users\user\AppData\Local\Temp\main\7z.exe
|
7z.exe e extracted/file_1.zip -oextracted
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Program Files\Windows Media Player\graph\graph.exe
|
"C:\Program Files\Windows Media Player\graph\graph.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Program Files\Windows Media Player\graph\graph.exe
|
"C:\Program Files\Windows Media Player\graph\graph.exe"
|
There are 36 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://www.cloudflare.com/learning/access-management/phishing-attack/
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://ipinfo.io/missingauth
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
|
unknown
|
||
https://cheapptaxysu.click
|
unknown
|
||
https://ipinfo.io/jsonN/Aipcountry
|
unknown
|
||
aspecteirs.lat
|
|||
https://link.storjshare.io/s/jx3obcnqgxa2u364c52wel6vrxba/cardan-shafts/Trazor%20(Software).zip?down
|
unknown
|
||
https://link.storjshare.io/s/jvrb5lh3pynx3et56bisfuuguvoq/cardan-shafts/Electrum%20(Software)(1).zip
|
unknown
|
||
https://docs.google.com/
|
unknown
|
||
https://payments.goo
|
unknown
|
||
https://api.telegram.org/pb
|
unknown
|
||
https://ipinfo.io/json_
|
unknown
|
||
https://ipinfo.io/json
|
34.117.59.81
|
||
https://chrome.google.com/webstoreu
|
unknown
|
||
https://sandbox.google.com/payments/v4/js/integrator.js1BACCDE8yst
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
|
unknown
|
||
http://31.41.244.11/files/karl/random.exeSSC:
|
unknown
|
||
http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0#
|
unknown
|
||
https://ipinfo.io/jsonj1O
|
unknown
|
||
http://home.fivetk5ht.top/zldPRFrmVFHTtKntGpOv1734579851?argume4
|
unknown
|
||
https://chrome.google.com/webstoreb
|
unknown
|
||
http://31.41.244.11/files/karl/random.exe
|
31.41.244.11
|
||
https://www.google.com/X
|
unknown
|
||
https://chrome.google.com/webstore
|
unknown
|
||
http://31.41.244.11/files/geopoxid/random.exeh
|
unknown
|
||
https://drive-daily-2.corp.google.com/
|
unknown
|
||
https://payments.google.com/payments/v4/js/integrator.js
|
unknown
|
||
http://31.41.244.11/files/geopoxid/random.exei
|
unknown
|
||
http://31.41.244.11/files/burpin1/random.exe_
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
|
unknown
|
||
http://home.fivetk5ht.top/zldPRFrmVFHTtKntGpOv17
|
unknown
|
||
https://drive.google.com/uc?id=
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://xmrig.com/wizard
|
unknown
|
||
energyaffai.lat
|
|||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://drive-daily-1.corp.google.com/
|
unknown
|
||
http://31.41.244.11/files/martin/random.exe
|
unknown
|
||
https://drive-daily-5.corp.google.com/
|
unknown
|
||
https://treehoneyi.click/api6
|
unknown
|
||
https://www.cloudflare.com/5xx-error-landing
|
unknown
|
||
http://home.fivetk5ht.top/zldPRFrmVFHTtKntGpOv1734579851?argume
|
unknown
|
||
https://httpbin.org/ipbefore
|
unknown
|
||
https://treehoneyi.click/api
|
unknown
|
||
https://cheapptaxysu.click/77
|
unknown
|
||
https://ipinfo.io/
|
unknown
|
||
http://31.41.244.11/files/geopoxid/random.exe
|
unknown
|
||
http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0z
|
unknown
|
||
https://chrome.google.com/webstoreD
|
unknown
|
||
https://drive-preprod.co
|
unknown
|
||
https://api.telegram.org/-application-key
|
unknown
|
||
http://home.fivetk5ht.top/zldPRFrmVFHTtKntGpOv1734579851
|
185.121.15.192
|
||
https://drive-preprod.corp.google.com/
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
|
unknown
|
||
grannyejh.lat
|
|||
https://sandbox.google.com/
|
unknown
|
||
https://api.telegram.org/rn
|
unknown
|
||
http://html4/loose.dtd
|
unknown
|
||
http://ocsp.sectigo.com0
|
unknown
|
||
https://api.telegram.org/j
|
unknown
|
||
https://drive-autopush.co
|
unknown
|
||
necklacebudi.lat
|
|||
https://drive.google.com/drive/installwebapp?usp=chrome_default
|
unknown
|
||
https://api.telegram.org/r
|
unknown
|
||
https://docs.rs/getrandom#nodejs-es-module-support
|
unknown
|
||
http://31.41.244.11/files/geopoxid/random.exe1
|
unknown
|
||
https://api.telegram.org/Z
|
unknown
|
||
http://.css
|
unknown
|
||
https://api.telegram.org/G
|
unknown
|
||
http://31.41.244.11/files/zhigarko/random.exeu
|
unknown
|
||
https://cheapptaxysu.click:443/api
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://api.telegram.org/
|
unknown
|
||
https://www.google.com/le.com
|
unknown
|
||
https://api.telegram.org/edia
|
unknown
|
||
crosshuaht.lat
|
|||
http://home.fivetk5ht.top/zldPRFrmVFHTtKntGpOv1734579851?argument=uKsqdVCOyF9DZVCd1734801424L
|
unknown
|
||
http://31.41.244.11/files/martin/random.exe.
|
unknown
|
||
https://api.telegram.org/:
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
http://.jpg
|
unknown
|
||
https://docs.google.co0
|
unknown
|
||
https://api.telegram.org/C
|
unknown
|
||
http://31.41.244.11/files/karl/random.exeegUF
|
unknown
|
||
https://api.telegram.org/bot7855878545:AAEEMUvgpX9jTAxlDd2gM_Sbv2jbI6-5_0o
|
unknown
|
||
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://drive-autopush.corp.google.com/
|
unknown
|
||
https://drive.usercontent.google.com/
|
unknown
|
||
https://httpbin.org/ip
|
34.226.108.155
|
||
http://31.41.244.11/files/burpin1/random.exe
|
unknown
|
||
https://drive.usercontent.google.com/(F
|
unknown
|
||
http://home.fivetk5ht.top/zldPR
|
unknown
|
||
https://docs.google.com/presentation/installwebapp?usp=chrome_defaultc
|
unknown
|
||
https://www.cloudflare.com/learni
|
unknown
|
||
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
home.fivetk5ht.top
|
185.121.15.192
|
||
treehoneyi.click
|
172.67.180.113
|
||
cheapptaxysu.click
|
104.21.67.146
|
||
ipinfo.io
|
34.117.59.81
|
||
drive.google.com
|
172.217.17.46
|
||
drive.usercontent.google.com
|
172.217.17.65
|
||
api.telegram.org
|
149.154.167.220
|
||
httpbin.org
|
34.226.108.155
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.43
|
unknown
|
Portugal
|
||
127.0.0.1
|
unknown
|
unknown
|
||
127.1.10.1
|
unknown
|
unknown
|
||
185.121.15.192
|
home.fivetk5ht.top
|
Spain
|
||
212.193.31.8
|
unknown
|
Russian Federation
|
||
172.217.17.46
|
drive.google.com
|
United States
|
||
34.117.59.81
|
ipinfo.io
|
United States
|
||
149.154.167.220
|
api.telegram.org
|
United Kingdom
|
||
34.226.108.155
|
httpbin.org
|
United States
|
||
172.217.17.65
|
drive.usercontent.google.com
|
United States
|
||
104.21.67.146
|
cheapptaxysu.click
|
United States
|
||
31.41.244.11
|
unknown
|
Russian Federation
|
There are 2 hidden IPs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
Graph
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run
|
Graph
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1100000
|
direct allocation
|
page readonly
|
||
361000
|
unkown
|
page execute and read and write
|
||
361000
|
unkown
|
page execute and read and write
|
||
17227910000
|
unkown
|
page read and write
|
||
14040B000
|
unkown
|
page read and write
|
||
DA1000
|
unkown
|
page execute and read and write
|
||
B5A000
|
heap
|
page read and write
|
||
B39000
|
heap
|
page read and write
|
||
131C27B0000
|
unkown
|
page read and write
|
||
1402DD000
|
unkown
|
page readonly
|
||
361000
|
unkown
|
page execute and read and write
|
||
27997630000
|
trusted library allocation
|
page read and write
|
||
145E000
|
heap
|
page read and write
|
||
2479E985000
|
heap
|
page read and write
|
||
140C000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
4AA0000
|
direct allocation
|
page execute and read and write
|
||
2479E91B000
|
heap
|
page read and write
|
||
4A80000
|
direct allocation
|
page execute and read and write
|
||
1430000
|
heap
|
page read and write
|
||
24C99AE0000
|
trusted library allocation
|
page read and write
|
||
5AA000
|
unkown
|
page execute and read and write
|
||
8E5000
|
unkown
|
page write copy
|
||
2DFE000
|
stack
|
page read and write
|
||
583BFFE000
|
stack
|
page read and write
|
||
B23000
|
heap
|
page read and write
|
||
6B6000
|
unkown
|
page write copy
|
||
4691000
|
heap
|
page read and write
|
||
1FED9E14000
|
heap
|
page read and write
|
||
5FA000
|
unkown
|
page execute and read and write
|
||
281AB8D0000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
5AC000
|
unkown
|
page read and write
|
||
72C0000
|
direct allocation
|
page execute and read and write
|
||
557000
|
unkown
|
page execute and write copy
|
||
5E19000
|
trusted library allocation
|
page read and write
|
||
806E000
|
stack
|
page read and write
|
||
4C5F000
|
stack
|
page read and write
|
||
6F20000
|
heap
|
page read and write
|
||
7FF6D9D50000
|
unkown
|
page readonly
|
||
1ACEAFF000
|
stack
|
page read and write
|
||
47FE000
|
stack
|
page read and write
|
||
D3E000
|
stack
|
page read and write
|
||
1B1B4270000
|
trusted library allocation
|
page read and write
|
||
671000
|
unkown
|
page execute and read and write
|
||
24C99AE0000
|
trusted library allocation
|
page read and write
|
||
5E31000
|
trusted library allocation
|
page read and write
|
||
2479E98E000
|
heap
|
page read and write
|
||
5E09000
|
trusted library allocation
|
page read and write
|
||
432F000
|
stack
|
page read and write
|
||
6930000
|
direct allocation
|
page read and write
|
||
B85B9DC000
|
stack
|
page read and write
|
||
3C2000
|
unkown
|
page execute and write copy
|
||
4A30000
|
direct allocation
|
page execute and read and write
|
||
621E000
|
stack
|
page read and write
|
||
382E000
|
stack
|
page read and write
|
||
8CA000
|
heap
|
page read and write
|
||
7FF7ECDED000
|
unkown
|
page read and write
|
||
5450000
|
direct allocation
|
page execute and read and write
|
||
B14000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
7FF7ECD61000
|
unkown
|
page execute read
|
||
F89000
|
unkown
|
page execute and read and write
|
||
B10000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
13C9000
|
heap
|
page read and write
|
||
3030000
|
direct allocation
|
page read and write
|
||
4C90000
|
direct allocation
|
page execute and read and write
|
||
1FED99A0000
|
remote allocation
|
page read and write
|
||
2479E8E0000
|
trusted library allocation
|
page read and write
|
||
7FF6DA1DF000
|
unkown
|
page write copy
|
||
B14000
|
heap
|
page read and write
|
||
549E000
|
stack
|
page read and write
|
||
290F000
|
stack
|
page read and write
|
||
5C3000
|
unkown
|
page execute and write copy
|
||
5E35000
|
trusted library allocation
|
page read and write
|
||
2A2F000
|
stack
|
page read and write
|
||
1019000
|
unkown
|
page execute and read and write
|
||
5E12000
|
trusted library allocation
|
page read and write
|
||
5F6000
|
unkown
|
page execute and write copy
|
||
B14000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
B34000
|
unkown
|
page execute and read and write
|
||
B45000
|
heap
|
page read and write
|
||
13CB000
|
heap
|
page read and write
|
||
D96000
|
unkown
|
page execute and read and write
|
||
19E8000
|
heap
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
5DD5000
|
trusted library allocation
|
page read and write
|
||
E81000
|
unkown
|
page readonly
|
||
4691000
|
heap
|
page read and write
|
||
28E2CC99000
|
heap
|
page read and write
|
||
E81000
|
unkown
|
page readonly
|
||
5AC000
|
unkown
|
page read and write
|
||
4471000
|
heap
|
page read and write
|
||
598E000
|
stack
|
page read and write
|
||
3CB000
|
unkown
|
page execute and read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
6FE000
|
stack
|
page read and write
|
||
1FED92CA000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
683000
|
unkown
|
page execute and write copy
|
||
5E5F000
|
trusted library allocation
|
page read and write
|
||
27997630000
|
trusted library allocation
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
13B3000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
2B2E000
|
stack
|
page read and write
|
||
5E12000
|
trusted library allocation
|
page read and write
|
||
1002000
|
unkown
|
page execute and read and write
|
||
4691000
|
heap
|
page read and write
|
||
38FF000
|
stack
|
page read and write
|
||
78D000
|
stack
|
page read and write
|
||
41EF000
|
stack
|
page read and write
|
||
1930000
|
direct allocation
|
page execute and read and write
|
||
3C7F000
|
stack
|
page read and write
|
||
4A60000
|
direct allocation
|
page execute and read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
392F000
|
stack
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
64BB000
|
heap
|
page read and write
|
||
28909AC0000
|
heap
|
page read and write
|
||
28909C05000
|
heap
|
page read and write
|
||
5E5F000
|
trusted library allocation
|
page read and write
|
||
682000
|
unkown
|
page execute and read and write
|
||
5ACE000
|
stack
|
page read and write
|
||
16FF000
|
stack
|
page read and write
|
||
1B1B4270000
|
trusted library allocation
|
page read and write
|
||
1FED929F000
|
heap
|
page read and write
|
||
342F000
|
stack
|
page read and write
|
||
A6E000
|
heap
|
page read and write
|
||
131C1195000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
7FF7EDA90000
|
unkown
|
page readonly
|
||
5E02000
|
trusted library allocation
|
page read and write
|
||
17D0000
|
heap
|
page read and write
|
||
540000
|
unkown
|
page readonly
|
||
DC7000
|
unkown
|
page execute and read and write
|
||
28E2CC99000
|
heap
|
page read and write
|
||
5E5F000
|
trusted library allocation
|
page read and write
|
||
3F6F000
|
stack
|
page read and write
|
||
53D000
|
unkown
|
page execute and read and write
|
||
5C7000
|
unkown
|
page execute and read and write
|
||
71C0000
|
direct allocation
|
page execute and read and write
|
||
683000
|
unkown
|
page execute and write copy
|
||
5E12000
|
trusted library allocation
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
28E2CC55000
|
heap
|
page read and write
|
||
1ACE77A000
|
stack
|
page read and write
|
||
5DE8000
|
trusted library allocation
|
page read and write
|
||
131C0DD0000
|
heap
|
page read and write
|
||
5E5F000
|
trusted library allocation
|
page read and write
|
||
2479E964000
|
heap
|
page read and write
|
||
5D5F000
|
stack
|
page read and write
|
||
D80000
|
direct allocation
|
page read and write
|
||
5E09000
|
trusted library allocation
|
page read and write
|
||
AA1000
|
heap
|
page read and write
|
||
5AC000
|
unkown
|
page read and write
|
||
7A0000
|
unkown
|
page readonly
|
||
6AE1000
|
heap
|
page read and write
|
||
1015000
|
unkown
|
page execute and write copy
|
||
5E02000
|
trusted library allocation
|
page read and write
|
||
5DEE000
|
trusted library allocation
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
B09000
|
heap
|
page read and write
|
||
4880000
|
trusted library allocation
|
page read and write
|
||
2479E974000
|
heap
|
page read and write
|
||
4430000
|
direct allocation
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
30AE000
|
stack
|
page read and write
|
||
27997630000
|
trusted library allocation
|
page read and write
|
||
1450000
|
heap
|
page read and write
|
||
247A0689000
|
heap
|
page read and write
|
||
545F000
|
stack
|
page read and write
|
||
1830000
|
heap
|
page read and write
|
||
14E4000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
24C99AE0000
|
trusted library allocation
|
page read and write
|
||
5AF000
|
unkown
|
page readonly
|
||
1420000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
2451E0C0000
|
trusted library allocation
|
page read and write
|
||
850000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
593000
|
unkown
|
page execute and write copy
|
||
6AE1000
|
heap
|
page read and write
|
||
37FE000
|
stack
|
page read and write
|
||
247A0670000
|
heap
|
page read and write
|
||
DA5B7CD000
|
stack
|
page read and write
|
||
5DF7000
|
trusted library allocation
|
page read and write
|
||
71C0000
|
direct allocation
|
page execute and read and write
|
||
5E52000
|
trusted library allocation
|
page read and write
|
||
13EB000
|
heap
|
page read and write
|
||
2C2F000
|
stack
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
27997760000
|
heap
|
page read and write
|
||
5E09000
|
trusted library allocation
|
page read and write
|
||
2451DF90000
|
heap
|
page read and write
|
||
521F000
|
stack
|
page read and write
|
||
28BF000
|
stack
|
page read and write
|
||
5E24000
|
trusted library allocation
|
page read and write
|
||
376F000
|
stack
|
page read and write
|
||
1450000
|
heap
|
page read and write
|
||
356F000
|
stack
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
1FED92A4000
|
heap
|
page read and write
|
||
A98000
|
heap
|
page read and write
|
||
3030000
|
direct allocation
|
page read and write
|
||
5BD000
|
unkown
|
page execute and write copy
|
||
1B1B42F8000
|
heap
|
page read and write
|
||
1062000
|
unkown
|
page execute and read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
66E000
|
unkown
|
page execute and write copy
|
||
AA4000
|
heap
|
page read and write
|
||
B0E000
|
stack
|
page read and write
|
||
594000
|
unkown
|
page execute and read and write
|
||
AFD000
|
stack
|
page read and write
|
||
5AC000
|
unkown
|
page read and write
|
||
4471000
|
heap
|
page read and write
|
||
5E12000
|
trusted library allocation
|
page read and write
|
||
10B1000
|
unkown
|
page execute and read and write
|
||
142B000
|
heap
|
page read and write
|
||
BF8000
|
unkown
|
page execute and read and write
|
||
1B1B4270000
|
trusted library allocation
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
5AF000
|
unkown
|
page readonly
|
||
16463CBB000
|
heap
|
page read and write
|
||
96E000
|
stack
|
page read and write
|
||
58F000
|
unkown
|
page readonly
|
||
DA1000
|
unkown
|
page execute and write copy
|
||
58F000
|
unkown
|
page readonly
|
||
4E30000
|
direct allocation
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
2479E947000
|
heap
|
page read and write
|
||
2479E991000
|
heap
|
page read and write
|
||
4E00000
|
direct allocation
|
page read and write
|
||
71C0000
|
direct allocation
|
page execute and read and write
|
||
2730000
|
direct allocation
|
page read and write
|
||
5E49000
|
trusted library allocation
|
page read and write
|
||
2479E985000
|
heap
|
page read and write
|
||
1E2753F0000
|
direct allocation
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
562000
|
unkown
|
page execute and read and write
|
||
636C000
|
stack
|
page read and write
|
||
5E12000
|
trusted library allocation
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
247A067A000
|
heap
|
page read and write
|
||
5E02000
|
trusted library allocation
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
59EC000
|
stack
|
page read and write
|
||
5E02000
|
trusted library allocation
|
page read and write
|
||
700000
|
heap
|
page read and write
|
||
2BAE000
|
stack
|
page read and write
|
||
8C6000
|
heap
|
page read and write
|
||
45E0000
|
direct allocation
|
page read and write
|
||
1007000
|
unkown
|
page execute and read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
27997630000
|
trusted library allocation
|
page read and write
|
||
58F000
|
unkown
|
page readonly
|
||
2479E96B000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
5F5000
|
unkown
|
page execute and read and write
|
||
1026000
|
unkown
|
page execute and write copy
|
||
6AE1000
|
heap
|
page read and write
|
||
5F5000
|
unkown
|
page execute and read and write
|
||
140A000
|
heap
|
page read and write
|
||
452F000
|
stack
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
E96000
|
unkown
|
page read and write
|
||
24C99D70000
|
heap
|
page read and write
|
||
AA1000
|
heap
|
page read and write
|
||
5E01000
|
trusted library allocation
|
page read and write
|
||
5E32000
|
trusted library allocation
|
page read and write
|
||
4CB0000
|
direct allocation
|
page execute and read and write
|
||
36EE000
|
stack
|
page read and write
|
||
56C000
|
unkown
|
page execute and read and write
|
||
D80000
|
direct allocation
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
5DEA000
|
trusted library allocation
|
page read and write
|
||
592000
|
unkown
|
page execute and read and write
|
||
35C000
|
stack
|
page read and write
|
||
65D000
|
unkown
|
page execute and write copy
|
||
5DEF000
|
trusted library allocation
|
page read and write
|
||
5EDC000
|
trusted library allocation
|
page read and write
|
||
71C0000
|
direct allocation
|
page execute and read and write
|
||
5FAD000
|
trusted library allocation
|
page read and write
|
||
1036000
|
unkown
|
page execute and write copy
|
||
1443000
|
heap
|
page read and write
|
||
5AC000
|
unkown
|
page write copy
|
||
45E0000
|
direct allocation
|
page read and write
|
||
5E12000
|
trusted library allocation
|
page read and write
|
||
540000
|
unkown
|
page readonly
|
||
1FED92B3000
|
heap
|
page read and write
|
||
785E000
|
stack
|
page read and write
|
||
816E000
|
stack
|
page read and write
|
||
307E000
|
stack
|
page read and write
|
||
8AE000
|
stack
|
page read and write
|
||
3B6C000
|
stack
|
page read and write
|
||
3A30000
|
direct allocation
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
27BE000
|
stack
|
page read and write
|
||
6A60000
|
heap
|
page read and write
|
||
38EE000
|
stack
|
page read and write
|
||
540000
|
unkown
|
page readonly
|
||
201FDA20000
|
heap
|
page read and write
|
||
5E12000
|
trusted library allocation
|
page read and write
|
||
1043000
|
unkown
|
page execute and read and write
|
||
3D7000
|
unkown
|
page execute and write copy
|
||
71C0000
|
direct allocation
|
page execute and read and write
|
||
4670000
|
heap
|
page read and write
|
||
4E21000
|
heap
|
page read and write
|
||
5E02000
|
trusted library allocation
|
page read and write
|
||
FA2000
|
unkown
|
page execute and write copy
|
||
28ED000
|
heap
|
page read and write
|
||
152E000
|
stack
|
page read and write
|
||
5920000
|
remote allocation
|
page read and write
|
||
1443000
|
heap
|
page read and write
|
||
A96000
|
heap
|
page read and write
|
||
5AC000
|
unkown
|
page read and write
|
||
78D000
|
stack
|
page read and write
|
||
59C000
|
unkown
|
page execute and write copy
|
||
4A50000
|
direct allocation
|
page execute and read and write
|
||
24C99AB0000
|
heap
|
page read and write
|
||
24C99AE0000
|
trusted library allocation
|
page read and write
|
||
160E000
|
stack
|
page read and write
|
||
BF6000
|
heap
|
page read and write
|
||
7FF7EDACA000
|
unkown
|
page write copy
|
||
2479E9F1000
|
heap
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
301E000
|
stack
|
page read and write
|
||
1FED92E8000
|
heap
|
page read and write
|
||
1FED9346000
|
heap
|
page read and write
|
||
41AE000
|
stack
|
page read and write
|
||
1422000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
17226130000
|
heap
|
page read and write
|
||
41E000
|
unkown
|
page write copy
|
||
31C000
|
stack
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
19DB000
|
heap
|
page read and write
|
||
671000
|
unkown
|
page execute and read and write
|
||
2A6E000
|
stack
|
page read and write
|
||
5EF5000
|
trusted library allocation
|
page read and write
|
||
3BD0000
|
heap
|
page read and write
|
||
5D5000
|
unkown
|
page execute and write copy
|
||
11AB000
|
stack
|
page read and write
|
||
1FED92B1000
|
heap
|
page read and write
|
||
71C0000
|
direct allocation
|
page execute and read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
7FF7EDA91000
|
unkown
|
page execute read
|
||
29AF000
|
stack
|
page read and write
|
||
2539000
|
stack
|
page read and write
|
||
F7F000
|
unkown
|
page execute and write copy
|
||
4BB33FE000
|
stack
|
page read and write
|
||
1580000
|
heap
|
page read and write
|
||
2479E985000
|
heap
|
page read and write
|
||
C60000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
8E9000
|
unkown
|
page readonly
|
||
2451E0C0000
|
trusted library allocation
|
page read and write
|
||
201FDB00000
|
heap
|
page read and write
|
||
1FED9348000
|
heap
|
page read and write
|
||
5E5F000
|
trusted library allocation
|
page read and write
|
||
1940000
|
heap
|
page read and write
|
||
4A3F000
|
stack
|
page read and write
|
||
360000
|
unkown
|
page read and write
|
||
32EF000
|
stack
|
page read and write
|
||
5E10000
|
trusted library allocation
|
page read and write
|
||
72D0000
|
heap
|
page read and write
|
||
82022FC000
|
stack
|
page read and write
|
||
A9C76FF000
|
stack
|
page read and write
|
||
7FF7EDACD000
|
unkown
|
page readonly
|
||
7FF7EDAB9000
|
unkown
|
page readonly
|
||
41BF000
|
stack
|
page read and write
|
||
4471000
|
heap
|
page read and write
|
||
41D0000
|
heap
|
page read and write
|
||
7FF73FDCF000
|
unkown
|
page read and write
|
||
A96000
|
heap
|
page read and write
|
||
442E000
|
stack
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
6BD000
|
unkown
|
page readonly
|
||
5DEC000
|
trusted library allocation
|
page read and write
|
||
5AF000
|
unkown
|
page readonly
|
||
2451E0C0000
|
trusted library allocation
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
4D00000
|
direct allocation
|
page execute and read and write
|
||
B14000
|
heap
|
page read and write
|
||
43EF000
|
stack
|
page read and write
|
||
1B1B430D000
|
heap
|
page read and write
|
||
14E4000
|
heap
|
page read and write
|
||
C40000
|
direct allocation
|
page read and write
|
||
58F000
|
unkown
|
page readonly
|
||
4900000
|
direct allocation
|
page read and write
|
||
2451E0C0000
|
trusted library allocation
|
page read and write
|
||
B10000
|
heap
|
page read and write
|
||
E31000
|
unkown
|
page execute read
|
||
5E12000
|
trusted library allocation
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
5E5F000
|
trusted library allocation
|
page read and write
|
||
7280000
|
direct allocation
|
page execute and read and write
|
||
5DEE000
|
trusted library allocation
|
page read and write
|
||
30AE000
|
stack
|
page read and write
|
||
3C2000
|
unkown
|
page execute and write copy
|
||
5D9E000
|
stack
|
page read and write
|
||
4CE0000
|
direct allocation
|
page execute and read and write
|
||
45F1000
|
heap
|
page read and write
|
||
5E5F000
|
trusted library allocation
|
page read and write
|
||
7FF7ECDF1000
|
unkown
|
page readonly
|
||
AFE000
|
heap
|
page read and write
|
||
1B1B4270000
|
trusted library allocation
|
page read and write
|
||
2479E965000
|
heap
|
page read and write
|
||
3F6F000
|
stack
|
page read and write
|
||
4D20000
|
direct allocation
|
page execute and read and write
|
||
66D000
|
unkown
|
page execute and read and write
|
||
65F000
|
unkown
|
page execute and write copy
|
||
5E5F000
|
trusted library allocation
|
page read and write
|
||
5E5F000
|
trusted library allocation
|
page read and write
|
||
23630A80000
|
heap
|
page read and write
|
||
4471000
|
heap
|
page read and write
|
||
31EE000
|
stack
|
page read and write
|
||
2451E0C0000
|
trusted library allocation
|
page read and write
|
||
5DD5000
|
trusted library allocation
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
B14000
|
heap
|
page read and write
|
||
2451E0C0000
|
trusted library allocation
|
page read and write
|
||
5E14000
|
trusted library allocation
|
page read and write
|
||
27997630000
|
trusted library allocation
|
page read and write
|
||
71C0000
|
direct allocation
|
page execute and read and write
|
||
45F1000
|
heap
|
page read and write
|
||
C40000
|
direct allocation
|
page read and write
|
||
7FF6D9D51000
|
unkown
|
page execute and read and write
|
||
5E1F000
|
trusted library allocation
|
page read and write
|
||
B77000
|
heap
|
page read and write
|
||
2DBF7610000
|
heap
|
page read and write
|
||
1B1B4270000
|
trusted library allocation
|
page read and write
|
||
362F000
|
stack
|
page read and write
|
||
E97000
|
unkown
|
page execute and read and write
|
||
2655000
|
heap
|
page read and write
|
||
1FED92D2000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
5E02000
|
trusted library allocation
|
page read and write
|
||
140000000
|
unkown
|
page read and write
|
||
3F6F000
|
stack
|
page read and write
|
||
555D000
|
stack
|
page read and write
|
||
57DF000
|
stack
|
page read and write
|
||
594000
|
unkown
|
page execute and read and write
|
||
A4B000
|
heap
|
page read and write
|
||
360000
|
unkown
|
page readonly
|
||
5EDF000
|
trusted library allocation
|
page read and write
|
||
425F000
|
stack
|
page read and write
|
||
A49000
|
heap
|
page read and write
|
||
303F000
|
stack
|
page read and write
|
||
1450000
|
heap
|
page read and write
|
||
D80000
|
direct allocation
|
page read and write
|
||
A95000
|
heap
|
page read and write
|
||
A90000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
2451E0C0000
|
trusted library allocation
|
page read and write
|
||
5E3A000
|
trusted library allocation
|
page read and write
|
||
3EFF000
|
stack
|
page read and write
|
||
D80000
|
direct allocation
|
page read and write
|
||
5D5000
|
unkown
|
page execute and write copy
|
||
753C000
|
direct allocation
|
page read and write
|
||
AAE000
|
heap
|
page read and write
|
||
2479E9F1000
|
heap
|
page read and write
|
||
396F000
|
stack
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
145E000
|
heap
|
page read and write
|
||
4D40000
|
direct allocation
|
page execute and read and write
|
||
46A1000
|
heap
|
page read and write
|
||
32BE000
|
stack
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
19E8000
|
heap
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
FA2000
|
unkown
|
page execute and read and write
|
||
2C6E000
|
stack
|
page read and write
|
||
302E000
|
stack
|
page read and write
|
||
63AD000
|
stack
|
page read and write
|
||
591E000
|
stack
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
403F000
|
stack
|
page read and write
|
||
5E02000
|
trusted library allocation
|
page read and write
|
||
24C99AE0000
|
trusted library allocation
|
page read and write
|
||
2451E168000
|
heap
|
page read and write
|
||
A30000
|
heap
|
page read and write
|
||
58F000
|
unkown
|
page readonly
|
||
401000
|
unkown
|
page execute read
|
||
27997630000
|
trusted library allocation
|
page read and write
|
||
644A000
|
heap
|
page read and write
|
||
3BAF000
|
stack
|
page read and write
|
||
495E000
|
stack
|
page read and write
|
||
5C2000
|
unkown
|
page execute and read and write
|
||
360000
|
unkown
|
page readonly
|
||
4E10000
|
heap
|
page read and write
|
||
24C99AE0000
|
trusted library allocation
|
page read and write
|
||
5F0D000
|
trusted library allocation
|
page read and write
|
||
2CAF000
|
stack
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
7CDB000
|
heap
|
page read and write
|
||
5DE3000
|
trusted library allocation
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
3A6D000
|
stack
|
page read and write
|
||
24C99B50000
|
heap
|
page read and write
|
||
41A000
|
unkown
|
page readonly
|
||
C1F000
|
heap
|
page read and write
|
||
393E000
|
stack
|
page read and write
|
||
AE0000
|
unkown
|
page readonly
|
||
72B0000
|
direct allocation
|
page execute and read and write
|
||
7FF7EDA90000
|
unkown
|
page readonly
|
||
AB9000
|
heap
|
page read and write
|
||
4471000
|
heap
|
page read and write
|
||
24C99AE0000
|
trusted library allocation
|
page read and write
|
||
5E52000
|
trusted library allocation
|
page read and write
|
||
1FED9346000
|
heap
|
page read and write
|
||
5E01000
|
trusted library allocation
|
page read and write
|
||
1FED9360000
|
heap
|
page read and write
|
||
13D6000
|
heap
|
page read and write
|
||
6F60000
|
direct allocation
|
page read and write
|
||
3CBF000
|
stack
|
page read and write
|
||
E30000
|
unkown
|
page readonly
|
||
5DE1000
|
trusted library allocation
|
page read and write
|
||
133A000
|
stack
|
page read and write
|
||
1448000
|
heap
|
page read and write
|
||
5E68000
|
trusted library allocation
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
D5E000
|
stack
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
190E000
|
stack
|
page read and write
|
||
5E23000
|
trusted library allocation
|
page read and write
|
||
5DF3000
|
trusted library allocation
|
page read and write
|
||
5DF1000
|
trusted library allocation
|
page read and write
|
||
2451E0C0000
|
trusted library allocation
|
page read and write
|
||
4471000
|
heap
|
page read and write
|
||
446F000
|
stack
|
page read and write
|
||
2830000
|
direct allocation
|
page read and write
|
||
6B6000
|
unkown
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
1103000
|
direct allocation
|
page read and write
|
||
E30000
|
unkown
|
page readonly
|
||
17D4000
|
heap
|
page read and write
|
||
71B0000
|
direct allocation
|
page execute and read and write
|
||
2479E952000
|
heap
|
page read and write
|
||
1820000
|
direct allocation
|
page read and write
|
||
68E3000
|
trusted library allocation
|
page read and write
|
||
D80000
|
direct allocation
|
page read and write
|
||
144C000
|
heap
|
page read and write
|
||
41CC000
|
stack
|
page read and write
|
||
7FF73F940000
|
unkown
|
page readonly
|
||
D80000
|
direct allocation
|
page read and write
|
||
689F000
|
stack
|
page read and write
|
||
2479E963000
|
heap
|
page read and write
|
||
4690000
|
heap
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
2451E0C0000
|
trusted library allocation
|
page read and write
|
||
317F000
|
stack
|
page read and write
|
||
201FDAA5000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
2479E973000
|
heap
|
page read and write
|
||
4C80000
|
direct allocation
|
page execute and read and write
|
||
5AC000
|
unkown
|
page write copy
|
||
5AF000
|
unkown
|
page readonly
|
||
6AE1000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
2479E966000
|
heap
|
page read and write
|
||
A7D7FA9000
|
stack
|
page read and write
|
||
CA14AFF000
|
stack
|
page read and write
|
||
C57000
|
heap
|
page read and write
|
||
5E5F000
|
trusted library allocation
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
145E000
|
heap
|
page read and write
|
||
36A8000
|
heap
|
page read and write
|
||
23630BB0000
|
direct allocation
|
page read and write
|
||
7FF7EDACA000
|
unkown
|
page write copy
|
||
AB0000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
5B0000
|
heap
|
page read and write
|
||
5DEC000
|
trusted library allocation
|
page read and write
|
||
621000
|
unkown
|
page execute and write copy
|
||
4C00000
|
direct allocation
|
page execute and read and write
|
||
45F1000
|
heap
|
page read and write
|
||
B8E000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
5E12000
|
trusted library allocation
|
page read and write
|
||
C40000
|
direct allocation
|
page read and write
|
||
2DBF000
|
stack
|
page read and write
|
||
FA7000
|
unkown
|
page execute and write copy
|
||
58DF000
|
stack
|
page read and write
|
||
554000
|
unkown
|
page execute and read and write
|
||
32EF000
|
stack
|
page read and write
|
||
17225F49000
|
heap
|
page read and write
|
||
3BEE000
|
stack
|
page read and write
|
||
1E275370000
|
heap
|
page read and write
|
||
5B1F000
|
stack
|
page read and write
|
||
569F000
|
stack
|
page read and write
|
||
1FED98D0000
|
heap
|
page read and write
|
||
42AF000
|
stack
|
page read and write
|
||
56FD000
|
stack
|
page read and write
|
||
B18000
|
heap
|
page read and write
|
||
2479E9F1000
|
heap
|
page read and write
|
||
24C99AE0000
|
trusted library allocation
|
page read and write
|
||
24FE000
|
stack
|
page read and write
|
||
5C3000
|
unkown
|
page execute and write copy
|
||
66D000
|
unkown
|
page execute and read and write
|
||
3D943FE000
|
stack
|
page read and write
|
||
5F2000
|
unkown
|
page execute and write copy
|
||
83C000
|
stack
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
11FD000
|
heap
|
page read and write
|
||
5DD1000
|
trusted library allocation
|
page read and write
|
||
9B673FD000
|
stack
|
page read and write
|
||
151E000
|
stack
|
page read and write
|
||
3AAE000
|
stack
|
page read and write
|
||
9B66EFE000
|
stack
|
page read and write
|
||
F70000
|
trusted library allocation
|
page read and write
|
||
64C84FF000
|
unkown
|
page read and write
|
||
E02000
|
unkown
|
page execute and write copy
|
||
98C000
|
stack
|
page read and write
|
||
76A0000
|
direct allocation
|
page read and write
|
||
5AC000
|
unkown
|
page write copy
|
||
7FF7ECD60000
|
unkown
|
page readonly
|
||
AEC000
|
heap
|
page read and write
|
||
45AF000
|
stack
|
page read and write
|
||
14E4000
|
heap
|
page read and write
|
||
23632690000
|
direct allocation
|
page read and write
|
||
D2E000
|
stack
|
page read and write
|
||
3CB000
|
unkown
|
page execute and read and write
|
||
5E68000
|
trusted library allocation
|
page read and write
|
||
19DA000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
27DE000
|
stack
|
page read and write
|
||
24C99AE0000
|
trusted library allocation
|
page read and write
|
||
5DE6000
|
trusted library allocation
|
page read and write
|
||
AE1000
|
unkown
|
page execute and write copy
|
||
45F1000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
1FED9297000
|
heap
|
page read and write
|
||
352E000
|
stack
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
5E2A000
|
trusted library allocation
|
page read and write
|
||
2451E0C0000
|
trusted library allocation
|
page read and write
|
||
2DBA1280000
|
direct allocation
|
page read and write
|
||
E88E8FC000
|
stack
|
page read and write
|
||
3BE5000
|
heap
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
24C99AE0000
|
trusted library allocation
|
page read and write
|
||
1FED92B9000
|
heap
|
page read and write
|
||
4EA0000
|
heap
|
page read and write
|
||
5F80000
|
heap
|
page read and write
|
||
2479E9C5000
|
heap
|
page read and write
|
||
5F2D000
|
trusted library allocation
|
page read and write
|
||
65D000
|
unkown
|
page execute and write copy
|
||
4691000
|
heap
|
page read and write
|
||
7FF7EDACD000
|
unkown
|
page readonly
|
||
591000
|
unkown
|
page execute and write copy
|
||
2479E954000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
5410000
|
direct allocation
|
page execute and read and write
|
||
3A2E000
|
stack
|
page read and write
|
||
5E75000
|
trusted library allocation
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
19D9000
|
heap
|
page read and write
|
||
264E000
|
stack
|
page read and write
|
||
45E0000
|
direct allocation
|
page read and write
|
||
673000
|
unkown
|
page execute and write copy
|
||
4AB0000
|
direct allocation
|
page execute and read and write
|
||
91AF94C000
|
stack
|
page read and write
|
||
247A0680000
|
heap
|
page read and write
|
||
5E02000
|
trusted library allocation
|
page read and write
|
||
7491000
|
heap
|
page read and write
|
||
5AC000
|
unkown
|
page write copy
|
||
FB4000
|
heap
|
page read and write
|
||
5E34000
|
trusted library allocation
|
page read and write
|
||
64C857F000
|
stack
|
page read and write
|
||
6230000
|
direct allocation
|
page read and write
|
||
B85BEFF000
|
stack
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
342F000
|
stack
|
page read and write
|
||
23630BD0000
|
direct allocation
|
page read and write
|
||
4AD0000
|
heap
|
page read and write
|
||
247A0675000
|
heap
|
page read and write
|
||
1FED92A7000
|
heap
|
page read and write
|
||
9B671FF000
|
stack
|
page read and write
|
||
5DD5000
|
trusted library allocation
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
5DD9000
|
trusted library allocation
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
7200000
|
direct allocation
|
page execute and read and write
|
||
7FF73FC11000
|
unkown
|
page execute and write copy
|
||
4D00000
|
heap
|
page read and write
|
||
3D5000
|
unkown
|
page execute and write copy
|
||
6AE1000
|
heap
|
page read and write
|
||
201FDAA0000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
19C4C22B000
|
heap
|
page read and write
|
||
45E0000
|
direct allocation
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
A86000
|
heap
|
page read and write
|
||
19C4C510000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
346D000
|
stack
|
page read and write
|
||
2451E0C0000
|
trusted library allocation
|
page read and write
|
||
363F000
|
stack
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
7FF7EDACA000
|
unkown
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
F98000
|
unkown
|
page execute and read and write
|
||
AA4000
|
heap
|
page read and write
|
||
C40000
|
direct allocation
|
page read and write
|
||
555000
|
unkown
|
page execute and write copy
|
||
5E12000
|
trusted library allocation
|
page read and write
|
||
1FED92C6000
|
heap
|
page read and write
|
||
CCF000
|
stack
|
page read and write
|
||
16463F10000
|
heap
|
page read and write
|
||
1450000
|
heap
|
page read and write
|
||
F0E000
|
stack
|
page read and write
|
||
181E000
|
stack
|
page read and write
|
||
5E02000
|
trusted library allocation
|
page read and write
|
||
27997630000
|
trusted library allocation
|
page read and write
|
||
367F000
|
stack
|
page read and write
|
||
4B9E000
|
stack
|
page read and write
|
||
F1E11FF000
|
stack
|
page read and write
|
||
4E00000
|
direct allocation
|
page read and write
|
||
2451E0C0000
|
trusted library allocation
|
page read and write
|
||
7B8000
|
direct allocation
|
page execute read
|
||
14E4000
|
heap
|
page read and write
|
||
40EE000
|
stack
|
page read and write
|
||
FD4000
|
unkown
|
page execute and read and write
|
||
1FED98F0000
|
trusted library allocation
|
page read and write
|
||
4BF0000
|
direct allocation
|
page execute and read and write
|
||
5E5F000
|
trusted library allocation
|
page read and write
|
||
2479E959000
|
heap
|
page read and write
|
||
5DF5000
|
trusted library allocation
|
page read and write
|
||
5DE8000
|
trusted library allocation
|
page read and write
|
||
2B6F000
|
stack
|
page read and write
|
||
4C50000
|
direct allocation
|
page execute and read and write
|
||
85F000
|
unkown
|
page readonly
|
||
6AE1000
|
heap
|
page read and write
|
||
5E02000
|
trusted library allocation
|
page read and write
|
||
E81000
|
unkown
|
page readonly
|
||
7270000
|
direct allocation
|
page execute and read and write
|
||
A97000
|
heap
|
page read and write
|
||
7250000
|
direct allocation
|
page execute and read and write
|
||
4CD0000
|
direct allocation
|
page execute and read and write
|
||
27997630000
|
trusted library allocation
|
page read and write
|
||
1FED92DE000
|
heap
|
page read and write
|
||
554000
|
unkown
|
page execute and read and write
|
||
2451E0C0000
|
trusted library allocation
|
page read and write
|
||
622000
|
unkown
|
page execute and read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
15CC000
|
stack
|
page read and write
|
||
2CEE000
|
stack
|
page read and write
|
||
5DF7000
|
trusted library allocation
|
page read and write
|
||
392F000
|
stack
|
page read and write
|
||
540000
|
unkown
|
page readonly
|
||
5BD000
|
unkown
|
page execute and write copy
|
||
6AE1000
|
heap
|
page read and write
|
||
5F9F000
|
stack
|
page read and write
|
||
A70000
|
heap
|
page read and write
|
||
640000
|
unkown
|
page execute and read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
2479E9C7000
|
heap
|
page read and write
|
||
AA4000
|
heap
|
page read and write
|
||
A30000
|
heap
|
page read and write
|
||
3E6E000
|
stack
|
page read and write
|
||
D80000
|
direct allocation
|
page read and write
|
||
E81000
|
unkown
|
page readonly
|
||
33AF000
|
stack
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
3DFE000
|
stack
|
page read and write
|
||
4E00000
|
direct allocation
|
page read and write
|
||
4A80000
|
direct allocation
|
page read and write
|
||
1FED92CA000
|
heap
|
page read and write
|
||
673000
|
unkown
|
page execute and write copy
|
||
6AE1000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
5E37000
|
trusted library allocation
|
page read and write
|
||
140764000
|
unkown
|
page readonly
|
||
553D000
|
stack
|
page read and write
|
||
14E4000
|
heap
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
26E0000
|
heap
|
page read and write
|
||
1FED9348000
|
heap
|
page read and write
|
||
4AB0000
|
direct allocation
|
page execute and read and write
|
||
40CB000
|
stack
|
page read and write
|
||
5E60000
|
trusted library allocation
|
page read and write
|
||
5BD000
|
unkown
|
page execute and write copy
|
||
A3A000
|
heap
|
page read and write
|
||
24C99AE0000
|
trusted library allocation
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
5AF000
|
unkown
|
page readonly
|
||
6AE1000
|
heap
|
page read and write
|
||
4C90000
|
direct allocation
|
page execute and read and write
|
||
5E09000
|
trusted library allocation
|
page read and write
|
||
1433000
|
heap
|
page read and write
|
||
3D6000
|
unkown
|
page execute and read and write
|
||
5420000
|
direct allocation
|
page execute and read and write
|
||
4A80000
|
direct allocation
|
page execute and read and write
|
||
5E5F000
|
trusted library allocation
|
page read and write
|
||
51AE000
|
stack
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
AA6000
|
heap
|
page read and write
|
||
1B1B42B0000
|
trusted library allocation
|
page read and write
|
||
E9D000
|
unkown
|
page readonly
|
||
45F1000
|
heap
|
page read and write
|
||
1661000
|
heap
|
page read and write
|
||
332E000
|
stack
|
page read and write
|
||
7FF7EDAB9000
|
unkown
|
page readonly
|
||
1452000
|
heap
|
page read and write
|
||
5E01000
|
trusted library allocation
|
page read and write
|
||
28E2CC20000
|
heap
|
page read and write
|
||
4CC0000
|
direct allocation
|
page execute and read and write
|
||
6A30000
|
direct allocation
|
page read and write
|
||
4DFF000
|
stack
|
page read and write
|
||
5C7000
|
unkown
|
page execute and read and write
|
||
F8A000
|
unkown
|
page execute and write copy
|
||
5E41000
|
trusted library allocation
|
page read and write
|
||
2DBA1230000
|
heap
|
page read and write
|
||
1E275380000
|
heap
|
page read and write
|
||
4A80000
|
direct allocation
|
page execute and read and write
|
||
2479E975000
|
heap
|
page read and write
|
||
65F000
|
unkown
|
page execute and write copy
|
||
8E5000
|
unkown
|
page read and write
|
||
140A000
|
heap
|
page read and write
|
||
5E16000
|
trusted library allocation
|
page read and write
|
||
84E000
|
stack
|
page read and write
|
||
5E57000
|
trusted library allocation
|
page read and write
|
||
13B3000
|
heap
|
page read and write
|
||
7FF73FC11000
|
unkown
|
page execute and write copy
|
||
1E0CDFE000
|
stack
|
page read and write
|
||
3D2E000
|
stack
|
page read and write
|
||
621000
|
unkown
|
page execute and write copy
|
||
6AE1000
|
heap
|
page read and write
|
||
3BBE000
|
stack
|
page read and write
|
||
6430000
|
heap
|
page read and write
|
||
1FED92AF000
|
heap
|
page read and write
|
||
5E68000
|
trusted library allocation
|
page read and write
|
||
4B5F000
|
stack
|
page read and write
|
||
9D6000
|
heap
|
page read and write
|
||
4A50000
|
direct allocation
|
page execute and read and write
|
||
4691000
|
heap
|
page read and write
|
||
28E2CC00000
|
heap
|
page read and write
|
||
5E5F000
|
trusted library allocation
|
page read and write
|
||
53F0000
|
direct allocation
|
page execute and read and write
|
||
58F000
|
unkown
|
page readonly
|
||
5FB000
|
unkown
|
page execute and write copy
|
||
5E02000
|
trusted library allocation
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
1D8F5890000
|
heap
|
page read and write
|
||
1820000
|
direct allocation
|
page read and write
|
||
449F000
|
stack
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
5DF7000
|
trusted library allocation
|
page read and write
|
||
5E5F000
|
trusted library allocation
|
page read and write
|
||
4AF0000
|
direct allocation
|
page execute and read and write
|
||
4C80000
|
direct allocation
|
page execute and read and write
|
||
5E6000
|
unkown
|
page execute and write copy
|
||
140738000
|
unkown
|
page read and write
|
||
58F000
|
unkown
|
page readonly
|
||
45F1000
|
heap
|
page read and write
|
||
1D8F56C0000
|
heap
|
page read and write
|
||
366D000
|
stack
|
page read and write
|
||
2451E0C0000
|
trusted library allocation
|
page read and write
|
||
542D000
|
stack
|
page read and write
|
||
46BE000
|
stack
|
page read and write
|
||
F6E000
|
stack
|
page read and write
|
||
BF6000
|
unkown
|
page write copy
|
||
1430000
|
heap
|
page read and write
|
||
1B1B42B0000
|
trusted library allocation
|
page read and write
|
||
1FED92A1000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
5DEF000
|
trusted library allocation
|
page read and write
|
||
145E000
|
heap
|
page read and write
|
||
27997630000
|
trusted library allocation
|
page read and write
|
||
650000
|
unkown
|
page readonly
|
||
4CA0000
|
direct allocation
|
page execute and read and write
|
||
5E1B000
|
trusted library allocation
|
page read and write
|
||
8E6000
|
unkown
|
page write copy
|
||
2479E95A000
|
heap
|
page read and write
|
||
34EF000
|
stack
|
page read and write
|
||
3CAE000
|
stack
|
page read and write
|
||
A94000
|
heap
|
page read and write
|
||
34EF000
|
stack
|
page read and write
|
||
2451E0C0000
|
trusted library allocation
|
page read and write
|
||
640F000
|
stack
|
page read and write
|
||
38FE000
|
stack
|
page read and write
|
||
14E4000
|
heap
|
page read and write
|
||
557000
|
unkown
|
page execute and write copy
|
||
3DEE000
|
stack
|
page read and write
|
||
429E000
|
stack
|
page read and write
|
||
23630B60000
|
heap
|
page read and write
|
||
591000
|
unkown
|
page execute and write copy
|
||
3F2E000
|
stack
|
page read and write
|
||
3C9000
|
unkown
|
page write copy
|
||
AE0000
|
unkown
|
page read and write
|
||
53F000
|
unkown
|
page execute and write copy
|
||
541000
|
unkown
|
page execute read
|
||
2DBA12F0000
|
heap
|
page read and write
|
||
5AC000
|
unkown
|
page read and write
|
||
9D4000
|
heap
|
page read and write
|
||
5E12000
|
trusted library allocation
|
page read and write
|
||
1433000
|
heap
|
page read and write
|
||
2479E95A000
|
heap
|
page read and write
|
||
1FED9AB5000
|
heap
|
page read and write
|
||
4E00000
|
direct allocation
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
640000
|
unkown
|
page execute and read and write
|
||
114A000
|
unkown
|
page execute and write copy
|
||
4E00000
|
direct allocation
|
page read and write
|
||
5E5F000
|
trusted library allocation
|
page read and write
|
||
2A8C000
|
stack
|
page read and write
|
||
3A6F000
|
stack
|
page read and write
|
||
13D6000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
2479E954000
|
heap
|
page read and write
|
||
DA0000
|
unkown
|
page read and write
|
||
5E02000
|
trusted library allocation
|
page read and write
|
||
5E01000
|
trusted library allocation
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
4500000
|
trusted library allocation
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
7336000
|
heap
|
page read and write
|
||
1D8F5810000
|
direct allocation
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
41A000
|
unkown
|
page readonly
|
||
FEA000
|
unkown
|
page execute and read and write
|
||
75C0000
|
heap
|
page read and write
|
||
5E5F000
|
trusted library allocation
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
422E000
|
stack
|
page read and write
|
||
C40000
|
direct allocation
|
page read and write
|
||
1FED9319000
|
heap
|
page read and write
|
||
5E12000
|
trusted library allocation
|
page read and write
|
||
790000
|
heap
|
page read and write
|
||
141E000
|
stack
|
page read and write
|
||
FD2000
|
unkown
|
page execute and read and write
|
||
145D000
|
heap
|
page read and write
|
||
5DD1000
|
trusted library allocation
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
131C0DC0000
|
heap
|
page read and write
|
||
24C99AE0000
|
trusted library allocation
|
page read and write
|
||
DFC000
|
stack
|
page read and write
|
||
540000
|
unkown
|
page readonly
|
||
2F3E000
|
stack
|
page read and write
|
||
13A2000
|
heap
|
page read and write
|
||
145E000
|
heap
|
page read and write
|
||
71D0000
|
direct allocation
|
page execute and read and write
|
||
F21000
|
unkown
|
page readonly
|
||
2479E952000
|
heap
|
page read and write
|
||
7FF7EDA90000
|
unkown
|
page readonly
|
||
2451E0C0000
|
trusted library allocation
|
page read and write
|
||
5F6000
|
unkown
|
page execute and write copy
|
||
A6A000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
7B0000
|
direct allocation
|
page execute read
|
||
24C99AE0000
|
trusted library allocation
|
page read and write
|
||
2479E9C0000
|
heap
|
page read and write
|
||
5E27000
|
trusted library allocation
|
page read and write
|
||
626B000
|
stack
|
page read and write
|
||
144C000
|
heap
|
page read and write
|
||
5E6000
|
unkown
|
page execute and write copy
|
||
682000
|
unkown
|
page execute and write copy
|
||
AF0000
|
heap
|
page read and write
|
||
7260000
|
direct allocation
|
page execute and read and write
|
||
432F000
|
stack
|
page read and write
|
||
7A1000
|
unkown
|
page execute read
|
||
C17000
|
heap
|
page read and write
|
||
A56000
|
heap
|
page read and write
|
||
281AB8B0000
|
heap
|
page read and write
|
||
1820000
|
direct allocation
|
page read and write
|
||
140A000
|
heap
|
page read and write
|
||
149D000
|
stack
|
page read and write
|
||
140A000
|
heap
|
page read and write
|
||
91AFDFE000
|
stack
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
AA1000
|
heap
|
page read and write
|
||
53FC000
|
stack
|
page read and write
|
||
A30000
|
heap
|
page read and write
|
||
5E6000
|
unkown
|
page execute and write copy
|
||
6AE1000
|
heap
|
page read and write
|
||
4A70000
|
direct allocation
|
page execute and read and write
|
||
5E02000
|
trusted library allocation
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
2B7E000
|
stack
|
page read and write
|
||
B14000
|
heap
|
page read and write
|
||
5DD6000
|
trusted library allocation
|
page read and write
|
||
7C66000
|
heap
|
page read and write
|
||
1422000
|
heap
|
page read and write
|
||
27997630000
|
trusted library allocation
|
page read and write
|
||
423000
|
unkown
|
page readonly
|
||
377F000
|
stack
|
page read and write
|
||
3B3F000
|
stack
|
page read and write
|
||
4C70000
|
direct allocation
|
page execute and read and write
|
||
A4E000
|
heap
|
page read and write
|
||
2B06A7C0000
|
heap
|
page read and write
|
||
AE1000
|
unkown
|
page execute and read and write
|
||
31EE000
|
stack
|
page read and write
|
||
1B1B4270000
|
trusted library allocation
|
page read and write
|
||
D1E000
|
stack
|
page read and write
|
||
1ACEBFF000
|
stack
|
page read and write
|
||
3160000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
5E12000
|
trusted library allocation
|
page read and write
|
||
40EE000
|
stack
|
page read and write
|
||
BA7000
|
heap
|
page read and write
|
||
3C9000
|
unkown
|
page write copy
|
||
2451E0C0000
|
trusted library allocation
|
page read and write
|
||
6A51000
|
heap
|
page read and write
|
||
5E05000
|
trusted library allocation
|
page read and write
|
||
272E000
|
stack
|
page read and write
|
||
4E00000
|
direct allocation
|
page read and write
|
||
2F6E000
|
stack
|
page read and write
|
||
3F3F000
|
stack
|
page read and write
|
||
5DDB000
|
trusted library allocation
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
5ED6000
|
trusted library allocation
|
page read and write
|
||
5DF7000
|
trusted library allocation
|
page read and write
|
||
540000
|
unkown
|
page readonly
|
||
27997630000
|
trusted library allocation
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
9B675FF000
|
stack
|
page read and write
|
||
E9D000
|
unkown
|
page readonly
|
||
640000
|
unkown
|
page execute and read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
5420000
|
direct allocation
|
page execute and read and write
|
||
5DD8000
|
trusted library allocation
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
27997630000
|
trusted library allocation
|
page read and write
|
||
5E5F000
|
trusted library allocation
|
page read and write
|
||
5DD6000
|
trusted library allocation
|
page read and write
|
||
2479E9D1000
|
heap
|
page read and write
|
||
13D4000
|
heap
|
page read and write
|
||
2479E880000
|
heap
|
page read and write
|
||
5F86000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
BF6000
|
unkown
|
page read and write
|
||
9B672FE000
|
stack
|
page read and write
|
||
1E0CCFE000
|
stack
|
page read and write
|
||
2EAF000
|
stack
|
page read and write
|
||
42FE000
|
stack
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
5E08000
|
trusted library allocation
|
page read and write
|
||
B14000
|
heap
|
page read and write
|
||
5E5F000
|
trusted library allocation
|
page read and write
|
||
2451E0C0000
|
trusted library allocation
|
page read and write
|
||
1FED92A9000
|
heap
|
page read and write
|
||
71C0000
|
direct allocation
|
page execute and read and write
|
||
4691000
|
heap
|
page read and write
|
||
558000
|
unkown
|
page execute and read and write
|
||
3C2000
|
unkown
|
page execute and read and write
|
||
5E85000
|
trusted library allocation
|
page read and write
|
||
CA149FF000
|
stack
|
page read and write
|
||
D80000
|
direct allocation
|
page read and write
|
||
56DE000
|
stack
|
page read and write
|
||
B32000
|
unkown
|
page write copy
|
||
7DF3000
|
heap
|
page read and write
|
||
64C85FE000
|
stack
|
page read and write
|
||
5F85000
|
heap
|
page read and write
|
||
2451E0C0000
|
trusted library allocation
|
page read and write
|
||
1FED9346000
|
heap
|
page read and write
|
||
140A000
|
heap
|
page read and write
|
||
1014000
|
unkown
|
page execute and read and write
|
||
27997630000
|
trusted library allocation
|
page read and write
|
||
E32D74C000
|
stack
|
page read and write
|
||
247A0650000
|
remote allocation
|
page read and write
|
||
10AC000
|
unkown
|
page execute and write copy
|
||
1FED92C1000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
281A9FF0000
|
heap
|
page read and write
|
||
1D8F589B000
|
heap
|
page read and write
|
||
665F000
|
stack
|
page read and write
|
||
23630C1B000
|
heap
|
page read and write
|
||
A7D82FD000
|
stack
|
page read and write
|
||
4A50000
|
direct allocation
|
page execute and read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
750000
|
heap
|
page read and write
|
||
401F000
|
stack
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
E9F000
|
unkown
|
page execute and read and write
|
||
9B674FB000
|
stack
|
page read and write
|
||
136A000
|
heap
|
page read and write
|
||
4C20000
|
direct allocation
|
page execute and read and write
|
||
76A2000
|
direct allocation
|
page read and write
|
||
5DEE000
|
trusted library allocation
|
page read and write
|
||
4CA0000
|
direct allocation
|
page execute and read and write
|
||
A9C78FE000
|
stack
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
27997630000
|
trusted library allocation
|
page read and write
|
||
5E12000
|
trusted library allocation
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
740E000
|
stack
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
5E8B000
|
trusted library allocation
|
page read and write
|
||
4B20000
|
direct allocation
|
page read and write
|
||
5E5F000
|
trusted library allocation
|
page read and write
|
||
E2E000
|
stack
|
page read and write
|
||
306F000
|
stack
|
page read and write
|
||
554000
|
unkown
|
page execute and read and write
|
||
16463BE0000
|
heap
|
page read and write
|
||
27997630000
|
trusted library allocation
|
page read and write
|
||
144C000
|
heap
|
page read and write
|
||
19E4000
|
heap
|
page read and write
|
||
2451E0C0000
|
trusted library allocation
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
BBE000
|
stack
|
page read and write
|
||
145E000
|
heap
|
page read and write
|
||
2DBF7630000
|
heap
|
page read and write
|
||
45E0000
|
direct allocation
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
91AFCFE000
|
stack
|
page read and write
|
||
493E000
|
stack
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
4AD0000
|
trusted library allocation
|
page read and write
|
||
1B1B42B0000
|
trusted library allocation
|
page read and write
|
||
3B6E000
|
stack
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
E32DA7D000
|
stack
|
page read and write
|
||
446F000
|
stack
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
541000
|
unkown
|
page execute read
|
||
28909BC0000
|
direct allocation
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
19D9000
|
heap
|
page read and write
|
||
5FA000
|
unkown
|
page execute and read and write
|
||
5E12000
|
trusted library allocation
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
274F000
|
stack
|
page read and write
|
||
FED000
|
stack
|
page read and write
|
||
5CF000
|
unkown
|
page execute and write copy
|
||
490E000
|
stack
|
page read and write
|
||
27997630000
|
trusted library allocation
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
13AF000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
5E67000
|
trusted library allocation
|
page read and write
|
||
5FDE000
|
stack
|
page read and write
|
||
28E2CC70000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
4AD4000
|
heap
|
page read and write
|
||
1FED92BB000
|
heap
|
page read and write
|
||
4A50000
|
direct allocation
|
page execute and read and write
|
||
27997630000
|
trusted library allocation
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
72A0000
|
direct allocation
|
page execute and read and write
|
||
58F000
|
unkown
|
page readonly
|
||
603000
|
unkown
|
page execute and read and write
|
||
2479E958000
|
heap
|
page read and write
|
||
36EE000
|
stack
|
page read and write
|
||
131C0DF0000
|
heap
|
page read and write
|
||
5AC000
|
unkown
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
D9E000
|
heap
|
page read and write
|
||
D80000
|
direct allocation
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
860000
|
heap
|
page read and write
|
||
1FED9313000
|
heap
|
page read and write
|
||
7FF7EDA91000
|
unkown
|
page execute read
|
||
3AAE000
|
stack
|
page read and write
|
||
A58000
|
heap
|
page read and write
|
||
630E000
|
stack
|
page read and write
|
||
4470000
|
heap
|
page read and write
|
||
14E4000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
F1E10FC000
|
stack
|
page read and write
|
||
27997630000
|
trusted library allocation
|
page read and write
|
||
1FED9317000
|
heap
|
page read and write
|
||
2479E955000
|
heap
|
page read and write
|
||
27997630000
|
trusted library allocation
|
page read and write
|
||
5FB000
|
unkown
|
page execute and write copy
|
||
F80000
|
heap
|
page read and write
|
||
5FB5000
|
trusted library allocation
|
page read and write
|
||
A91000
|
heap
|
page read and write
|
||
2479E870000
|
heap
|
page read and write
|
||
510000
|
heap
|
page read and write
|
||
4CFE000
|
stack
|
page read and write
|
||
416F000
|
stack
|
page read and write
|
||
1B1B4270000
|
trusted library allocation
|
page read and write
|
||
DA5BAFE000
|
stack
|
page read and write
|
||
2DBF7530000
|
heap
|
page read and write
|
||
5E62000
|
trusted library allocation
|
page read and write
|
||
740000
|
direct allocation
|
page read and write
|
||
5DDC000
|
trusted library allocation
|
page read and write
|
||
27997630000
|
trusted library allocation
|
page read and write
|
||
4CA0000
|
direct allocation
|
page execute and read and write
|
||
1FED9E0D000
|
heap
|
page read and write
|
||
4C00000
|
direct allocation
|
page execute and read and write
|
||
5DE8000
|
trusted library allocation
|
page read and write
|
||
1820000
|
direct allocation
|
page read and write
|
||
2DBA12A0000
|
direct allocation
|
page read and write
|
||
40AF000
|
stack
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
5DEC000
|
trusted library allocation
|
page read and write
|
||
5DF0000
|
trusted library allocation
|
page read and write
|
||
2451E0C0000
|
trusted library allocation
|
page read and write
|
||
543D000
|
stack
|
page read and write
|
||
D80000
|
direct allocation
|
page read and write
|
||
5B5000
|
heap
|
page read and write
|
||
2479E998000
|
heap
|
page read and write
|
||
540000
|
unkown
|
page readonly
|
||
3BEE000
|
stack
|
page read and write
|
||
DD6000
|
unkown
|
page execute and write copy
|
||
6AE1000
|
heap
|
page read and write
|
||
5A0000
|
unkown
|
page execute and write copy
|
||
5E39000
|
trusted library allocation
|
page read and write
|
||
5AF000
|
unkown
|
page readonly
|
||
71C0000
|
direct allocation
|
page execute and read and write
|
||
27997630000
|
trusted library allocation
|
page read and write
|
||
145E000
|
heap
|
page read and write
|
||
1FED9E17000
|
heap
|
page read and write
|
||
1425000
|
heap
|
page read and write
|
||
E96000
|
unkown
|
page write copy
|
||
A60000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
7FF7ECDD0000
|
unkown
|
page readonly
|
||
2479E9AC000
|
heap
|
page read and write
|
||
4A7E000
|
stack
|
page read and write
|
||
140C000
|
heap
|
page read and write
|
||
5E78000
|
trusted library allocation
|
page read and write
|
||
D80000
|
direct allocation
|
page read and write
|
||
5DE6000
|
trusted library allocation
|
page read and write
|
||
17225F4B000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
13EB000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
E9D000
|
unkown
|
page readonly
|
||
145E000
|
heap
|
page read and write
|
||
5E12000
|
trusted library allocation
|
page read and write
|
||
2451E0C0000
|
trusted library allocation
|
page read and write
|
||
7FF7EDAB9000
|
unkown
|
page readonly
|
||
B23000
|
heap
|
page read and write
|
||
294E000
|
stack
|
page read and write
|
||
5E02000
|
trusted library allocation
|
page read and write
|
||
7A0000
|
unkown
|
page readonly
|
||
1FED92FC000
|
heap
|
page read and write
|
||
1429000
|
heap
|
page read and write
|
||
CB9BEFC000
|
stack
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
1B1B4140000
|
heap
|
page read and write
|
||
7FF73FDCF000
|
unkown
|
page write copy
|
||
1FED9295000
|
heap
|
page read and write
|
||
5E5F000
|
trusted library allocation
|
page read and write
|
||
CDF000
|
stack
|
page read and write
|
||
52FE000
|
stack
|
page read and write
|
||
42FF000
|
stack
|
page read and write
|
||
5E0C000
|
trusted library allocation
|
page read and write
|
||
5E52000
|
trusted library allocation
|
page read and write
|
||
1820000
|
direct allocation
|
page read and write
|
||
A85000
|
heap
|
page read and write
|
||
5E09000
|
trusted library allocation
|
page read and write
|
||
1D8F5870000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
45E0000
|
direct allocation
|
page read and write
|
||
3D5000
|
unkown
|
page execute and write copy
|
||
2EFF000
|
stack
|
page read and write
|
||
5420000
|
direct allocation
|
page execute and read and write
|
||
45F1000
|
heap
|
page read and write
|
||
247A067A000
|
heap
|
page read and write
|
||
5DF5000
|
trusted library allocation
|
page read and write
|
||
1820000
|
direct allocation
|
page read and write
|
||
7220000
|
direct allocation
|
page execute and read and write
|
||
1149000
|
unkown
|
page execute and read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
E96000
|
unkown
|
page write copy
|
||
7E0000
|
heap
|
page read and write
|
||
540000
|
unkown
|
page readonly
|
||
CA148FC000
|
stack
|
page read and write
|
||
315B000
|
stack
|
page read and write
|
||
366E000
|
stack
|
page read and write
|
||
2CAF000
|
stack
|
page read and write
|
||
13AE000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
2451E0C0000
|
trusted library allocation
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
5A8F000
|
stack
|
page read and write
|
||
28E2CC99000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
37EF000
|
stack
|
page read and write
|
||
AC9000
|
heap
|
page read and write
|
||
1847000
|
heap
|
page read and write
|
||
6460000
|
heap
|
page read and write
|
||
A94000
|
heap
|
page read and write
|
||
5E5F000
|
trusted library allocation
|
page read and write
|
||
2451E0C0000
|
trusted library allocation
|
page read and write
|
||
1120000
|
heap
|
page read and write
|
||
140C000
|
heap
|
page read and write
|
||
71C0000
|
direct allocation
|
page execute and read and write
|
||
A8D000
|
heap
|
page read and write
|
||
593000
|
unkown
|
page execute and write copy
|
||
19C2000
|
heap
|
page read and write
|
||
145E000
|
heap
|
page read and write
|
||
367E000
|
stack
|
page read and write
|
||
1B1B42B0000
|
trusted library allocation
|
page read and write
|
||
5E5F000
|
trusted library allocation
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
1790000
|
unkown
|
page readonly
|
||
7FF7ECDED000
|
unkown
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
45E0000
|
direct allocation
|
page read and write
|
||
E88EAFE000
|
stack
|
page read and write
|
||
558000
|
unkown
|
page execute and read and write
|
||
2DBF7670000
|
heap
|
page read and write
|
||
1FED9294000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
F89000
|
unkown
|
page execute and write copy
|
||
567000
|
unkown
|
page execute and write copy
|
||
1429000
|
heap
|
page read and write
|
||
1FED92AE000
|
heap
|
page read and write
|
||
CF0000
|
heap
|
page read and write
|
||
10C3000
|
unkown
|
page execute and write copy
|
||
6F9C000
|
stack
|
page read and write
|
||
100F000
|
unkown
|
page execute and write copy
|
||
9B66CF3000
|
stack
|
page read and write
|
||
4E00000
|
direct allocation
|
page read and write
|
||
AA4000
|
heap
|
page read and write
|
||
27997430000
|
heap
|
page read and write
|
||
4EA0000
|
heap
|
page read and write
|
||
592000
|
unkown
|
page execute and read and write
|
||
8E9000
|
unkown
|
page readonly
|
||
145E000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
2479E94C000
|
heap
|
page read and write
|
||
35DE000
|
stack
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
FDC000
|
unkown
|
page execute and write copy
|
||
6AE1000
|
heap
|
page read and write
|
||
27997630000
|
trusted library allocation
|
page read and write
|
||
346E000
|
stack
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
5E12000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
heap
|
page read and write
|
||
4E00000
|
direct allocation
|
page read and write
|
||
B14000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
7FF7EDAB9000
|
unkown
|
page readonly
|
||
4900000
|
direct allocation
|
page read and write
|
||
311F000
|
stack
|
page read and write
|
||
562000
|
unkown
|
page execute and write copy
|
||
17AE000
|
stack
|
page read and write
|
||
48D0000
|
direct allocation
|
page read and write
|
||
F10000
|
heap
|
page read and write
|
||
3D5000
|
unkown
|
page execute and write copy
|
||
392D000
|
stack
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
1429000
|
heap
|
page read and write
|
||
4A80000
|
direct allocation
|
page execute and read and write
|
||
48D0000
|
direct allocation
|
page read and write
|
||
7FF7EDA91000
|
unkown
|
page execute read
|
||
6AE1000
|
heap
|
page read and write
|
||
28908200000
|
heap
|
page read and write
|
||
343E000
|
stack
|
page read and write
|
||
E09000
|
unkown
|
page write copy
|
||
45F1000
|
heap
|
page read and write
|
||
2479E910000
|
heap
|
page read and write
|
||
5E12000
|
trusted library allocation
|
page read and write
|
||
5E12000
|
trusted library allocation
|
page read and write
|
||
27997630000
|
trusted library allocation
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
D80000
|
direct allocation
|
page read and write
|
||
140C000
|
heap
|
page read and write
|
||
2479E998000
|
heap
|
page read and write
|
||
5DD2000
|
trusted library allocation
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
1450000
|
heap
|
page read and write
|
||
66D000
|
unkown
|
page execute and read and write
|
||
12FC000
|
stack
|
page read and write
|
||
2DBA2D80000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
24C99B58000
|
heap
|
page read and write
|
||
28909C10000
|
direct allocation
|
page read and write
|
||
466F000
|
stack
|
page read and write
|
||
277F000
|
stack
|
page read and write
|
||
2451E0C0000
|
trusted library allocation
|
page read and write
|
||
9DE000
|
heap
|
page read and write
|
||
4C60000
|
direct allocation
|
page execute and read and write
|
||
5E5F000
|
trusted library allocation
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
D9A000
|
heap
|
page read and write
|
||
5C3E000
|
stack
|
page read and write
|
||
5E7A000
|
trusted library allocation
|
page read and write
|
||
5AC000
|
unkown
|
page write copy
|
||
E31000
|
unkown
|
page execute read
|
||
6AE1000
|
heap
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
5AF000
|
unkown
|
page readonly
|
||
27997630000
|
trusted library allocation
|
page read and write
|
||
2DBA1260000
|
heap
|
page read and write
|
||
3C2000
|
unkown
|
page execute and read and write
|
||
9B66DFE000
|
stack
|
page read and write
|
||
A9C77FA000
|
stack
|
page read and write
|
||
28909AA0000
|
heap
|
page read and write
|
||
9B670FE000
|
stack
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
5E5F000
|
trusted library allocation
|
page read and write
|
||
512C000
|
direct allocation
|
page read and write
|
||
B30000
|
heap
|
page read and write
|
||
453F000
|
stack
|
page read and write
|
||
A7227FF000
|
stack
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
16463F15000
|
heap
|
page read and write
|
||
14E4000
|
heap
|
page read and write
|
||
A94000
|
heap
|
page read and write
|
||
68DE000
|
stack
|
page read and write
|
||
BD5000
|
heap
|
page read and write
|
||
4C70000
|
direct allocation
|
page execute and read and write
|
||
24C99AE0000
|
trusted library allocation
|
page read and write
|
||
5D9000
|
unkown
|
page execute and read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
3C9000
|
unkown
|
page write copy
|
||
5E27000
|
trusted library allocation
|
page read and write
|
||
5E5F000
|
trusted library allocation
|
page read and write
|
||
247A0650000
|
remote allocation
|
page read and write
|
||
52A0000
|
direct allocation
|
page read and write
|
||
59C000
|
unkown
|
page execute and write copy
|
||
D80000
|
direct allocation
|
page read and write
|
||
E30000
|
unkown
|
page readonly
|
||
2D6F000
|
stack
|
page read and write
|
||
10AC000
|
unkown
|
page execute and write copy
|
||
5260000
|
heap
|
page read and write
|
||
7DE000
|
heap
|
page read and write
|
||
19E4000
|
heap
|
page read and write
|
||
D7E000
|
unkown
|
page execute and read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
48FF000
|
stack
|
page read and write
|
||
1E275430000
|
heap
|
page read and write
|
||
C5E000
|
stack
|
page read and write
|
||
31AF000
|
stack
|
page read and write
|
||
1FED92AA000
|
heap
|
page read and write
|
||
82023FE000
|
stack
|
page read and write
|
||
131C0DF8000
|
heap
|
page read and write
|
||
27997630000
|
trusted library allocation
|
page read and write
|
||
4ABB000
|
stack
|
page read and write
|
||
281A9F00000
|
heap
|
page read and write
|
||
49B63FF000
|
stack
|
page read and write
|
||
4CBF000
|
stack
|
page read and write
|
||
13D6000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
144C000
|
heap
|
page read and write
|
||
B32000
|
unkown
|
page write copy
|
||
24C99AE0000
|
trusted library allocation
|
page read and write
|
||
5DEC000
|
trusted library allocation
|
page read and write
|
||
13CD000
|
heap
|
page read and write
|
||
5AF000
|
unkown
|
page readonly
|
||
5E29000
|
trusted library allocation
|
page read and write
|
||
27997630000
|
trusted library allocation
|
page read and write
|
||
1FED9348000
|
heap
|
page read and write
|
||
4A40000
|
direct allocation
|
page execute and read and write
|
||
1FED92C0000
|
heap
|
page read and write
|
||
4BD0000
|
direct allocation
|
page execute and read and write
|
||
2479E961000
|
heap
|
page read and write
|
||
562000
|
unkown
|
page execute and read and write
|
||
3C2000
|
unkown
|
page execute and write copy
|
||
5E5F000
|
trusted library allocation
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
E16000
|
unkown
|
page execute and read and write
|
||
23632680000
|
heap
|
page read and write
|
||
1149000
|
unkown
|
page execute and write copy
|
||
33EE000
|
stack
|
page read and write
|
||
7FF6DA1DF000
|
unkown
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
7210000
|
direct allocation
|
page execute and read and write
|
||
45F1000
|
heap
|
page read and write
|
||
28909C00000
|
heap
|
page read and write
|
||
5E12000
|
trusted library allocation
|
page read and write
|
||
27997630000
|
trusted library allocation
|
page read and write
|
||
5E5F000
|
trusted library allocation
|
page read and write
|
||
5DF7000
|
trusted library allocation
|
page read and write
|
||
109F000
|
unkown
|
page execute and write copy
|
||
29EE000
|
stack
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
4AD0000
|
direct allocation
|
page execute and read and write
|
||
5E06000
|
trusted library allocation
|
page read and write
|
||
651000
|
unkown
|
page execute read
|
||
7DC000
|
stack
|
page read and write
|
||
5DC0000
|
heap
|
page read and write
|
||
45F0000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
1B1B4270000
|
trusted library allocation
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
1FED92FC000
|
heap
|
page read and write
|
||
592000
|
unkown
|
page execute and read and write
|
||
71C0000
|
direct allocation
|
page execute and read and write
|
||
2451E0C0000
|
trusted library allocation
|
page read and write
|
||
326F000
|
stack
|
page read and write
|
||
5DEB000
|
trusted library allocation
|
page read and write
|
||
2479E98B000
|
heap
|
page read and write
|
||
35AE000
|
stack
|
page read and write
|
||
5E2A000
|
trusted library allocation
|
page read and write
|
||
1FED9348000
|
heap
|
page read and write
|
||
281AB9D0000
|
direct allocation
|
page read and write
|
||
F97000
|
unkown
|
page execute and write copy
|
||
10C1000
|
direct allocation
|
page execute read
|
||
27997630000
|
trusted library allocation
|
page read and write
|
||
541000
|
unkown
|
page execute read
|
||
145E000
|
heap
|
page read and write
|
||
6ADF000
|
stack
|
page read and write
|
||
5E02000
|
trusted library allocation
|
page read and write
|
||
53DF000
|
stack
|
page read and write
|
||
3E2F000
|
stack
|
page read and write
|
||
1B1B4270000
|
trusted library allocation
|
page read and write
|
||
10AE000
|
unkown
|
page execute and write copy
|
||
10C0000
|
direct allocation
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
1FED9310000
|
heap
|
page read and write
|
||
1FED92B3000
|
heap
|
page read and write
|
||
3E2F000
|
stack
|
page read and write
|
||
A22000
|
heap
|
page read and write
|
||
541000
|
unkown
|
page execute read
|
||
1677000
|
heap
|
page read and write
|
||
B32000
|
heap
|
page read and write
|
||
1449000
|
heap
|
page read and write
|
||
700000
|
direct allocation
|
page read and write
|
||
E0B000
|
unkown
|
page execute and read and write
|
||
4601000
|
heap
|
page read and write
|
||
9CF000
|
stack
|
page read and write
|
||
2479E979000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
5DF1000
|
trusted library allocation
|
page read and write
|
||
9D1000
|
heap
|
page read and write
|
||
1433000
|
heap
|
page read and write
|
||
A7228FF000
|
stack
|
page read and write
|
||
5E4F000
|
trusted library allocation
|
page read and write
|
||
7DA000
|
heap
|
page read and write
|
||
27997630000
|
trusted library allocation
|
page read and write
|
||
D80000
|
direct allocation
|
page read and write
|
||
71C0000
|
direct allocation
|
page execute and read and write
|
||
1610000
|
heap
|
page read and write
|
||
1FED92A1000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
3670000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
5950000
|
heap
|
page read and write
|
||
353F000
|
stack
|
page read and write
|
||
4A50000
|
direct allocation
|
page execute and read and write
|
||
A9C6FFF000
|
stack
|
page read and write
|
||
3B7E000
|
stack
|
page read and write
|
||
19D4000
|
heap
|
page read and write
|
||
1820000
|
direct allocation
|
page read and write
|
||
E9D000
|
unkown
|
page readonly
|
||
DBE000
|
unkown
|
page execute and read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
1035000
|
unkown
|
page execute and read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
1FED92AF000
|
heap
|
page read and write
|
||
5E9000
|
unkown
|
page execute and read and write
|
||
1610000
|
heap
|
page read and write
|
||
1820000
|
direct allocation
|
page read and write
|
||
46A0000
|
heap
|
page read and write
|
||
652C000
|
direct allocation
|
page read and write
|
||
281AA0F0000
|
heap
|
page read and write
|
||
5E12000
|
trusted library allocation
|
page read and write
|
||
5E47000
|
trusted library allocation
|
page read and write
|
||
1450000
|
heap
|
page read and write
|
||
5E12000
|
trusted library allocation
|
page read and write
|
||
B78000
|
heap
|
page read and write
|
||
19C4C180000
|
heap
|
page read and write
|
||
1820000
|
direct allocation
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
E15000
|
unkown
|
page execute and write copy
|
||
4691000
|
heap
|
page read and write
|
||
5E5F000
|
trusted library allocation
|
page read and write
|
||
621000
|
unkown
|
page execute and write copy
|
||
7A5F000
|
stack
|
page read and write
|
||
247A0687000
|
heap
|
page read and write
|
||
144C000
|
heap
|
page read and write
|
||
2451E0C0000
|
trusted library allocation
|
page read and write
|
||
423000
|
unkown
|
page readonly
|
||
7FF7EDA90000
|
unkown
|
page readonly
|
||
45F1000
|
heap
|
page read and write
|
||
5E32000
|
trusted library allocation
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
14E4000
|
heap
|
page read and write
|
||
3F3E000
|
stack
|
page read and write
|
||
AA1000
|
heap
|
page read and write
|
||
24C99AE0000
|
trusted library allocation
|
page read and write
|
||
5AF000
|
unkown
|
page readonly
|
||
740000
|
direct allocation
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
2479E952000
|
heap
|
page read and write
|
||
5E0F000
|
trusted library allocation
|
page read and write
|
||
19E8000
|
heap
|
page read and write
|
||
540000
|
unkown
|
page readonly
|
||
2479E967000
|
heap
|
page read and write
|
||
13C9000
|
heap
|
page read and write
|
||
27997630000
|
trusted library allocation
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
1820000
|
direct allocation
|
page read and write
|
||
2479E916000
|
heap
|
page read and write
|
||
1FED92DC000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
1FED9440000
|
heap
|
page read and write
|
||
1FED9E1F000
|
heap
|
page read and write
|
||
4B0000
|
unkown
|
page readonly
|
||
1D8F7230000
|
direct allocation
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
C40000
|
direct allocation
|
page read and write
|
||
4E9E000
|
heap
|
page read and write
|
||
140A000
|
heap
|
page read and write
|
||
2479E949000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
1FED99A0000
|
remote allocation
|
page read and write
|
||
10C2000
|
unkown
|
page execute and read and write
|
||
546C000
|
trusted library allocation
|
page read and write
|
||
247A0280000
|
trusted library allocation
|
page read and write
|
||
2451E0C0000
|
trusted library allocation
|
page read and write
|
||
17226155000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
7FF7EDACD000
|
unkown
|
page readonly
|
||
145D000
|
stack
|
page read and write
|
||
4AE0000
|
direct allocation
|
page execute and read and write
|
||
2B06A6F0000
|
direct allocation
|
page read and write
|
||
8F0000
|
heap
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
A9C74FD000
|
stack
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
5AC000
|
unkown
|
page write copy
|
||
7FF73FDCF000
|
unkown
|
page read and write
|
||
3BE0000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
5920000
|
remote allocation
|
page read and write
|
||
7FF7EDACD000
|
unkown
|
page readonly
|
||
6BE0000
|
trusted library allocation
|
page read and write
|
||
405E000
|
stack
|
page read and write
|
||
1FED92A5000
|
heap
|
page read and write
|
||
593000
|
unkown
|
page execute and write copy
|
||
7FF6D9D50000
|
unkown
|
page readonly
|
||
4691000
|
heap
|
page read and write
|
||
7FF73FDCF000
|
unkown
|
page write copy
|
||
9DA000
|
heap
|
page read and write
|
||
71C0000
|
direct allocation
|
page execute and read and write
|
||
7FF7EDA91000
|
unkown
|
page execute read
|
||
3E2F000
|
stack
|
page read and write
|
||
1D8F57F0000
|
direct allocation
|
page read and write
|
||
14E4000
|
heap
|
page read and write
|
||
1D8F57A0000
|
heap
|
page read and write
|
||
145E000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
5DF7000
|
trusted library allocation
|
page read and write
|
||
4BB34FE000
|
stack
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
471E000
|
stack
|
page read and write
|
||
382E000
|
stack
|
page read and write
|
||
4B7F000
|
stack
|
page read and write
|
||
7FF7ECDD0000
|
unkown
|
page readonly
|
||
1FED92B4000
|
heap
|
page read and write
|
||
1FED92B2000
|
heap
|
page read and write
|
||
4BE0000
|
direct allocation
|
page execute and read and write
|
||
2DBA2D85000
|
heap
|
page read and write
|
||
4BBF000
|
stack
|
page read and write
|
||
1FED9E00000
|
heap
|
page read and write
|
||
C0E000
|
stack
|
page read and write
|
||
103A000
|
unkown
|
page execute and read and write
|
||
13EC000
|
heap
|
page read and write
|
||
1B1B42B0000
|
trusted library allocation
|
page read and write
|
||
1FED9910000
|
trusted library allocation
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
FA0000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
D80000
|
direct allocation
|
page read and write
|
||
541000
|
unkown
|
page execute read
|
||
1395000
|
heap
|
page read and write
|
||
82DC000
|
stack
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
5420000
|
direct allocation
|
page execute and read and write
|
||
683000
|
unkown
|
page execute and write copy
|
||
267E000
|
stack
|
page read and write
|
||
2890820B000
|
heap
|
page read and write
|
||
1FED9305000
|
heap
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
2DBA2C60000
|
heap
|
page read and write
|
||
9B676FB000
|
stack
|
page read and write
|
||
B18000
|
heap
|
page read and write
|
||
1D8F57D0000
|
heap
|
page read and write
|
||
5E01000
|
trusted library allocation
|
page read and write
|
||
1427000
|
heap
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
7FF7ECD60000
|
unkown
|
page readonly
|
||
7FF7ECDED000
|
unkown
|
page write copy
|
||
5D4000
|
unkown
|
page execute and read and write
|
||
7FF7ECD60000
|
unkown
|
page readonly
|
||
45F1000
|
heap
|
page read and write
|
||
4E90000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
173E000
|
stack
|
page read and write
|
||
C40000
|
direct allocation
|
page read and write
|
||
16463AE0000
|
heap
|
page read and write
|
||
FDE000
|
unkown
|
page execute and read and write
|
||
5E5F000
|
trusted library allocation
|
page read and write
|
||
2FEF000
|
stack
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
C30000
|
heap
|
page read and write
|
||
5DEA000
|
trusted library allocation
|
page read and write
|
||
B0F000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
32C000
|
stack
|
page read and write
|
||
4D9B000
|
stack
|
page read and write
|
||
5E5F000
|
trusted library allocation
|
page read and write
|
||
33FF000
|
stack
|
page read and write
|
||
5400000
|
direct allocation
|
page execute and read and write
|
||
3F7E000
|
stack
|
page read and write
|
||
B60000
|
heap
|
page read and write
|
||
E30000
|
unkown
|
page readonly
|
||
3C0000
|
heap
|
page read and write
|
||
352E000
|
stack
|
page read and write
|
||
23630C10000
|
heap
|
page read and write
|
||
66C000
|
unkown
|
page execute and write copy
|
||
4691000
|
heap
|
page read and write
|
||
5F7D000
|
trusted library allocation
|
page read and write
|
||
201FDB0B000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
D80000
|
direct allocation
|
page read and write
|
||
3BAF000
|
stack
|
page read and write
|
||
673000
|
unkown
|
page execute and write copy
|
||
1E27543B000
|
heap
|
page read and write
|
||
2A6E000
|
stack
|
page read and write
|
||
3CEF000
|
stack
|
page read and write
|
||
B14000
|
heap
|
page read and write
|
||
540000
|
unkown
|
page readonly
|
||
541000
|
unkown
|
page execute read
|
||
6AE1000
|
heap
|
page read and write
|
||
5D5000
|
unkown
|
page execute and write copy
|
||
346E000
|
stack
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
24C99AE0000
|
trusted library allocation
|
page read and write
|
||
5DEC000
|
trusted library allocation
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
5AF000
|
unkown
|
page readonly
|
||
1FED9346000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
540000
|
unkown
|
page readonly
|
||
3D7000
|
unkown
|
page execute and write copy
|
||
268C000
|
stack
|
page read and write
|
||
5AF000
|
unkown
|
page readonly
|
||
201FDA70000
|
direct allocation
|
page read and write
|
||
7FF7EDAB9000
|
unkown
|
page readonly
|
||
4691000
|
heap
|
page read and write
|
||
71C0000
|
direct allocation
|
page execute and read and write
|
||
4E11000
|
heap
|
page read and write
|
||
F74000
|
unkown
|
page execute and read and write
|
||
8F5000
|
heap
|
page read and write
|
||
E30000
|
unkown
|
page readonly
|
||
567000
|
unkown
|
page execute and write copy
|
||
7FF7EDACD000
|
unkown
|
page readonly
|
||
145E000
|
heap
|
page read and write
|
||
28E0000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
A7D83FE000
|
stack
|
page read and write
|
||
2479E98B000
|
heap
|
page read and write
|
||
3DFF000
|
stack
|
page read and write
|
||
33FE000
|
stack
|
page read and write
|
||
2B06A7C5000
|
heap
|
page read and write
|
||
B23000
|
unkown
|
page execute and read and write
|
||
13AE000
|
heap
|
page read and write
|
||
8FA000
|
stack
|
page read and write
|
||
37DF000
|
stack
|
page read and write
|
||
19E8000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
142B000
|
heap
|
page read and write
|
||
17225F40000
|
heap
|
page read and write
|
||
7546000
|
direct allocation
|
page read and write
|
||
19DA000
|
heap
|
page read and write
|
||
5E5F000
|
trusted library allocation
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
24C99AE0000
|
trusted library allocation
|
page read and write
|
||
2B068E30000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
5E12000
|
trusted library allocation
|
page read and write
|
||
3A3F000
|
stack
|
page read and write
|
||
58F000
|
unkown
|
page readonly
|
||
1112000
|
direct allocation
|
page readonly
|
||
1FED92EF000
|
heap
|
page read and write
|
||
292F000
|
stack
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
145E000
|
heap
|
page read and write
|
||
760000
|
heap
|
page read and write
|
||
2479E967000
|
heap
|
page read and write
|
||
28E2CC78000
|
heap
|
page read and write
|
||
3D7000
|
unkown
|
page execute and write copy
|
||
A9C70FD000
|
stack
|
page read and write
|
||
CB9C1FF000
|
stack
|
page read and write
|
||
525E000
|
stack
|
page read and write
|
||
27997630000
|
trusted library allocation
|
page read and write
|
||
4A3F000
|
stack
|
page read and write
|
||
D80000
|
direct allocation
|
page read and write
|
||
D80000
|
direct allocation
|
page read and write
|
||
2479E9CE000
|
heap
|
page read and write
|
||
34FF000
|
stack
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
5DF0000
|
trusted library allocation
|
page read and write
|
||
45E0000
|
direct allocation
|
page read and write
|
||
417F000
|
stack
|
page read and write
|
||
6A1000
|
unkown
|
page readonly
|
||
77E000
|
stack
|
page read and write
|
||
3D2E000
|
stack
|
page read and write
|
||
5DF5000
|
trusted library allocation
|
page read and write
|
||
2479E9F1000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
F1E12FF000
|
stack
|
page read and write
|
||
A94000
|
heap
|
page read and write
|
||
467F000
|
stack
|
page read and write
|
||
5F5000
|
unkown
|
page execute and read and write
|
||
1820000
|
direct allocation
|
page read and write
|
||
66C000
|
unkown
|
page execute and write copy
|
||
2479E99C000
|
heap
|
page read and write
|
||
5C2000
|
unkown
|
page execute and read and write
|
||
4B00000
|
direct allocation
|
page execute and read and write
|
||
45E0000
|
direct allocation
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
1840000
|
heap
|
page read and write
|
||
5DEE000
|
trusted library allocation
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
5DD9000
|
trusted library allocation
|
page read and write
|
||
556000
|
unkown
|
page execute and read and write
|
||
4C30000
|
direct allocation
|
page execute and read and write
|
||
45F1000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
5E41000
|
trusted library allocation
|
page read and write
|
||
64AF000
|
stack
|
page read and write
|
||
5E02000
|
trusted library allocation
|
page read and write
|
||
443D000
|
stack
|
page read and write
|
||
13A2000
|
heap
|
page read and write
|
||
41E000
|
unkown
|
page read and write
|
||
5E2F000
|
trusted library allocation
|
page read and write
|
||
59E000
|
unkown
|
page execute and read and write
|
||
5E13000
|
trusted library allocation
|
page read and write
|
||
281AB9F0000
|
direct allocation
|
page read and write
|
||
E96000
|
unkown
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
357E000
|
stack
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
5DEA000
|
trusted library allocation
|
page read and write
|
||
59C000
|
unkown
|
page execute and write copy
|
||
14075E000
|
unkown
|
page execute read
|
||
4691000
|
heap
|
page read and write
|
||
281A9FFB000
|
heap
|
page read and write
|
||
6FC000
|
stack
|
page read and write
|
||
2BAE000
|
stack
|
page read and write
|
||
2451E0C0000
|
trusted library allocation
|
page read and write
|
||
C21000
|
heap
|
page read and write
|
||
136E000
|
heap
|
page read and write
|
||
700000
|
direct allocation
|
page read and write
|
||
F96000
|
unkown
|
page execute and read and write
|
||
5DEC000
|
trusted library allocation
|
page read and write
|
||
27997630000
|
trusted library allocation
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
14E4000
|
heap
|
page read and write
|
||
A9C6BA3000
|
stack
|
page read and write
|
||
59E000
|
unkown
|
page execute and read and write
|
||
4691000
|
heap
|
page read and write
|
||
4AD0000
|
direct allocation
|
page execute and read and write
|
||
B4E000
|
stack
|
page read and write
|
||
53F000
|
unkown
|
page execute and write copy
|
||
14E4000
|
heap
|
page read and write
|
||
1C3F000
|
stack
|
page read and write
|
||
A96000
|
heap
|
page read and write
|
||
4E00000
|
direct allocation
|
page read and write
|
||
1D8F5875000
|
heap
|
page read and write
|
||
2479E9C7000
|
heap
|
page read and write
|
||
5B2C000
|
direct allocation
|
page read and write
|
||
A9C6EFE000
|
stack
|
page read and write
|
||
D80000
|
direct allocation
|
page read and write
|
||
556000
|
unkown
|
page execute and read and write
|
||
5430000
|
direct allocation
|
page execute and read and write
|
||
E9D000
|
unkown
|
page readonly
|
||
541000
|
unkown
|
page execute read
|
||
2F2F000
|
stack
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
3C2000
|
unkown
|
page execute and read and write
|
||
5E28000
|
trusted library allocation
|
page read and write
|
||
376F000
|
stack
|
page read and write
|
||
AFD000
|
heap
|
page read and write
|
||
19C4C220000
|
heap
|
page read and write
|
||
199000
|
stack
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
1436000
|
heap
|
page read and write
|
||
4B1000
|
unkown
|
page execute and write copy
|
||
5DD1000
|
trusted library allocation
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
A8D000
|
heap
|
page read and write
|
||
B85BCFF000
|
stack
|
page read and write
|
||
2451E0C0000
|
trusted library allocation
|
page read and write
|
||
2479E94A000
|
heap
|
page read and write
|
||
2451E0C0000
|
trusted library allocation
|
page read and write
|
||
567000
|
unkown
|
page execute and write copy
|
||
2451E0C0000
|
trusted library allocation
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
145E000
|
heap
|
page read and write
|
||
7FF7ECDF1000
|
unkown
|
page readonly
|
||
1443000
|
heap
|
page read and write
|
||
5E5F000
|
trusted library allocation
|
page read and write
|
||
5E5F000
|
trusted library allocation
|
page read and write
|
||
7FF7EDA90000
|
unkown
|
page readonly
|
||
673000
|
unkown
|
page execute and write copy
|
||
139A000
|
heap
|
page read and write
|
||
1FED9E20000
|
heap
|
page read and write
|
||
5E60000
|
trusted library allocation
|
page read and write
|
||
5E5F000
|
trusted library allocation
|
page read and write
|
||
C40000
|
direct allocation
|
page read and write
|
||
FD3000
|
unkown
|
page execute and write copy
|
||
4691000
|
heap
|
page read and write
|
||
103B000
|
unkown
|
page execute and write copy
|
||
1128000
|
heap
|
page read and write
|
||
C2F000
|
stack
|
page read and write
|
||
4A70000
|
direct allocation
|
page execute and read and write
|
||
682000
|
unkown
|
page execute and write copy
|
||
1443000
|
heap
|
page read and write
|
||
24C99AE0000
|
trusted library allocation
|
page read and write
|
||
1B1B42B0000
|
trusted library allocation
|
page read and write
|
||
32BF000
|
stack
|
page read and write
|
||
1B1B42F0000
|
heap
|
page read and write
|
||
1FED92CD000
|
heap
|
page read and write
|
||
131C1190000
|
heap
|
page read and write
|
||
1820000
|
direct allocation
|
page read and write
|
||
5E5F000
|
trusted library allocation
|
page read and write
|
||
19E4000
|
heap
|
page read and write
|
||
B10000
|
heap
|
page read and write
|
||
312F000
|
stack
|
page read and write
|
||
407F000
|
stack
|
page read and write
|
||
5E12000
|
trusted library allocation
|
page read and write
|
||
5AA000
|
unkown
|
page execute and read and write
|
||
75CA000
|
heap
|
page read and write
|
||
5E5F000
|
trusted library allocation
|
page read and write
|
||
65D000
|
unkown
|
page execute and write copy
|
||
4691000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
5E5F000
|
trusted library allocation
|
page read and write
|
||
71C0000
|
direct allocation
|
page execute and read and write
|
||
5E4F000
|
trusted library allocation
|
page read and write
|
||
5D4000
|
unkown
|
page execute and read and write
|
||
540000
|
unkown
|
page readonly
|
||
3BBE000
|
stack
|
page read and write
|
||
42BF000
|
stack
|
page read and write
|
||
622000
|
unkown
|
page execute and read and write
|
||
C40000
|
direct allocation
|
page read and write
|
||
5AF000
|
unkown
|
page readonly
|
||
7FF6DA1DD000
|
unkown
|
page execute and read and write
|
||
27997630000
|
trusted library allocation
|
page read and write
|
||
3E6E000
|
stack
|
page read and write
|
||
7FF73FDC8000
|
unkown
|
page execute and read and write
|
||
AFB000
|
heap
|
page read and write
|
||
38DF000
|
stack
|
page read and write
|
||
247A0687000
|
heap
|
page read and write
|
||
4D9F000
|
stack
|
page read and write
|
||
1B1B42B0000
|
trusted library allocation
|
page read and write
|
||
73D0000
|
trusted library allocation
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
C4D000
|
stack
|
page read and write
|
||
35AE000
|
stack
|
page read and write
|
||
27997400000
|
heap
|
page read and write
|
||
6045000
|
trusted library allocation
|
page read and write
|
||
4DDE000
|
stack
|
page read and write
|
||
5AF000
|
unkown
|
page readonly
|
||
E96000
|
unkown
|
page write copy
|
||
5E5F000
|
trusted library allocation
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
5E5F000
|
trusted library allocation
|
page read and write
|
||
7DF0000
|
heap
|
page read and write
|
||
7490000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
45E0000
|
direct allocation
|
page read and write
|
||
4AA0000
|
direct allocation
|
page execute and read and write
|
||
4691000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
10C2000
|
unkown
|
page execute and write copy
|
||
6AE1000
|
heap
|
page read and write
|
||
802C000
|
stack
|
page read and write
|
||
5E01000
|
trusted library allocation
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
17C0000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
5F2000
|
unkown
|
page execute and write copy
|
||
17D4000
|
heap
|
page read and write
|
||
5F5000
|
heap
|
page read and write
|
||
618F000
|
stack
|
page read and write
|
||
FAC000
|
unkown
|
page execute and read and write
|
||
71C0000
|
direct allocation
|
page execute and read and write
|
||
540000
|
unkown
|
page readonly
|
||
10B3000
|
unkown
|
page execute and write copy
|
||
CB9BFFF000
|
stack
|
page read and write
|
||
2DBF77F5000
|
heap
|
page read and write
|
||
5DEC000
|
trusted library allocation
|
page read and write
|
||
139A000
|
heap
|
page read and write
|
||
2EEE000
|
stack
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
562000
|
unkown
|
page execute and write copy
|
||
5E0B000
|
trusted library allocation
|
page read and write
|
||
A59000
|
heap
|
page read and write
|
||
1FED92C6000
|
heap
|
page read and write
|
||
2479E985000
|
heap
|
page read and write
|
||
1FED9302000
|
heap
|
page read and write
|
||
11D6000
|
heap
|
page read and write
|
||
2479E9AC000
|
heap
|
page read and write
|
||
1FED9307000
|
heap
|
page read and write
|
||
7FF7EDACA000
|
unkown
|
page read and write
|
||
13D6000
|
heap
|
page read and write
|
||
2479E96F000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
16463CA9000
|
heap
|
page read and write
|
||
24C99AE0000
|
trusted library allocation
|
page read and write
|
||
2479E9B0000
|
heap
|
page read and write
|
||
B23000
|
heap
|
page read and write
|
||
28DF000
|
stack
|
page read and write
|
||
140A000
|
heap
|
page read and write
|
||
1D8F5820000
|
direct allocation
|
page read and write
|
||
16463CA0000
|
heap
|
page read and write
|
||
C40000
|
direct allocation
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
5C2000
|
unkown
|
page execute and read and write
|
||
7FF7EDA91000
|
unkown
|
page execute read
|
||
2B3F000
|
stack
|
page read and write
|
||
27997630000
|
trusted library allocation
|
page read and write
|
||
5DD9000
|
trusted library allocation
|
page read and write
|
||
7FF7EDACA000
|
unkown
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
3CEF000
|
stack
|
page read and write
|
||
61DF000
|
stack
|
page read and write
|
||
4D30000
|
direct allocation
|
page execute and read and write
|
||
45F1000
|
heap
|
page read and write
|
||
5E1A000
|
trusted library allocation
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
289080F0000
|
heap
|
page read and write
|
||
3177000
|
heap
|
page read and write
|
||
48B0000
|
trusted library allocation
|
page read and write
|
||
B1C000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
83DC000
|
stack
|
page read and write
|
||
6A50000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
A70000
|
heap
|
page read and write
|
||
1FED92DC000
|
heap
|
page read and write
|
||
16F0000
|
heap
|
page read and write
|
||
5E5F000
|
trusted library allocation
|
page read and write
|
||
2479E952000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
491F000
|
stack
|
page read and write
|
||
1E0C9BC000
|
stack
|
page read and write
|
||
31AF000
|
stack
|
page read and write
|
||
541000
|
unkown
|
page execute read
|
||
17D4000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
A9C75FF000
|
stack
|
page read and write
|
||
13C9000
|
heap
|
page read and write
|
||
A94000
|
heap
|
page read and write
|
||
7FF73F941000
|
unkown
|
page execute and read and write
|
||
2479E972000
|
heap
|
page read and write
|
||
66C000
|
unkown
|
page execute and write copy
|
||
3C6F000
|
stack
|
page read and write
|
||
396E000
|
stack
|
page read and write
|
||
2451E0C0000
|
trusted library allocation
|
page read and write
|
||
55FE000
|
stack
|
page read and write
|
||
5E09000
|
trusted library allocation
|
page read and write
|
||
406E000
|
stack
|
page read and write
|
||
603000
|
unkown
|
page execute and read and write
|
||
24C99AE0000
|
trusted library allocation
|
page read and write
|
||
332E000
|
stack
|
page read and write
|
||
5E4F000
|
trusted library allocation
|
page read and write
|
||
247A0677000
|
heap
|
page read and write
|
||
A9C73FE000
|
stack
|
page read and write
|
||
422E000
|
stack
|
page read and write
|
||
7FF7ECDF1000
|
unkown
|
page readonly
|
||
3A2D000
|
stack
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
3BE6000
|
heap
|
page read and write
|
||
14E4000
|
heap
|
page read and write
|
||
F8F000
|
stack
|
page read and write
|
||
1FED9310000
|
heap
|
page read and write
|
||
1FED92AB000
|
heap
|
page read and write
|
||
5E12000
|
trusted library allocation
|
page read and write
|
||
3FAE000
|
stack
|
page read and write
|
||
5E5F000
|
trusted library allocation
|
page read and write
|
||
F7A000
|
unkown
|
page execute and read and write
|
||
27997630000
|
trusted library allocation
|
page read and write
|
||
4E00000
|
direct allocation
|
page read and write
|
||
650000
|
unkown
|
page readonly
|
||
6AE1000
|
heap
|
page read and write
|
||
56DE000
|
stack
|
page read and write
|
||
682000
|
unkown
|
page execute and read and write
|
||
4A80000
|
direct allocation
|
page execute and read and write
|
||
2479E95E000
|
heap
|
page read and write
|
||
A70000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
56C000
|
unkown
|
page execute and read and write
|
||
2CEE000
|
stack
|
page read and write
|
||
17225F30000
|
heap
|
page read and write
|
||
407E000
|
stack
|
page read and write
|
||
16463BC0000
|
heap
|
page read and write
|
||
2DEF000
|
stack
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
53D000
|
unkown
|
page execute and read and write
|
||
B1C000
|
heap
|
page read and write
|
||
6440000
|
heap
|
page read and write
|
||
13D6000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
4B5E000
|
stack
|
page read and write
|
||
5E12000
|
trusted library allocation
|
page read and write
|
||
27997630000
|
trusted library allocation
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
1617000
|
heap
|
page read and write
|
||
A96000
|
heap
|
page read and write
|
||
3CB000
|
unkown
|
page execute and write copy
|
||
6AE1000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
27997460000
|
heap
|
page read and write
|
||
B0F000
|
heap
|
page read and write
|
||
1FED9260000
|
heap
|
page read and write
|
||
5E01000
|
trusted library allocation
|
page read and write
|
||
5E02000
|
trusted library allocation
|
page read and write
|
||
66C000
|
unkown
|
page execute and write copy
|
||
1450000
|
heap
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
5E0C000
|
trusted library allocation
|
page read and write
|
||
7FF7ECDED000
|
unkown
|
page write copy
|
||
361000
|
unkown
|
page execute and write copy
|
||
6AE1000
|
heap
|
page read and write
|
||
581D000
|
stack
|
page read and write
|
||
24C99AE0000
|
trusted library allocation
|
page read and write
|
||
28AE000
|
stack
|
page read and write
|
||
360000
|
unkown
|
page readonly
|
||
2A3E000
|
stack
|
page read and write
|
||
1FED9283000
|
heap
|
page read and write
|
||
F95000
|
unkown
|
page execute and write copy
|
||
40AF000
|
stack
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
306F000
|
stack
|
page read and write
|
||
5E12000
|
trusted library allocation
|
page read and write
|
||
24C99B7A000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
24C99AE0000
|
trusted library allocation
|
page read and write
|
||
2DBF767B000
|
heap
|
page read and write
|
||
13AD000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
19C4C23D000
|
heap
|
page read and write
|
||
B0E000
|
stack
|
page read and write
|
||
63D3000
|
trusted library allocation
|
page read and write
|
||
39DF000
|
stack
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
5AEC000
|
stack
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
5E60000
|
trusted library allocation
|
page read and write
|
||
19F6000
|
heap
|
page read and write
|
||
5E27000
|
trusted library allocation
|
page read and write
|
||
E31000
|
unkown
|
page execute read
|
||
558000
|
unkown
|
page execute and read and write
|
||
3EEF000
|
stack
|
page read and write
|
||
A70000
|
heap
|
page read and write
|
||
62CF000
|
stack
|
page read and write
|
||
4DDE000
|
stack
|
page read and write
|
||
3DAE000
|
stack
|
page read and write
|
||
1B1B42B0000
|
trusted library allocation
|
page read and write
|
||
2451E0C0000
|
trusted library allocation
|
page read and write
|
||
7FF73F940000
|
unkown
|
page readonly
|
||
45F1000
|
heap
|
page read and write
|
||
28FE000
|
stack
|
page read and write
|
||
7FF7EDA91000
|
unkown
|
page execute read
|
||
1FED9346000
|
heap
|
page read and write
|
||
7FF7ECD61000
|
unkown
|
page execute read
|
||
430000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
E32DAFF000
|
stack
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
140C000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
353E000
|
stack
|
page read and write
|
||
17226110000
|
heap
|
page read and write
|
||
27997630000
|
trusted library allocation
|
page read and write
|
||
5E5F000
|
trusted library allocation
|
page read and write
|
||
2479E99C000
|
heap
|
page read and write
|
||
5420000
|
direct allocation
|
page execute and read and write
|
||
73D0000
|
trusted library allocation
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
362F000
|
stack
|
page read and write
|
||
71C0000
|
direct allocation
|
page execute and read and write
|
||
2479E99C000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
3CBE000
|
stack
|
page read and write
|
||
5E34000
|
trusted library allocation
|
page read and write
|
||
540000
|
unkown
|
page readonly
|
||
2F2F000
|
stack
|
page read and write
|
||
1080000
|
unkown
|
page execute and read and write
|
||
4691000
|
heap
|
page read and write
|
||
541000
|
unkown
|
page execute read
|
||
493E000
|
stack
|
page read and write
|
||
436E000
|
stack
|
page read and write
|
||
24C999B0000
|
heap
|
page read and write
|
||
583C0FE000
|
stack
|
page read and write
|
||
5E01000
|
trusted library allocation
|
page read and write
|
||
64C847C000
|
stack
|
page read and write
|
||
19E4000
|
heap
|
page read and write
|
||
E96000
|
unkown
|
page read and write
|
||
31BE000
|
stack
|
page read and write
|
||
1E276E30000
|
heap
|
page read and write
|
||
4E00000
|
direct allocation
|
page read and write
|
||
2A4F000
|
stack
|
page read and write
|
||
E30000
|
unkown
|
page readonly
|
||
39EF000
|
stack
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
7FF73FDCD000
|
unkown
|
page execute and read and write
|
||
1FED929C000
|
heap
|
page read and write
|
||
5830000
|
direct allocation
|
page read and write
|
||
2720000
|
heap
|
page read and write
|
||
5F6E000
|
stack
|
page read and write
|
||
58F000
|
unkown
|
page readonly
|
||
1443000
|
heap
|
page read and write
|
||
13CB000
|
heap
|
page read and write
|
||
5DEC000
|
trusted library allocation
|
page read and write
|
||
58F000
|
unkown
|
page readonly
|
||
433E000
|
stack
|
page read and write
|
||
3E6E000
|
stack
|
page read and write
|
||
5C3000
|
unkown
|
page execute and write copy
|
||
4691000
|
heap
|
page read and write
|
||
13CB000
|
heap
|
page read and write
|
||
281ABA40000
|
heap
|
page read and write
|
||
28E2CC7E000
|
heap
|
page read and write
|
||
140C000
|
heap
|
page read and write
|
||
1B20000
|
unkown
|
page readonly
|
||
7FF7ECD61000
|
unkown
|
page execute read
|
||
6AE1000
|
heap
|
page read and write
|
||
562000
|
unkown
|
page execute and write copy
|
||
7598000
|
heap
|
page read and write
|
||
140739000
|
unkown
|
page readonly
|
||
2479E8D5000
|
heap
|
page read and write
|
||
27997469000
|
heap
|
page read and write
|
||
5E02000
|
trusted library allocation
|
page read and write
|
||
37BF000
|
stack
|
page read and write
|
||
7FF7ECDF1000
|
unkown
|
page readonly
|
||
24C99AE0000
|
trusted library allocation
|
page read and write
|
||
5E1A000
|
trusted library allocation
|
page read and write
|
||
37BE000
|
stack
|
page read and write
|
||
59E000
|
stack
|
page read and write
|
||
52AF000
|
stack
|
page read and write
|
||
38AF000
|
stack
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
A0E000
|
stack
|
page read and write
|
||
1B1B42A0000
|
heap
|
page read and write
|
||
457E000
|
stack
|
page read and write
|
||
2479E8D0000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
37DE000
|
stack
|
page read and write
|
||
281ABA45000
|
heap
|
page read and write
|
||
27997630000
|
trusted library allocation
|
page read and write
|
||
B85BDFF000
|
stack
|
page read and write
|
||
2479E968000
|
heap
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
1B1B42B0000
|
trusted library allocation
|
page read and write
|
||
3B2F000
|
stack
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
145C000
|
heap
|
page read and write
|
||
13A6000
|
heap
|
page read and write
|
||
4A50000
|
direct allocation
|
page execute and read and write
|
||
7FF6DA021000
|
unkown
|
page execute and write copy
|
||
28E2CC99000
|
heap
|
page read and write
|
||
41FE000
|
stack
|
page read and write
|
||
4C10000
|
direct allocation
|
page execute and read and write
|
||
13D6000
|
heap
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
145E000
|
heap
|
page read and write
|
||
64C867F000
|
stack
|
page read and write
|
||
7F2B000
|
stack
|
page read and write
|
||
3B7E000
|
stack
|
page read and write
|
||
541000
|
unkown
|
page execute read
|
||
5B0000
|
heap
|
page read and write
|
||
1450000
|
heap
|
page read and write
|
||
27997630000
|
trusted library allocation
|
page read and write
|
||
1910000
|
direct allocation
|
page read and write
|
||
5DF1000
|
trusted library allocation
|
page read and write
|
||
1FED92D2000
|
heap
|
page read and write
|
||
2479E935000
|
heap
|
page read and write
|
||
5E3A000
|
trusted library allocation
|
page read and write
|
||
19C4C190000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
49B62FF000
|
stack
|
page read and write
|
||
4610000
|
heap
|
page read and write
|
||
1FED9307000
|
heap
|
page read and write
|
||
541000
|
unkown
|
page execute read
|
||
D80000
|
direct allocation
|
page read and write
|
||
A7226FC000
|
stack
|
page read and write
|
||
1406B6000
|
unkown
|
page read and write
|
||
289081D0000
|
heap
|
page read and write
|
||
131C0FC0000
|
heap
|
page read and write
|
||
501F000
|
stack
|
page read and write
|
||
93C000
|
stack
|
page read and write
|
||
A9C71FB000
|
stack
|
page read and write
|
||
1FED9AB0000
|
heap
|
page read and write
|
||
5BCE000
|
stack
|
page read and write
|
||
71F0000
|
direct allocation
|
page execute and read and write
|
||
1FED9292000
|
heap
|
page read and write
|
||
19C4C240000
|
heap
|
page read and write
|
||
5E12000
|
trusted library allocation
|
page read and write
|
||
760000
|
direct allocation
|
page read and write
|
||
FE0000
|
unkown
|
page execute and write copy
|
||
71C0000
|
direct allocation
|
page execute and read and write
|
||
24C99AE0000
|
trusted library allocation
|
page read and write
|
||
3A6F000
|
stack
|
page read and write
|
||
5CF000
|
unkown
|
page execute and write copy
|
||
4691000
|
heap
|
page read and write
|
||
1FED92B0000
|
heap
|
page read and write
|
||
5E02000
|
trusted library allocation
|
page read and write
|
||
33BF000
|
stack
|
page read and write
|
||
7FF7ECDD0000
|
unkown
|
page readonly
|
||
5E9000
|
unkown
|
page execute and read and write
|
||
42EE000
|
stack
|
page read and write
|
||
D80000
|
direct allocation
|
page read and write
|
||
BF3000
|
unkown
|
page execute and read and write
|
||
7FF7EDACD000
|
unkown
|
page readonly
|
||
32FE000
|
stack
|
page read and write
|
||
140C000
|
heap
|
page read and write
|
||
860000
|
heap
|
page read and write
|
||
73C000
|
stack
|
page read and write
|
||
53D000
|
unkown
|
page execute and read and write
|
||
DA0000
|
unkown
|
page readonly
|
||
6AE1000
|
heap
|
page read and write
|
||
144C000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
360000
|
unkown
|
page read and write
|
||
1FED92AB000
|
heap
|
page read and write
|
||
603000
|
unkown
|
page execute and read and write
|
||
4B20000
|
direct allocation
|
page execute and read and write
|
||
194E000
|
heap
|
page read and write
|
||
F75000
|
unkown
|
page execute and write copy
|
||
5F79000
|
trusted library allocation
|
page read and write
|
||
19C4C1B0000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
3C9000
|
unkown
|
page write copy
|
||
4EDF000
|
stack
|
page read and write
|
||
E09000
|
unkown
|
page write copy
|
||
3CB000
|
unkown
|
page execute and write copy
|
||
F94000
|
unkown
|
page execute and read and write
|
||
456E000
|
stack
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
5DE3000
|
trusted library allocation
|
page read and write
|
||
1FED99A0000
|
remote allocation
|
page read and write
|
||
1910000
|
direct allocation
|
page read and write
|
||
1E276E35000
|
heap
|
page read and write
|
||
F71000
|
unkown
|
page execute and read and write
|
||
D97000
|
heap
|
page read and write
|
||
1FED929F000
|
heap
|
page read and write
|
||
1E276E40000
|
heap
|
page read and write
|
||
DA5BBFE000
|
stack
|
page read and write
|
||
1442000
|
heap
|
page read and write
|
||
17226150000
|
heap
|
page read and write
|
||
4C00000
|
direct allocation
|
page execute and read and write
|
||
557000
|
unkown
|
page execute and write copy
|
||
E31000
|
unkown
|
page execute read
|
||
5B5E000
|
stack
|
page read and write
|
||
5E5F000
|
trusted library allocation
|
page read and write
|
||
4FDF000
|
stack
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
559D000
|
stack
|
page read and write
|
||
71A0000
|
direct allocation
|
page execute and read and write
|
||
2B068E50000
|
heap
|
page read and write
|
||
80E000
|
stack
|
page read and write
|
||
C40000
|
direct allocation
|
page read and write
|
||
27997630000
|
trusted library allocation
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
6A1000
|
unkown
|
page readonly
|
||
501E000
|
stack
|
page read and write
|
||
DD5000
|
unkown
|
page execute and write copy
|
||
1003000
|
unkown
|
page execute and write copy
|
||
2B6F000
|
stack
|
page read and write
|
||
1FED92B2000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
47BF000
|
stack
|
page read and write
|
||
2FAE000
|
stack
|
page read and write
|
||
1530000
|
heap
|
page read and write
|
||
1FED9E1B000
|
heap
|
page read and write
|
||
49B60FC000
|
stack
|
page read and write
|
||
5E27000
|
trusted library allocation
|
page read and write
|
||
1425000
|
heap
|
page read and write
|
||
24C99AE0000
|
trusted library allocation
|
page read and write
|
||
5E98000
|
trusted library allocation
|
page read and write
|
||
5E12000
|
trusted library allocation
|
page read and write
|
||
4B1000
|
unkown
|
page execute and read and write
|
||
14E4000
|
heap
|
page read and write
|
||
27997630000
|
trusted library allocation
|
page read and write
|
||
1424000
|
heap
|
page read and write
|
||
FC1000
|
heap
|
page read and write
|
||
14042C000
|
unkown
|
page read and write
|
||
14E4000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
C6A000
|
heap
|
page read and write
|
||
7FF7EDAB9000
|
unkown
|
page readonly
|
||
4691000
|
heap
|
page read and write
|
||
A70000
|
heap
|
page read and write
|
||
2479E984000
|
heap
|
page read and write
|
||
4A80000
|
direct allocation
|
page execute and read and write
|
||
555000
|
unkown
|
page execute and write copy
|
||
145E000
|
heap
|
page read and write
|
||
201FDAB0000
|
direct allocation
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
2DBF77F0000
|
heap
|
page read and write
|
||
3CFE000
|
stack
|
page read and write
|
||
A8C000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
4BB32FD000
|
stack
|
page read and write
|
||
1147000
|
unkown
|
page execute and read and write
|
||
B70000
|
heap
|
page read and write
|
||
201FDA50000
|
heap
|
page read and write
|
||
13B3000
|
heap
|
page read and write
|
||
1032000
|
unkown
|
page execute and write copy
|
||
71C0000
|
direct allocation
|
page execute and read and write
|
||
27997630000
|
trusted library allocation
|
page read and write
|
||
1FED9E22000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
2B068E5B000
|
heap
|
page read and write
|
||
540000
|
unkown
|
page readonly
|
||
4A20000
|
direct allocation
|
page execute and read and write
|
||
37AE000
|
stack
|
page read and write
|
||
366E000
|
stack
|
page read and write
|
||
2A2F000
|
stack
|
page read and write
|
||
13B3000
|
heap
|
page read and write
|
||
5E5F000
|
trusted library allocation
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
5E22000
|
trusted library allocation
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
2451E0C0000
|
trusted library allocation
|
page read and write
|
||
2451E410000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
53F000
|
unkown
|
page execute and write copy
|
||
10AD000
|
unkown
|
page execute and read and write
|
||
1443000
|
heap
|
page read and write
|
||
2F6E000
|
stack
|
page read and write
|
||
541000
|
unkown
|
page execute read
|
||
2479E964000
|
heap
|
page read and write
|
||
7FF7EDACA000
|
unkown
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
BF1000
|
unkown
|
page execute and read and write
|
||
59E000
|
unkown
|
page execute and read and write
|
||
5D3F000
|
stack
|
page read and write
|
||
3A7D000
|
stack
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
B76000
|
heap
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
5E12000
|
trusted library allocation
|
page read and write
|
||
7FF73FDCD000
|
unkown
|
page execute and read and write
|
||
72EC000
|
heap
|
page read and write
|
||
71C0000
|
direct allocation
|
page execute and read and write
|
||
66C000
|
unkown
|
page execute and write copy
|
||
5E02000
|
trusted library allocation
|
page read and write
|
||
E81000
|
unkown
|
page readonly
|
||
280E000
|
stack
|
page read and write
|
||
58F000
|
unkown
|
page readonly
|
||
4691000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
3DBF000
|
stack
|
page read and write
|
||
719F000
|
stack
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
1580000
|
heap
|
page read and write
|
||
DD5000
|
unkown
|
page execute and read and write
|
||
4E00000
|
direct allocation
|
page read and write
|
||
7FF7EDACA000
|
unkown
|
page write copy
|
||
253E000
|
stack
|
page read and write
|
||
555000
|
unkown
|
page execute and write copy
|
||
85F000
|
unkown
|
page readonly
|
||
9D0000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
E31000
|
unkown
|
page execute read
|
||
183F000
|
stack
|
page read and write
|
||
71C0000
|
direct allocation
|
page execute and read and write
|
||
13C9000
|
heap
|
page read and write
|
||
622000
|
unkown
|
page execute and read and write
|
||
400000
|
unkown
|
page readonly
|
||
2830000
|
direct allocation
|
page read and write
|
||
A9C72FF000
|
stack
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
1FED92B7000
|
heap
|
page read and write
|
||
44DE000
|
stack
|
page read and write
|
||
5DD5000
|
trusted library allocation
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
3CBE000
|
stack
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
13C9000
|
heap
|
page read and write
|
||
4A30000
|
trusted library allocation
|
page read and write
|
||
3CB000
|
unkown
|
page execute and write copy
|
||
5DD9000
|
trusted library allocation
|
page read and write
|
||
7FF73FDC8000
|
unkown
|
page execute and read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
4F10000
|
trusted library allocation
|
page read and write
|
||
27997630000
|
trusted library allocation
|
page read and write
|
||
7240000
|
direct allocation
|
page execute and read and write
|
||
45E0000
|
direct allocation
|
page read and write
|
||
2730000
|
direct allocation
|
page read and write
|
||
505E000
|
stack
|
page read and write
|
||
3C9000
|
unkown
|
page write copy
|
||
2DAE000
|
stack
|
page read and write
|
||
3E1E000
|
stack
|
page read and write
|
||
1FED9317000
|
heap
|
page read and write
|
||
3CB000
|
unkown
|
page execute and read and write
|
||
70B000
|
stack
|
page read and write
|
||
CAE000
|
unkown
|
page execute and read and write
|
||
3BDF000
|
stack
|
page read and write
|
||
14E4000
|
heap
|
page read and write
|
||
19F0000
|
heap
|
page read and write
|
||
188B000
|
stack
|
page read and write
|
||
72D1000
|
heap
|
page read and write
|
||
16463CBE000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
D80000
|
direct allocation
|
page read and write
|
||
7FF7ECD61000
|
unkown
|
page execute read
|
||
5E12000
|
trusted library allocation
|
page read and write
|
||
3FAE000
|
stack
|
page read and write
|
||
B18000
|
heap
|
page read and write
|
||
AA1000
|
heap
|
page read and write
|
||
1FED9268000
|
heap
|
page read and write
|
||
2B068E00000
|
heap
|
page read and write
|
||
52A0000
|
direct allocation
|
page read and write
|
||
B14000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
7FF6DA1D8000
|
unkown
|
page execute and read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
144C000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
4CF0000
|
direct allocation
|
page execute and read and write
|
||
24C99A90000
|
heap
|
page read and write
|
||
140C000
|
heap
|
page read and write
|
||
5E21000
|
trusted library allocation
|
page read and write
|
||
3D942FF000
|
stack
|
page read and write
|
||
2E2E000
|
stack
|
page read and write
|
||
6BD000
|
unkown
|
page readonly
|
||
6AE1000
|
heap
|
page read and write
|
||
13A6000
|
heap
|
page read and write
|
||
3D9427F000
|
unkown
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
4CA0000
|
direct allocation
|
page execute and read and write
|
||
27997630000
|
trusted library allocation
|
page read and write
|
||
24C99AE0000
|
trusted library allocation
|
page read and write
|
||
145E000
|
heap
|
page read and write
|
||
54B000
|
stack
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
3D0000
|
heap
|
page read and write
|
||
71C0000
|
direct allocation
|
page execute and read and write
|
||
37EF000
|
stack
|
page read and write
|
||
140A000
|
heap
|
page read and write
|
||
24C99AE0000
|
trusted library allocation
|
page read and write
|
||
356F000
|
stack
|
page read and write
|
||
1FED92BA000
|
heap
|
page read and write
|
||
B32000
|
heap
|
page read and write
|
||
4C00000
|
direct allocation
|
page execute and read and write
|
||
52E2000
|
direct allocation
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
3CEE000
|
stack
|
page read and write
|
||
4A0F000
|
stack
|
page read and write
|
||
28E2CB20000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
6451000
|
heap
|
page read and write
|
||
E88E9FE000
|
stack
|
page read and write
|
||
C40000
|
direct allocation
|
page read and write
|
||
1441000
|
heap
|
page read and write
|
||
24C99AE0000
|
trusted library allocation
|
page read and write
|
||
D70000
|
heap
|
page read and write
|
||
38BF000
|
stack
|
page read and write
|
||
C1F000
|
stack
|
page read and write
|
||
5DF5000
|
trusted library allocation
|
page read and write
|
||
28E2CC50000
|
heap
|
page read and write
|
||
591000
|
unkown
|
page execute and write copy
|
||
D80000
|
direct allocation
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
4A90000
|
direct allocation
|
page execute and read and write
|
||
7FF7EDAB9000
|
unkown
|
page readonly
|
||
5E5F000
|
trusted library allocation
|
page read and write
|
||
3E3E000
|
stack
|
page read and write
|
||
5DEA000
|
trusted library allocation
|
page read and write
|
||
6ACA000
|
direct allocation
|
page read and write
|
||
10B3000
|
unkown
|
page execute and write copy
|
||
D80000
|
direct allocation
|
page read and write
|
||
292C000
|
stack
|
page read and write
|
||
682000
|
unkown
|
page execute and read and write
|
||
1B1B42B0000
|
trusted library allocation
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
247A068C000
|
heap
|
page read and write
|
||
E81000
|
unkown
|
page readonly
|
||
4440000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
1FED9317000
|
heap
|
page read and write
|
||
140001000
|
unkown
|
page execute read
|
||
4470000
|
heap
|
page read and write
|
||
A3E000
|
heap
|
page read and write
|
||
24C99AE0000
|
trusted library allocation
|
page read and write
|
||
B15000
|
heap
|
page read and write
|
||
247A0680000
|
heap
|
page read and write
|
||
4A90000
|
direct allocation
|
page execute and read and write
|
||
17D4000
|
heap
|
page read and write
|
||
5E5F000
|
trusted library allocation
|
page read and write
|
||
5E12000
|
trusted library allocation
|
page read and write
|
||
5CF000
|
unkown
|
page execute and write copy
|
||
9F0000
|
heap
|
page read and write
|
||
7FF73F940000
|
unkown
|
page readonly
|
||
B14000
|
heap
|
page read and write
|
||
7FF7EDA90000
|
unkown
|
page readonly
|
||
5C7000
|
unkown
|
page execute and read and write
|
||
D80000
|
direct allocation
|
page read and write
|
||
247A0650000
|
remote allocation
|
page read and write
|
||
A80000
|
heap
|
page read and write
|
||
4D10000
|
direct allocation
|
page execute and read and write
|
||
D80000
|
direct allocation
|
page read and write
|
||
5E12000
|
trusted library allocation
|
page read and write
|
||
144C000
|
heap
|
page read and write
|
||
5E73000
|
trusted library allocation
|
page read and write
|
||
682000
|
unkown
|
page execute and write copy
|
||
36AF000
|
stack
|
page read and write
|
||
3D93FDC000
|
stack
|
page read and write
|
||
32AE000
|
stack
|
page read and write
|
||
39FF000
|
stack
|
page read and write
|
||
71C0000
|
direct allocation
|
page execute and read and write
|
||
5E12000
|
trusted library allocation
|
page read and write
|
||
27997630000
|
trusted library allocation
|
page read and write
|
||
5E5F000
|
trusted library allocation
|
page read and write
|
||
2DEF000
|
stack
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
641F000
|
stack
|
page read and write
|
||
E31000
|
unkown
|
page execute read
|
||
5EDF000
|
trusted library allocation
|
page read and write
|
||
B0E000
|
stack
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
FFD000
|
unkown
|
page execute and write copy
|
||
6AE1000
|
heap
|
page read and write
|
||
2B068D20000
|
heap
|
page read and write
|
||
46DF000
|
stack
|
page read and write
|
||
27997630000
|
trusted library allocation
|
page read and write
|
||
5E02000
|
trusted library allocation
|
page read and write
|
||
594000
|
unkown
|
page execute and read and write
|
||
540000
|
unkown
|
page readonly
|
||
5FA5000
|
trusted library allocation
|
page read and write
|
||
AA4000
|
heap
|
page read and write
|
||
AAE000
|
heap
|
page read and write
|
||
13AA000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
66C000
|
unkown
|
page execute and write copy
|
||
5AF000
|
unkown
|
page readonly
|
||
541000
|
unkown
|
page execute read
|
||
5E12000
|
trusted library allocation
|
page read and write
|
||
9D1000
|
heap
|
page read and write
|
||
3170000
|
heap
|
page read and write
|
||
5DE5000
|
trusted library allocation
|
page read and write
|
||
58F000
|
unkown
|
page readonly
|
||
52DB000
|
stack
|
page read and write
|
||
2479E97C000
|
heap
|
page read and write
|
||
E9D000
|
unkown
|
page readonly
|
||
7FF7EDACD000
|
unkown
|
page readonly
|
||
6AE1000
|
heap
|
page read and write
|
||
5E5F000
|
trusted library allocation
|
page read and write
|
||
C40000
|
direct allocation
|
page read and write
|
||
5FA000
|
unkown
|
page execute and read and write
|
||
B72000
|
heap
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
7290000
|
direct allocation
|
page execute and read and write
|
||
45B0000
|
heap
|
page read and write
|
||
2479E951000
|
heap
|
page read and write
|
||
5440000
|
direct allocation
|
page execute and read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
30AB000
|
stack
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
5AC000
|
unkown
|
page write copy
|
||
5E0C000
|
trusted library allocation
|
page read and write
|
||
4B0000
|
unkown
|
page read and write
|
||
13EB000
|
heap
|
page read and write
|
||
2C7F000
|
stack
|
page read and write
|
||
5D9000
|
unkown
|
page execute and read and write
|
||
FD1000
|
unkown
|
page execute and write copy
|
||
2451E090000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
5FB000
|
unkown
|
page execute and write copy
|
||
6AE1000
|
heap
|
page read and write
|
||
5E5F000
|
trusted library allocation
|
page read and write
|
||
2451E160000
|
heap
|
page read and write
|
||
66E000
|
unkown
|
page execute and write copy
|
||
5A0000
|
unkown
|
page execute and write copy
|
||
3DDF000
|
stack
|
page read and write
|
||
5DE1000
|
trusted library allocation
|
page read and write
|
||
5E5F000
|
trusted library allocation
|
page read and write
|
||
3D2E000
|
stack
|
page read and write
|
||
71C0000
|
direct allocation
|
page execute and read and write
|
||
4E00000
|
direct allocation
|
page read and write
|
||
2479E99A000
|
heap
|
page read and write
|
||
44AE000
|
stack
|
page read and write
|
||
27997630000
|
trusted library allocation
|
page read and write
|
||
64BD000
|
heap
|
page read and write
|
||
6467000
|
heap
|
page read and write
|
||
5E13000
|
trusted library allocation
|
page read and write
|
||
6AE0000
|
heap
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
1FED92AE000
|
heap
|
page read and write
|
||
175E000
|
stack
|
page read and write
|
||
1FED9348000
|
heap
|
page read and write
|
||
27997630000
|
trusted library allocation
|
page read and write
|
||
5D9000
|
unkown
|
page execute and read and write
|
||
24C99AE0000
|
trusted library allocation
|
page read and write
|
||
AFC000
|
heap
|
page read and write
|
||
556000
|
unkown
|
page execute and read and write
|
||
11E9000
|
heap
|
page read and write
|
||
4A80000
|
direct allocation
|
page execute and read and write
|
||
145E000
|
heap
|
page read and write
|
||
402F000
|
stack
|
page read and write
|
||
5AF000
|
unkown
|
page readonly
|
||
236324B0000
|
heap
|
page read and write
|
||
49B61FE000
|
stack
|
page read and write
|
||
327F000
|
stack
|
page read and write
|
||
E32D7CE000
|
stack
|
page read and write
|
||
24C99AE0000
|
trusted library allocation
|
page read and write
|
||
247A067D000
|
heap
|
page read and write
|
||
5A0000
|
unkown
|
page execute and write copy
|
||
14E4000
|
heap
|
page read and write
|
||
A8D000
|
heap
|
page read and write
|
||
AAE000
|
heap
|
page read and write
|
||
591E000
|
stack
|
page read and write
|
||
436E000
|
stack
|
page read and write
|
||
5E5F000
|
trusted library allocation
|
page read and write
|
||
5AA000
|
unkown
|
page execute and read and write
|
||
5E82000
|
trusted library allocation
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
A96000
|
heap
|
page read and write
|
||
3D9437E000
|
stack
|
page read and write
|
||
4BBE000
|
stack
|
page read and write
|
||
247A0687000
|
heap
|
page read and write
|
||
14042E000
|
unkown
|
page read and write
|
||
5E68000
|
trusted library allocation
|
page read and write
|
||
B15000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
85E000
|
unkown
|
page write copy
|
||
6AE1000
|
heap
|
page read and write
|
||
5E5F000
|
trusted library allocation
|
page read and write
|
||
645E000
|
stack
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
4A6C000
|
stack
|
page read and write
|
||
4C00000
|
direct allocation
|
page execute and read and write
|
||
7C0000
|
heap
|
page read and write
|
||
5AC000
|
unkown
|
page read and write
|
||
E0B000
|
unkown
|
page execute and write copy
|
||
123B000
|
stack
|
page read and write
|
||
4AE0000
|
direct allocation
|
page execute and read and write
|
||
15FE000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
36AF000
|
stack
|
page read and write
|
||
361000
|
unkown
|
page execute and write copy
|
||
73D0000
|
trusted library allocation
|
page read and write
|
||
317D000
|
heap
|
page read and write
|
||
5E9000
|
unkown
|
page execute and read and write
|
||
2B2F000
|
stack
|
page read and write
|
||
1FED92A0000
|
heap
|
page read and write
|
||
58F000
|
unkown
|
page readonly
|
||
28E7000
|
heap
|
page read and write
|
||
7FF7EDACD000
|
unkown
|
page readonly
|
||
5E5F000
|
trusted library allocation
|
page read and write
|
||
3D6000
|
unkown
|
page execute and read and write
|
||
194A000
|
heap
|
page read and write
|
||
27997410000
|
heap
|
page read and write
|
||
27997630000
|
trusted library allocation
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
5E5F000
|
trusted library allocation
|
page read and write
|
||
109D000
|
unkown
|
page execute and write copy
|
||
11E3000
|
heap
|
page read and write
|
||
3BCE000
|
stack
|
page read and write
|
||
1425000
|
heap
|
page read and write
|
||
5DF7000
|
trusted library allocation
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
43FF000
|
stack
|
page read and write
|
||
80A000
|
stack
|
page read and write
|
||
817000
|
heap
|
page read and write
|
||
F7D000
|
unkown
|
page execute and read and write
|
||
29FF000
|
stack
|
page read and write
|
||
140A000
|
heap
|
page read and write
|
||
145E000
|
heap
|
page read and write
|
||
562000
|
unkown
|
page execute and read and write
|
||
5E5F000
|
trusted library allocation
|
page read and write
|
||
19F6000
|
heap
|
page read and write
|
||
5E12000
|
trusted library allocation
|
page read and write
|
||
A99000
|
heap
|
page read and write
|
||
165A000
|
heap
|
page read and write
|
||
5E5F000
|
trusted library allocation
|
page read and write
|
||
5E06000
|
trusted library allocation
|
page read and write
|
||
52A0000
|
direct allocation
|
page read and write
|
||
2E2E000
|
stack
|
page read and write
|
||
BB7000
|
heap
|
page read and write
|
||
5E02000
|
trusted library allocation
|
page read and write
|
||
1453000
|
heap
|
page read and write
|
||
2B06A7D0000
|
heap
|
page read and write
|
||
1490000
|
heap
|
page read and write
|
||
4B10000
|
direct allocation
|
page execute and read and write
|
||
1D8F7130000
|
heap
|
page read and write
|
||
2479E9D1000
|
heap
|
page read and write
|
||
5E12000
|
trusted library allocation
|
page read and write
|
||
1029000
|
unkown
|
page execute and read and write
|
||
4691000
|
heap
|
page read and write
|
||
3D6000
|
unkown
|
page execute and read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
B3B000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
4F1E000
|
stack
|
page read and write
|
||
9A0000
|
heap
|
page read and write
|
||
5E12000
|
trusted library allocation
|
page read and write
|
||
2799746C000
|
heap
|
page read and write
|
||
5E57000
|
trusted library allocation
|
page read and write
|
||
27997630000
|
trusted library allocation
|
page read and write
|
||
E02000
|
unkown
|
page execute and read and write
|
||
4A80000
|
direct allocation
|
page read and write
|
||
583BEFA000
|
stack
|
page read and write
|
||
7FF7ECD60000
|
unkown
|
page readonly
|
||
1B1B4220000
|
heap
|
page read and write
|
||
4AF0000
|
direct allocation
|
page execute and read and write
|
||
24C99AE0000
|
trusted library allocation
|
page read and write
|
||
5E12000
|
trusted library allocation
|
page read and write
|
||
3C9000
|
unkown
|
page write copy
|
||
1061000
|
unkown
|
page execute and write copy
|
||
4AC0000
|
direct allocation
|
page execute and read and write
|
||
58F000
|
unkown
|
page readonly
|
||
6AE1000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
4E91000
|
heap
|
page read and write
|
||
781F000
|
stack
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
24C99AE0000
|
trusted library allocation
|
page read and write
|
||
7FF73F941000
|
unkown
|
page execute and read and write
|
||
14E4000
|
heap
|
page read and write
|
||
671000
|
unkown
|
page execute and read and write
|
||
2B8C000
|
stack
|
page read and write
|
||
A56000
|
heap
|
page read and write
|
||
5AF000
|
unkown
|
page readonly
|
||
24C99AE0000
|
trusted library allocation
|
page read and write
|
||
FB0000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
13AA000
|
heap
|
page read and write
|
||
23630B90000
|
heap
|
page read and write
|
||
45E0000
|
direct allocation
|
page read and write
|
||
2451E0C0000
|
trusted library allocation
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
5420000
|
direct allocation
|
page execute and read and write
|
||
5AC000
|
unkown
|
page write copy
|
||
7A1000
|
unkown
|
page execute read
|
||
1910000
|
direct allocation
|
page read and write
|
||
2DBA1220000
|
heap
|
page read and write
|
||
D4E000
|
stack
|
page read and write
|
||
36BE000
|
stack
|
page read and write
|
||
5920000
|
remote allocation
|
page read and write
|
||
1422000
|
heap
|
page read and write
|
||
66E000
|
unkown
|
page execute and write copy
|
||
83A000
|
heap
|
page read and write
|
||
5F2000
|
unkown
|
page execute and write copy
|
||
2451E070000
|
heap
|
page read and write
|
||
15FB000
|
stack
|
page read and write
|
||
7A60000
|
heap
|
page read and write
|
||
1FED92A4000
|
heap
|
page read and write
|
||
2B06A710000
|
direct allocation
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
5E2F000
|
trusted library allocation
|
page read and write
|
||
2451E0C0000
|
trusted library allocation
|
page read and write
|
||
2451E0C0000
|
trusted library allocation
|
page read and write
|
||
82024FE000
|
stack
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
5E18000
|
trusted library allocation
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
40BE000
|
stack
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
9B66FFF000
|
stack
|
page read and write
|
||
5E02000
|
trusted library allocation
|
page read and write
|
||
5DDA000
|
trusted library allocation
|
page read and write
|
||
178F000
|
stack
|
page read and write
|
||
64B9000
|
heap
|
page read and write
|
||
7594000
|
heap
|
page read and write
|
||
396E000
|
stack
|
page read and write
|
||
58F000
|
unkown
|
page readonly
|
||
2479E984000
|
heap
|
page read and write
|
||
19C4C239000
|
heap
|
page read and write
|
||
2650000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
23632685000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
D80000
|
direct allocation
|
page read and write
|
||
19C4C515000
|
heap
|
page read and write
|
||
2451E0C0000
|
trusted library allocation
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
145E000
|
heap
|
page read and write
|
||
5DD9000
|
trusted library allocation
|
page read and write
|
||
141E000
|
stack
|
page read and write
|
||
4A60000
|
direct allocation
|
page execute and read and write
|
||
4691000
|
heap
|
page read and write
|
||
5DF1000
|
trusted library allocation
|
page read and write
|
||
5DF1000
|
trusted library allocation
|
page read and write
|
||
541000
|
unkown
|
page execute read
|
||
4E00000
|
direct allocation
|
page read and write
|
||
26E4000
|
heap
|
page read and write
|
||
7FF7EDA91000
|
unkown
|
page execute read
|
||
27997765000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
316E000
|
stack
|
page read and write
|
||
85E000
|
unkown
|
page read and write
|
||
5E01000
|
trusted library allocation
|
page read and write
|
||
7FF73F940000
|
unkown
|
page readonly
|
||
3A30000
|
direct allocation
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
B40000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
5E5F000
|
trusted library allocation
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
5DD2000
|
trusted library allocation
|
page read and write
|
||
65F000
|
unkown
|
page execute and write copy
|
||
C40000
|
direct allocation
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
45C0000
|
heap
|
page read and write
|
||
4A50000
|
direct allocation
|
page execute and read and write
|
||
541000
|
unkown
|
page execute read
|
||
4AC0000
|
direct allocation
|
page execute and read and write
|
||
7FF7EDAB9000
|
unkown
|
page readonly
|
||
4691000
|
heap
|
page read and write
|
||
5E5F000
|
trusted library allocation
|
page read and write
|
||
1820000
|
direct allocation
|
page read and write
|
||
24C99AE0000
|
trusted library allocation
|
page read and write
|
||
669E000
|
stack
|
page read and write
|
||
1FED9294000
|
heap
|
page read and write
|
||
F3C000
|
stack
|
page read and write
|
||
2479E8B0000
|
heap
|
page read and write
|
||
144C000
|
heap
|
page read and write
|
||
201FD940000
|
heap
|
page read and write
|
||
4CA0000
|
direct allocation
|
page execute and read and write
|
||
2451E0C0000
|
trusted library allocation
|
page read and write
|
||
5F6000
|
unkown
|
page execute and write copy
|
||
41EF000
|
stack
|
page read and write
|
||
C7D000
|
heap
|
page read and write
|
||
1E2753D0000
|
direct allocation
|
page read and write
|
||
131C0DFE000
|
heap
|
page read and write
|
||
45E0000
|
direct allocation
|
page read and write
|
||
1360000
|
heap
|
page read and write
|
||
7FF7EDACA000
|
unkown
|
page write copy
|
||
4691000
|
heap
|
page read and write
|
||
27997630000
|
trusted library allocation
|
page read and write
|
||
1E2753B0000
|
heap
|
page read and write
|
||
2DBA12FB000
|
heap
|
page read and write
|
||
A98000
|
heap
|
page read and write
|
||
27997630000
|
trusted library allocation
|
page read and write
|
||
3A3E000
|
stack
|
page read and write
|
||
7333000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
5DF7000
|
trusted library allocation
|
page read and write
|
||
BCE000
|
stack
|
page read and write
|
||
1B1B4240000
|
heap
|
page read and write
|
||
7FF7EDA90000
|
unkown
|
page readonly
|
||
6AE1000
|
heap
|
page read and write
|
||
55E000
|
stack
|
page read and write
|
||
140C000
|
heap
|
page read and write
|
||
CB9C0FE000
|
stack
|
page read and write
|
||
541000
|
unkown
|
page execute read
|
||
5DD5000
|
trusted library allocation
|
page read and write
|
||
7FF7EDA91000
|
unkown
|
page execute read
|
||
E17000
|
unkown
|
page execute and write copy
|
||
4C00000
|
direct allocation
|
page execute and read and write
|
||
61CE000
|
stack
|
page read and write
|
||
282F000
|
stack
|
page read and write
|
||
673000
|
unkown
|
page execute and write copy
|
||
B35000
|
heap
|
page read and write
|
||
5E3C000
|
trusted library allocation
|
page read and write
|
||
71E0000
|
direct allocation
|
page execute and read and write
|
||
7FF7EDA90000
|
unkown
|
page readonly
|
||
A8D000
|
unkown
|
page execute and read and write
|
||
2451E0C0000
|
trusted library allocation
|
page read and write
|
||
1FED92BF000
|
heap
|
page read and write
|
||
4CA0000
|
direct allocation
|
page execute and read and write
|
||
13CB000
|
heap
|
page read and write
|
||
56C000
|
unkown
|
page execute and read and write
|
||
B14000
|
heap
|
page read and write
|
||
361000
|
unkown
|
page execute and write copy
|
||
4B20000
|
direct allocation
|
page read and write
|
||
5DF7000
|
trusted library allocation
|
page read and write
|
||
13B3000
|
heap
|
page read and write
|
||
2479E949000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
5E5F000
|
trusted library allocation
|
page read and write
|
||
651000
|
unkown
|
page execute read
|
||
360000
|
unkown
|
page read and write
|
||
5DE1000
|
trusted library allocation
|
page read and write
|
||
443F000
|
stack
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
6A5E000
|
heap
|
page read and write
|
||
7FF7ECDD0000
|
unkown
|
page readonly
|
||
2AEF000
|
stack
|
page read and write
|
||
7230000
|
direct allocation
|
page execute and read and write
|
||
6A60000
|
heap
|
page read and write
|
||
28909BE0000
|
direct allocation
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
41BE000
|
stack
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
263E000
|
stack
|
page read and write
|
||
14E4000
|
heap
|
page read and write
|
||
BFD000
|
heap
|
page read and write
|
||
1820000
|
direct allocation
|
page read and write
|
||
2451E0C0000
|
trusted library allocation
|
page read and write
|
||
14E0000
|
heap
|
page read and write
|
||
1480000
|
heap
|
page read and write
|
||
515F000
|
stack
|
page read and write
|
||
18CE000
|
stack
|
page read and write
|
||
5DD2000
|
trusted library allocation
|
page read and write
|
||
5E12000
|
trusted library allocation
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
B32000
|
heap
|
page read and write
|
||
5E01000
|
trusted library allocation
|
page read and write
|
||
4C40000
|
direct allocation
|
page execute and read and write
|
||
2479E9F1000
|
heap
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
1B1B4270000
|
trusted library allocation
|
page read and write
|
||
14E4000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
201FF3A0000
|
heap
|
page read and write
|
||
D80000
|
direct allocation
|
page read and write
|
||
673000
|
unkown
|
page execute and write copy
|
||
B18000
|
heap
|
page read and write
|
||
569D000
|
stack
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
B30000
|
heap
|
page read and write
|
||
263B000
|
stack
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
6AE1000
|
heap
|
page read and write
|
||
5D4000
|
unkown
|
page execute and read and write
|
||
45E0000
|
direct allocation
|
page read and write
|
||
2CBE000
|
stack
|
page read and write
|
||
4691000
|
heap
|
page read and write
|
||
5E27000
|
trusted library allocation
|
page read and write
|
||
5E08000
|
trusted library allocation
|
page read and write
|
There are 3070 hidden memdumps, click here to show them.