Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
KClGcCpDAP.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\validPower_Lnz_x64.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\TlsCloud_WRv3_x64\Virtual.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\Temp\{8CB9D4BD-BB58-4C1B-96C8-872261C205E0}\.ba\Virtual.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\Temp\{F5D68338-3B04-47F6-AE14-10EB1750048C}\.cr\KClGcCpDAP.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\106dbf4d
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1709cbe3
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Coastguardsman_20241007011406.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\bewwwy
|
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\f99c993e
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\jamulieilmfjkk
|
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\xdhqslqcnobw
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Mon Oct 7 04:14:07
2024, mtime=Mon Oct 7 04:14:08 2024, atime=Sun Oct 6 07:05:58 2024, length=3559696, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\TlsCloud_WRv3_x64\VBoxDDU.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\TlsCloud_WRv3_x64\VBoxRT.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\TlsCloud_WRv3_x64\ehky
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\TlsCloud_WRv3_x64\lni
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\TlsCloud_WRv3_x64\msvcp100.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\TlsCloud_WRv3_x64\msvcr100.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\Temp\{8CB9D4BD-BB58-4C1B-96C8-872261C205E0}\.ba\Ammonium.dll
|
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Windows\Temp\{8CB9D4BD-BB58-4C1B-96C8-872261C205E0}\.ba\BootstrapperApplicationData.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (472), with CRLF line terminators
|
dropped
|
||
C:\Windows\Temp\{8CB9D4BD-BB58-4C1B-96C8-872261C205E0}\.ba\VBoxDDU.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\Temp\{8CB9D4BD-BB58-4C1B-96C8-872261C205E0}\.ba\VBoxRT.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\Temp\{8CB9D4BD-BB58-4C1B-96C8-872261C205E0}\.ba\ehky
|
data
|
dropped
|
||
C:\Windows\Temp\{8CB9D4BD-BB58-4C1B-96C8-872261C205E0}\.ba\lni
|
data
|
dropped
|
||
C:\Windows\Temp\{8CB9D4BD-BB58-4C1B-96C8-872261C205E0}\.ba\msvcp100.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\Temp\{8CB9D4BD-BB58-4C1B-96C8-872261C205E0}\.ba\msvcr100.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
There are 16 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\KClGcCpDAP.exe
|
"C:\Users\user\Desktop\KClGcCpDAP.exe"
|
||
C:\Windows\Temp\{F5D68338-3B04-47F6-AE14-10EB1750048C}\.cr\KClGcCpDAP.exe
|
"C:\Windows\Temp\{F5D68338-3B04-47F6-AE14-10EB1750048C}\.cr\KClGcCpDAP.exe" -burn.clean.room="C:\Users\user\Desktop\KClGcCpDAP.exe"
-burn.filehandle.attached=524 -burn.filehandle.self=544
|
||
C:\Windows\Temp\{8CB9D4BD-BB58-4C1B-96C8-872261C205E0}\.ba\Virtual.exe
|
"C:\Windows\Temp\{8CB9D4BD-BB58-4C1B-96C8-872261C205E0}\.ba\Virtual.exe"
|
||
C:\Users\user\AppData\Roaming\TlsCloud_WRv3_x64\Virtual.exe
|
C:\Users\user\AppData\Roaming\TlsCloud_WRv3_x64\Virtual.exe
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\SysWOW64\cmd.exe
|
||
C:\Users\user\AppData\Local\Temp\validPower_Lnz_x64.exe
|
C:\Users\user\AppData\Local\Temp\validPower_Lnz_x64.exe
|
||
C:\Users\user\AppData\Roaming\TlsCloud_WRv3_x64\Virtual.exe
|
"C:\Users\user\AppData\Roaming\TlsCloud_WRv3_x64\Virtual.exe"
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\SysWOW64\cmd.exe
|
||
C:\Users\user\AppData\Roaming\TlsCloud_WRv3_x64\Virtual.exe
|
"C:\Users\user\AppData\Roaming\TlsCloud_WRv3_x64\Virtual.exe"
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\SysWOW64\cmd.exe
|
||
C:\Users\user\AppData\Local\Temp\validPower_Lnz_x64.exe
|
C:\Users\user\AppData\Local\Temp\validPower_Lnz_x64.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 4 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://www.openssl.org/support/faq.html....................D:
|
unknown
|
||
https://apokalipo.cyou/watchvideo-sheila-avis-de-recherche-191280-2770205.htmleldbZzsLLytC%2FMtKEkDE
|
unknown
|
||
http://schemas.mic
|
unknown
|
||
http://www.vmware.com/0
|
unknown
|
||
http://www.softwareok.com/?Freeware/Find.Same.Images.OK/History
|
unknown
|
||
https://apokalipo.cyou/2t2
|
unknown
|
||
https://apokalipo.cyou/watchvideo-sheila-avis-de-recherche-191280-2770205.html?xevok9zcbyqunjb=ZzsLL
|
unknown
|
||
http://www.softwareok.com/?Freeware/Find.Same.Images.OK
|
unknown
|
||
http://www.vmware.com/interfaces/specifications/vmdk.html#compressedhttp://www.vmware.com/specificat
|
unknown
|
||
http://virtualbox.org/firmware/VBoxEFIDual.fd
|
unknown
|
||
http://virtualbox.org/firmware/VBoxEFI32.fdVBoxEFI64.fdhttp://virtualbox.org/firmware/VBoxEFI64.fdVB
|
unknown
|
||
http://www.openssl.org/support/faq.html
|
unknown
|
||
http://www.softwareok.de/?Freeware/Find.Same.Images.OK
|
unknown
|
||
https://apokalipo.cyou/watchvideo-sheila-avis-de-recherche-191280-2770205.html
|
unknown
|
||
https://apokalipo.cyou/N
|
unknown
|
||
http://crl.thawte.com/ThawteTimestampingCA.crl0
|
unknown
|
||
http://virtualbox.org/firmware/VBoxEFI32.fd
|
unknown
|
||
http://www.softwareok.de/?seite=faq-Find.Same.Images.OK&faq=0
|
unknown
|
||
http://www.softwareok.de
|
unknown
|
||
http://www.softwareok.de/?Freeware/Find.Same.Images.OK/History
|
unknown
|
||
https://apokalipo.cyou/
|
unknown
|
||
http://www.softwareok.com/?Download=Find.Same.Images.OK
|
unknown
|
||
http://curl.haxx.se/rfc/cookie_spec.html
|
unknown
|
||
http://www.vmware.com/interfaces/specifications/vmdk.html#compressed
|
unknown
|
||
http://www.vmware.com/schema/ovf/1/envelope
|
unknown
|
||
http://virtualbox.org/firmware/VBoxEFI64.fd
|
unknown
|
||
https://apokalipo.cyou/watchvideo-sheila-avis-de-recherche-191280-2770205.html?xevok9zcbyqunjb=ZzsLLytC%2FMtKEkDEIiMG%2BNOJ3DYSue3YuBdMbTrtqKKdsg%2BC%2Fobe9lLJF33efnkG
|
188.114.96.3
|
||
http://www.softwareok.de/?Download=Find.Same.Images.OK
|
unknown
|
||
http://ocsp.thawte.com0
|
unknown
|
||
http://www.virtualbox.org/ovf/machine
|
unknown
|
||
http://www.vmware.com/0/
|
unknown
|
||
http://www.softwareok.com/?seite=faq-Find.Same.Images.OK&faq=0
|
unknown
|
||
http://appsyndication.org/2006/appsynapplicationapuputil.cppupgradeexclusivetrueenclosuredigestalgor
|
unknown
|
||
http://www.???.xx/?search=%s
|
unknown
|
||
http://www.oasis-open.org/committees/entity/release/1.0/catalog.dtd
|
unknown
|
||
http://www.symauth.com/cps0(
|
unknown
|
||
http://relaxng.org/ns/structure/1.0allocating
|
unknown
|
||
http://www.symauth.com/rpa00
|
unknown
|
||
https://apokalipo.cyou:443/watchvideo-sheila-avis-de-recherche-191280-2770205.html?xevok9zcbyqunjb=Z
|
unknown
|
||
http://www.innotek.de/VirtualBox-settings
|
unknown
|
||
http://www.info-zip.org/
|
unknown
|
||
https://gnu.org/licenses/
|
unknown
|
||
http://www.vmware.com/specifications/vmdk.html#compressed
|
unknown
|
||
https://gnu.org/licenses/gpl.html
|
unknown
|
||
http://relaxng.org/ns/structure/1.0
|
unknown
|
||
http://www.vmware.com/interfaces/specifications/vmdk.html#streamOptimized
|
unknown
|
||
http://www.vmware.com/specifications/vmdk.html#sparse
|
unknown
|
||
http://www.surfok.de/
|
unknown
|
||
http://crl.v
|
unknown
|
||
http://www.softwareok.com
|
unknown
|
||
http://www.vmware.com/specifications/vmdk.html#sparsehttp://www.vmware.com/interfaces/specifications
|
unknown
|
||
http://appsyndication.org/2006/appsyn
|
unknown
|
There are 42 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
apokalipo.cyou
|
188.114.96.3
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
188.114.96.3
|
apokalipo.cyou
|
European Union
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
361D000
|
heap
|
page read and write
|
||
3F99000
|
heap
|
page read and write
|
||
3DF6000
|
heap
|
page read and write
|
||
3A96000
|
heap
|
page read and write
|
||
554C000
|
trusted library allocation
|
page read and write
|
||
3390000
|
heap
|
page read and write
|
||
2626000
|
unkown
|
page read and write
|
||
4EEA000
|
trusted library allocation
|
page read and write
|
||
5366000
|
trusted library allocation
|
page read and write
|
||
25FE000
|
unkown
|
page read and write
|
||
312C000
|
heap
|
page read and write
|
||
5FE1000
|
unkown
|
page read and write
|
||
3940000
|
unkown
|
page read and write
|
||
3DA0000
|
trusted library allocation
|
page read and write
|
||
49C0000
|
unkown
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
4F8000
|
heap
|
page read and write
|
||
38E4000
|
unkown
|
page read and write
|
||
33BE000
|
heap
|
page read and write
|
||
4F5000
|
heap
|
page read and write
|
||
EA6000
|
heap
|
page read and write
|
||
29BA000
|
stack
|
page read and write
|
||
4BD8000
|
unkown
|
page read and write
|
||
666F4000
|
unkown
|
page write copy
|
||
17A0000
|
heap
|
page read and write
|
||
135B000
|
heap
|
page read and write
|
||
7FF69E565000
|
unkown
|
page read and write
|
||
2B08000
|
heap
|
page read and write
|
||
7FFDFB2B0000
|
unkown
|
page read and write
|
||
7FF718577000
|
unkown
|
page readonly
|
||
3C67000
|
unkown
|
page read and write
|
||
2894000
|
heap
|
page read and write
|
||
346E000
|
heap
|
page read and write
|
||
7FFDFB853000
|
unkown
|
page write copy
|
||
6657A000
|
unkown
|
page readonly
|
||
4DD000
|
heap
|
page read and write
|
||
552000
|
heap
|
page read and write
|
||
12FB000
|
stack
|
page read and write
|
||
138D000
|
heap
|
page read and write
|
||
7FF6C5671000
|
unkown
|
page execute read
|
||
3670000
|
heap
|
page read and write
|
||
4668000
|
unkown
|
page read and write
|
||
35D0000
|
remote allocation
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
2D3D000
|
direct allocation
|
page read and write
|
||
4DB000
|
heap
|
page read and write
|
||
5BC1000
|
unkown
|
page read and write
|
||
5BC1000
|
unkown
|
page read and write
|
||
666FA000
|
unkown
|
page readonly
|
||
7FFDFB423000
|
unkown
|
page write copy
|
||
5860000
|
unkown
|
page read and write
|
||
4463000
|
unkown
|
page read and write
|
||
483B000
|
unkown
|
page read and write
|
||
38E9000
|
heap
|
page read and write
|
||
2C84000
|
heap
|
page read and write
|
||
665A0000
|
unkown
|
page readonly
|
||
390000
|
heap
|
page read and write
|
||
665A1000
|
unkown
|
page execute read
|
||
30FD000
|
stack
|
page read and write
|
||
A89000
|
heap
|
page read and write
|
||
4DD000
|
heap
|
page read and write
|
||
5466000
|
unkown
|
page read and write
|
||
B9F000
|
stack
|
page read and write
|
||
5BC1000
|
unkown
|
page read and write
|
||
4B0A000
|
unkown
|
page read and write
|
||
137E000
|
heap
|
page read and write
|
||
2C84000
|
heap
|
page read and write
|
||
1386000
|
heap
|
page read and write
|
||
66574000
|
unkown
|
page write copy
|
||
5630000
|
direct allocation
|
page read and write
|
||
2C86000
|
direct allocation
|
page read and write
|
||
3830000
|
heap
|
page read and write
|
||
6662C000
|
unkown
|
page read and write
|
||
66586000
|
unkown
|
page readonly
|
||
5939000
|
direct allocation
|
page read and write
|
||
2C84000
|
heap
|
page read and write
|
||
7064000
|
unkown
|
page read and write
|
||
2C84000
|
heap
|
page read and write
|
||
7FFE01301000
|
unkown
|
page execute read
|
||
665A1000
|
unkown
|
page execute read
|
||
4667000
|
unkown
|
page read and write
|
||
66E9000
|
unkown
|
page read and write
|
||
5D3E000
|
stack
|
page read and write
|
||
1348000
|
heap
|
page read and write
|
||
59E1000
|
unkown
|
page read and write
|
||
66706000
|
unkown
|
page readonly
|
||
2D37000
|
direct allocation
|
page read and write
|
||
3390000
|
heap
|
page read and write
|
||
1A0000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
4357000
|
trusted library allocation
|
page read and write
|
||
28DE000
|
unkown
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
5BC1000
|
unkown
|
page read and write
|
||
1401A9000
|
unkown
|
page write copy
|
||
5BC1000
|
unkown
|
page read and write
|
||
F26000
|
heap
|
page read and write
|
||
4F8000
|
heap
|
page read and write
|
||
331F000
|
stack
|
page read and write
|
||
11ED000
|
stack
|
page read and write
|
||
7FFE0CFE9000
|
unkown
|
page readonly
|
||
485000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
59E0000
|
unkown
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
2C84000
|
heap
|
page read and write
|
||
5BC1000
|
unkown
|
page read and write
|
||
3A20000
|
unkown
|
page read and write
|
||
666D1000
|
unkown
|
page readonly
|
||
5BC1000
|
unkown
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
66640000
|
unkown
|
page readonly
|
||
F88000
|
heap
|
page read and write
|
||
3E60000
|
unkown
|
page read and write
|
||
47F000
|
heap
|
page read and write
|
||
40CA000
|
heap
|
page read and write
|
||
68E9000
|
unkown
|
page read and write
|
||
4FDF000
|
unkown
|
page read and write
|
||
61E4000
|
unkown
|
page read and write
|
||
7FF6C5670000
|
unkown
|
page readonly
|
||
5264000
|
unkown
|
page read and write
|
||
799B000
|
stack
|
page read and write
|
||
595000
|
heap
|
page read and write
|
||
7FF69E54F000
|
unkown
|
page readonly
|
||
493000
|
heap
|
page read and write
|
||
31B0000
|
heap
|
page read and write
|
||
7FF718653000
|
unkown
|
page readonly
|
||
18F0000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
5B4000
|
heap
|
page read and write
|
||
4CA5000
|
trusted library allocation
|
page read and write
|
||
8F9000
|
stack
|
page read and write
|
||
78B000
|
heap
|
page read and write
|
||
5BC1000
|
unkown
|
page read and write
|
||
5BC1000
|
unkown
|
page read and write
|
||
4065000
|
unkown
|
page read and write
|
||
14B0000
|
heap
|
page read and write
|
||
7FFDFAEF0000
|
unkown
|
page readonly
|
||
1376000
|
heap
|
page read and write
|
||
4DDB000
|
unkown
|
page read and write
|
||
138D000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
1365000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
2D2C000
|
direct allocation
|
page read and write
|
||
13F0000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
4DD000
|
heap
|
page read and write
|
||
593D000
|
direct allocation
|
page read and write
|
||
4DB000
|
heap
|
page read and write
|
||
62ED000
|
unkown
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
6662F000
|
unkown
|
page read and write
|
||
5BC1000
|
unkown
|
page read and write
|
||
2894000
|
heap
|
page read and write
|
||
465000
|
heap
|
page read and write
|
||
6BE0000
|
unkown
|
page read and write
|
||
37C2000
|
trusted library allocation
|
page read and write
|
||
2C6E000
|
unkown
|
page read and write
|
||
314D000
|
heap
|
page read and write
|
||
7FFDFB43D000
|
unkown
|
page readonly
|
||
37C1000
|
trusted library allocation
|
page read and write
|
||
7FFDFB295000
|
unkown
|
page readonly
|
||
2F74000
|
heap
|
page read and write
|
||
871000
|
unkown
|
page execute read
|
||
2C84000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
2C84000
|
heap
|
page read and write
|
||
5BC1000
|
unkown
|
page read and write
|
||
2CA0000
|
heap
|
page read and write
|
||
2E00000
|
heap
|
page read and write
|
||
2C84000
|
heap
|
page read and write
|
||
3990000
|
heap
|
page read and write
|
||
4DD000
|
heap
|
page read and write
|
||
CE6000
|
heap
|
page read and write
|
||
5E69000
|
unkown
|
page read and write
|
||
1390000
|
unkown
|
page read and write
|
||
7FFDFB423000
|
unkown
|
page write copy
|
||
4560000
|
unkown
|
page read and write
|
||
5665000
|
unkown
|
page read and write
|
||
5D7E000
|
stack
|
page read and write
|
||
66640000
|
unkown
|
page readonly
|
||
1401C7000
|
unkown
|
page readonly
|
||
3BD9000
|
unkown
|
page read and write
|
||
FAF000
|
heap
|
page read and write
|
||
552000
|
heap
|
page read and write
|
||
2D33000
|
direct allocation
|
page read and write
|
||
47E6000
|
trusted library allocation
|
page read and write
|
||
5DDA000
|
unkown
|
page read and write
|
||
317F000
|
stack
|
page read and write
|
||
3180000
|
heap
|
page read and write
|
||
4857000
|
trusted library allocation
|
page read and write
|
||
5BC1000
|
unkown
|
page read and write
|
||
5BC1000
|
unkown
|
page read and write
|
||
7FF69E5D0000
|
unkown
|
page read and write
|
||
2F75000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
2894000
|
heap
|
page read and write
|
||
2C84000
|
heap
|
page read and write
|
||
482000
|
heap
|
page read and write
|
||
7FF6C5670000
|
unkown
|
page readonly
|
||
37C6000
|
trusted library allocation
|
page read and write
|
||
FAD000
|
heap
|
page read and write
|
||
7A9E000
|
stack
|
page read and write
|
||
534E000
|
direct allocation
|
page read and write
|
||
5BC1000
|
unkown
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
7FF718643000
|
unkown
|
page write copy
|
||
E20000
|
heap
|
page read and write
|
||
5BC1000
|
unkown
|
page read and write
|
||
A80000
|
heap
|
page read and write
|
||
396F000
|
stack
|
page read and write
|
||
785000
|
heap
|
page read and write
|
||
3C66000
|
unkown
|
page read and write
|
||
2C84000
|
heap
|
page read and write
|
||
37E0000
|
remote allocation
|
page read and write
|
||
666F4000
|
unkown
|
page write copy
|
||
5BC1000
|
unkown
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
4E96000
|
heap
|
page read and write
|
||
6646F000
|
unkown
|
page readonly
|
||
47C6000
|
trusted library allocation
|
page read and write
|
||
337F000
|
stack
|
page read and write
|
||
7C1D000
|
stack
|
page read and write
|
||
2F7B000
|
heap
|
page read and write
|
||
65E2000
|
unkown
|
page read and write
|
||
57E4000
|
unkown
|
page read and write
|
||
148000
|
stack
|
page read and write
|
||
7FF6C5877000
|
unkown
|
page readonly
|
||
F08000
|
heap
|
page read and write
|
||
7FF718653000
|
unkown
|
page readonly
|
||
4E63000
|
unkown
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
5BC1000
|
unkown
|
page read and write
|
||
3EE6000
|
unkown
|
page read and write
|
||
7FFDFB125000
|
unkown
|
page readonly
|
||
4C63000
|
unkown
|
page read and write
|
||
2D30000
|
heap
|
page read and write
|
||
54D000
|
heap
|
page read and write
|
||
6662F000
|
unkown
|
page read and write
|
||
666F7000
|
unkown
|
page read and write
|
||
2F6E000
|
stack
|
page read and write
|
||
5D5E000
|
stack
|
page read and write
|
||
3670000
|
heap
|
page read and write
|
||
7FFDFB2CA000
|
unkown
|
page read and write
|
||
F20000
|
heap
|
page read and write
|
||
7FF718643000
|
unkown
|
page write copy
|
||
8DA000
|
unkown
|
page read and write
|
||
140156000
|
unkown
|
page readonly
|
||
190000
|
heap
|
page read and write
|
||
4152000
|
unkown
|
page read and write
|
||
2C84000
|
heap
|
page read and write
|
||
7FFDFB061000
|
unkown
|
page execute read
|
||
37C7000
|
trusted library allocation
|
page read and write
|
||
5BC1000
|
unkown
|
page read and write
|
||
7FFE0E130000
|
unkown
|
page readonly
|
||
3AEE000
|
unkown
|
page read and write
|
||
18C0000
|
trusted library allocation
|
page read and write
|
||
EB3000
|
unkown
|
page read and write
|
||
44C0000
|
trusted library allocation
|
page read and write
|
||
4632000
|
trusted library allocation
|
page read and write
|
||
2CA2000
|
direct allocation
|
page read and write
|
||
66421000
|
unkown
|
page execute read
|
||
59F0000
|
unkown
|
page read and write
|
||
493000
|
heap
|
page read and write
|
||
2C84000
|
heap
|
page read and write
|
||
66572000
|
unkown
|
page read and write
|
||
50D8000
|
trusted library allocation
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
66706000
|
unkown
|
page readonly
|
||
7FF718643000
|
unkown
|
page write copy
|
||
2CB6000
|
direct allocation
|
page read and write
|
||
666FA000
|
unkown
|
page readonly
|
||
2CA4000
|
heap
|
page read and write
|
||
164E000
|
stack
|
page read and write
|
||
2C84000
|
heap
|
page read and write
|
||
140001000
|
unkown
|
page execute read
|
||
2F74000
|
heap
|
page read and write
|
||
7FFE0E131000
|
unkown
|
page execute read
|
||
37C4000
|
trusted library allocation
|
page read and write
|
||
D6D000
|
unkown
|
page readonly
|
||
665EF000
|
unkown
|
page readonly
|
||
5265000
|
unkown
|
page read and write
|
||
781D000
|
stack
|
page read and write
|
||
44DE000
|
unkown
|
page read and write
|
||
2C84000
|
heap
|
page read and write
|
||
7FFE0E175000
|
unkown
|
page readonly
|
||
49E7000
|
unkown
|
page read and write
|
||
543000
|
heap
|
page read and write
|
||
4DB000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
5BC1000
|
unkown
|
page read and write
|
||
1510000
|
heap
|
page read and write
|
||
5BC1000
|
unkown
|
page read and write
|
||
7FF69E311000
|
unkown
|
page execute read
|
||
91E000
|
stack
|
page read and write
|
||
63D8000
|
unkown
|
page read and write
|
||
2C84000
|
heap
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
359000
|
stack
|
page read and write
|
||
4338000
|
unkown
|
page read and write
|
||
5BC1000
|
unkown
|
page read and write
|
||
462000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
3590000
|
heap
|
page read and write
|
||
21BA000
|
heap
|
page read and write
|
||
5BC1000
|
unkown
|
page read and write
|
||
5BC1000
|
unkown
|
page read and write
|
||
133B000
|
stack
|
page read and write
|
||
5BC1000
|
unkown
|
page read and write
|
||
3380000
|
heap
|
page read and write
|
||
5BC1000
|
unkown
|
page read and write
|
||
4DB000
|
heap
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
486F000
|
unkown
|
page read and write
|
||
F10000
|
heap
|
page read and write
|
||
7FF718371000
|
unkown
|
page execute read
|
||
2F74000
|
heap
|
page read and write
|
||
5BC1000
|
unkown
|
page read and write
|
||
7FF718653000
|
unkown
|
page readonly
|
||
3500000
|
unkown
|
page read and write
|
||
4D0000
|
heap
|
page read and write
|
||
1391000
|
unkown
|
page read and write
|
||
174E000
|
stack
|
page read and write
|
||
6FDF000
|
unkown
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
2356000
|
heap
|
page read and write
|
||
3A61000
|
heap
|
page read and write
|
||
4EEF000
|
unkown
|
page read and write
|
||
5E64000
|
unkown
|
page read and write
|
||
5FFF000
|
stack
|
page read and write
|
||
2C84000
|
heap
|
page read and write
|
||
31B4000
|
heap
|
page read and write
|
||
7FFE01300000
|
unkown
|
page readonly
|
||
2F74000
|
heap
|
page read and write
|
||
2894000
|
heap
|
page read and write
|
||
41C000
|
heap
|
page read and write
|
||
405E000
|
unkown
|
page read and write
|
||
2C84000
|
heap
|
page read and write
|
||
59E1000
|
unkown
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
566C000
|
unkown
|
page read and write
|
||
5B1D000
|
stack
|
page read and write
|
||
51B0000
|
direct allocation
|
page read and write
|
||
5BC1000
|
unkown
|
page read and write
|
||
D00000
|
unkown
|
page readonly
|
||
7FF718653000
|
unkown
|
page readonly
|
||
7FF6AB97F000
|
unkown
|
page read and write
|
||
2D32000
|
direct allocation
|
page read and write
|
||
4D73000
|
heap
|
page read and write
|
||
4DD000
|
heap
|
page read and write
|
||
51F000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
2D3E000
|
direct allocation
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
664AE000
|
unkown
|
page write copy
|
||
5BC1000
|
unkown
|
page read and write
|
||
7FF718577000
|
unkown
|
page readonly
|
||
155D000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
C7E000
|
stack
|
page read and write
|
||
E35000
|
heap
|
page read and write
|
||
7FF6ABA0E000
|
unkown
|
page readonly
|
||
493000
|
heap
|
page read and write
|
||
119E000
|
stack
|
page read and write
|
||
4242000
|
heap
|
page read and write
|
||
27A0000
|
heap
|
page read and write
|
||
7FFE0E187000
|
unkown
|
page write copy
|
||
137C000
|
heap
|
page read and write
|
||
7FF6C5877000
|
unkown
|
page readonly
|
||
47F000
|
heap
|
page read and write
|
||
A9A000
|
heap
|
page read and write
|
||
4C5C000
|
trusted library allocation
|
page read and write
|
||
5BC1000
|
unkown
|
page read and write
|
||
174E000
|
stack
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
2C84000
|
heap
|
page read and write
|
||
14B5000
|
heap
|
page read and write
|
||
3320000
|
unkown
|
page read and write
|
||
140001000
|
unkown
|
page execute read
|
||
8DA000
|
unkown
|
page write copy
|
||
994000
|
heap
|
page read and write
|
||
66702000
|
unkown
|
page execute
|
||
3DDF000
|
unkown
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
558000
|
heap
|
page read and write
|
||
8BB000
|
unkown
|
page readonly
|
||
5BC0000
|
unkown
|
page read and write
|
||
3CFD000
|
heap
|
page read and write
|
||
2894000
|
heap
|
page read and write
|
||
4DB000
|
heap
|
page read and write
|
||
7FF718577000
|
unkown
|
page readonly
|
||
2A9B000
|
stack
|
page read and write
|
||
558000
|
heap
|
page read and write
|
||
6869000
|
unkown
|
page read and write
|
||
666F2000
|
unkown
|
page read and write
|
||
2C84000
|
heap
|
page read and write
|
||
4646000
|
trusted library allocation
|
page read and write
|
||
2C84000
|
heap
|
page read and write
|
||
3E52000
|
trusted library allocation
|
page read and write
|
||
7FF718577000
|
unkown
|
page readonly
|
||
52BE000
|
trusted library allocation
|
page read and write
|
||
51D9000
|
unkown
|
page read and write
|
||
386E000
|
stack
|
page read and write
|
||
2C84000
|
heap
|
page read and write
|
||
48C0000
|
unkown
|
page read and write
|
||
5BC1000
|
unkown
|
page read and write
|
||
3480000
|
heap
|
page read and write
|
||
3BB0000
|
heap
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
31AF000
|
stack
|
page read and write
|
||
7FFE0E175000
|
unkown
|
page readonly
|
||
2C76000
|
direct allocation
|
page read and write
|
||
3D6A000
|
heap
|
page read and write
|
||
137C000
|
heap
|
page read and write
|
||
7FFE0E131000
|
unkown
|
page execute read
|
||
4A66000
|
unkown
|
page read and write
|
||
664AC000
|
unkown
|
page read and write
|
||
5BC1000
|
unkown
|
page read and write
|
||
7FFDFB850000
|
unkown
|
page read and write
|
||
467000
|
heap
|
page read and write
|
||
7FFDFB060000
|
unkown
|
page readonly
|
||
42D2000
|
trusted library allocation
|
page read and write
|
||
45E5000
|
unkown
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
139B000
|
unkown
|
page read and write
|
||
5BC1000
|
unkown
|
page read and write
|
||
1380000
|
heap
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
133E000
|
stack
|
page read and write
|
||
2F7F000
|
stack
|
page read and write
|
||
52DD000
|
direct allocation
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
4DB000
|
heap
|
page read and write
|
||
665A0000
|
unkown
|
page readonly
|
||
2C72000
|
direct allocation
|
page read and write
|
||
8DD000
|
unkown
|
page readonly
|
||
66641000
|
unkown
|
page execute read
|
||
666F4000
|
unkown
|
page write copy
|
||
155D000
|
heap
|
page read and write
|
||
2C66000
|
direct allocation
|
page read and write
|
||
3360000
|
heap
|
page read and write
|
||
2AE6000
|
direct allocation
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
2980000
|
heap
|
page read and write
|
||
558000
|
heap
|
page read and write
|
||
41E0000
|
unkown
|
page read and write
|
||
9B5000
|
heap
|
page read and write
|
||
13A0000
|
heap
|
page read and write
|
||
6E252000
|
unkown
|
page read and write
|
||
2FFE000
|
unkown
|
page read and write
|
||
7FFE0E189000
|
unkown
|
page readonly
|
||
7FF718371000
|
unkown
|
page execute read
|
||
7FF6C5671000
|
unkown
|
page execute read
|
||
25DD000
|
unkown
|
page read and write
|
||
2F1E000
|
unkown
|
page read and write
|
||
5BC1000
|
unkown
|
page read and write
|
||
5EE2000
|
unkown
|
page read and write
|
||
2C84000
|
heap
|
page read and write
|
||
666FA000
|
unkown
|
page readonly
|
||
3A61000
|
unkown
|
page read and write
|
||
5AE000
|
heap
|
page read and write
|
||
7FF718577000
|
unkown
|
page readonly
|
||
109D000
|
stack
|
page read and write
|
||
4F9000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
5BC1000
|
unkown
|
page read and write
|
||
2C84000
|
heap
|
page read and write
|
||
6258000
|
unkown
|
page read and write
|
||
2C84000
|
heap
|
page read and write
|
||
2C84000
|
heap
|
page read and write
|
||
5BC1000
|
unkown
|
page read and write
|
||
595000
|
heap
|
page read and write
|
||
5BC1000
|
unkown
|
page read and write
|
||
1340000
|
heap
|
page read and write
|
||
3E0000
|
heap
|
page read and write
|
||
605A000
|
unkown
|
page read and write
|
||
2C84000
|
heap
|
page read and write
|
||
7FFDFB435000
|
unkown
|
page read and write
|
||
7FF718643000
|
unkown
|
page write copy
|
||
35D0000
|
unkown
|
page read and write
|
||
2786000
|
direct allocation
|
page read and write
|
||
37E0000
|
remote allocation
|
page read and write
|
||
666F7000
|
unkown
|
page read and write
|
||
3D53000
|
heap
|
page read and write
|
||
35D0000
|
remote allocation
|
page read and write
|
||
59AE000
|
direct allocation
|
page read and write
|
||
5759000
|
direct allocation
|
page read and write
|
||
5BC1000
|
unkown
|
page read and write
|
||
33E0000
|
trusted library allocation
|
page read and write
|
||
4F3000
|
heap
|
page read and write
|
||
4160000
|
trusted library allocation
|
page read and write
|
||
D6A000
|
unkown
|
page write copy
|
||
7FFDFB491000
|
unkown
|
page execute read
|
||
160E000
|
stack
|
page read and write
|
||
42C6000
|
trusted library allocation
|
page read and write
|
||
4DD000
|
heap
|
page read and write
|
||
F5C000
|
stack
|
page read and write
|
||
42E6000
|
trusted library allocation
|
page read and write
|
||
5DF0000
|
heap
|
page read and write
|
||
37C5000
|
trusted library allocation
|
page read and write
|
||
5BC1000
|
unkown
|
page read and write
|
||
7C9E000
|
stack
|
page read and write
|
||
779D000
|
stack
|
page read and write
|
||
7CE000
|
stack
|
page read and write
|
||
5AE5000
|
unkown
|
page read and write
|
||
54ED000
|
unkown
|
page read and write
|
||
2C80000
|
heap
|
page read and write
|
||
4AC000
|
heap
|
page read and write
|
||
59E1000
|
unkown
|
page read and write
|
||
4CEB000
|
unkown
|
page read and write
|
||
2300000
|
direct allocation
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
7FFDFB43A000
|
unkown
|
page read and write
|
||
1536000
|
heap
|
page read and write
|
||
3CE8000
|
unkown
|
page read and write
|
||
2C84000
|
heap
|
page read and write
|
||
646A000
|
unkown
|
page read and write
|
||
666F2000
|
unkown
|
page read and write
|
||
1A0000
|
heap
|
page read and write
|
||
66582000
|
unkown
|
page execute
|
||
2F74000
|
heap
|
page read and write
|
||
5BDC000
|
unkown
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
138D000
|
heap
|
page read and write
|
||
66420000
|
unkown
|
page readonly
|
||
140000000
|
unkown
|
page readonly
|
||
7FFE01345000
|
unkown
|
page readonly
|
||
FAE000
|
heap
|
page read and write
|
||
137E000
|
heap
|
page read and write
|
||
2C84000
|
heap
|
page read and write
|
||
FAD000
|
heap
|
page read and write
|
||
1255000
|
heap
|
page read and write
|
||
AEB000
|
heap
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
34C0000
|
heap
|
page read and write
|
||
137C000
|
heap
|
page read and write
|
||
5CFE000
|
stack
|
page read and write
|
||
5BC1000
|
unkown
|
page read and write
|
||
7FFDFB6C5000
|
unkown
|
page readonly
|
||
597000
|
heap
|
page read and write
|
||
1391000
|
unkown
|
page read and write
|
||
2CCD000
|
stack
|
page read and write
|
||
2C84000
|
heap
|
page read and write
|
||
140000000
|
unkown
|
page readonly
|
||
2CA4000
|
heap
|
page read and write
|
||
66631000
|
unkown
|
page readonly
|
||
50D000
|
heap
|
page read and write
|
||
AE6000
|
heap
|
page read and write
|
||
5C5D000
|
unkown
|
page read and write
|
||
2894000
|
heap
|
page read and write
|
||
4AB000
|
heap
|
page read and write
|
||
575D000
|
direct allocation
|
page read and write
|
||
4366000
|
unkown
|
page read and write
|
||
7D1F000
|
stack
|
page read and write
|
||
7FFE0CFD5000
|
unkown
|
page readonly
|
||
2C84000
|
heap
|
page read and write
|
||
47F000
|
heap
|
page read and write
|
||
6E230000
|
unkown
|
page readonly
|
||
38BD000
|
heap
|
page read and write
|
||
FAE000
|
heap
|
page read and write
|
||
57CE000
|
direct allocation
|
page read and write
|
||
291E000
|
stack
|
page read and write
|
||
2C84000
|
heap
|
page read and write
|
||
7FF718370000
|
unkown
|
page readonly
|
||
D01000
|
unkown
|
page execute read
|
||
7D9F000
|
stack
|
page read and write
|
||
2C84000
|
heap
|
page read and write
|
||
5EFF000
|
stack
|
page read and write
|
||
467000
|
heap
|
page read and write
|
||
66577000
|
unkown
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
791E000
|
stack
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
3940000
|
unkown
|
page read and write
|
||
5BC1000
|
unkown
|
page read and write
|
||
2C84000
|
heap
|
page read and write
|
||
405D000
|
unkown
|
page read and write
|
||
39A0000
|
trusted library allocation
|
page read and write
|
||
154F000
|
heap
|
page read and write
|
||
4AC000
|
heap
|
page read and write
|
||
7FF6C5953000
|
unkown
|
page readonly
|
||
1543000
|
heap
|
page read and write
|
||
487000
|
heap
|
page read and write
|
||
2D27000
|
direct allocation
|
page read and write
|
||
2950000
|
direct allocation
|
page read and write
|
||
3660000
|
unkown
|
page read and write
|
||
565000
|
heap
|
page read and write
|
||
6A68000
|
unkown
|
page read and write
|
||
2D28000
|
direct allocation
|
page read and write
|
||
2D1F000
|
direct allocation
|
page read and write
|
||
7FF6ABA10000
|
unkown
|
page read and write
|
||
2C84000
|
heap
|
page read and write
|
||
467000
|
heap
|
page read and write
|
||
46C3000
|
unkown
|
page read and write
|
||
5307000
|
trusted library allocation
|
page read and write
|
||
E40000
|
unkown
|
page read and write
|
||
4AC1000
|
unkown
|
page read and write
|
||
B50000
|
heap
|
page read and write
|
||
D6A000
|
unkown
|
page read and write
|
||
FAD000
|
heap
|
page read and write
|
||
6C61000
|
unkown
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
7FF69E568000
|
unkown
|
page read and write
|
||
2987000
|
heap
|
page read and write
|
||
B15000
|
heap
|
page read and write
|
||
8DD000
|
unkown
|
page readonly
|
||
EAC000
|
heap
|
page read and write
|
||
2C84000
|
heap
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
493000
|
heap
|
page read and write
|
||
4F0000
|
heap
|
page read and write
|
||
5463000
|
unkown
|
page read and write
|
||
1401F4000
|
unkown
|
page readonly
|
||
2F75000
|
heap
|
page read and write
|
||
5BC1000
|
unkown
|
page read and write
|
||
A10000
|
heap
|
page read and write
|
||
66641000
|
unkown
|
page execute read
|
||
2C84000
|
heap
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
666D1000
|
unkown
|
page readonly
|
||
5DFE000
|
stack
|
page read and write
|
||
3A0000
|
heap
|
page read and write
|
||
2894000
|
heap
|
page read and write
|
||
5BC1000
|
unkown
|
page read and write
|
||
7FF6C5953000
|
unkown
|
page readonly
|
||
2C84000
|
heap
|
page read and write
|
||
7FF6AB750000
|
unkown
|
page readonly
|
||
3381000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
446D000
|
unkown
|
page read and write
|
||
5660000
|
direct allocation
|
page read and write
|
||
2C84000
|
heap
|
page read and write
|
||
664AF000
|
unkown
|
page read and write
|
||
2E00000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
5BC1000
|
unkown
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
7FF718643000
|
unkown
|
page write copy
|
||
59E1000
|
unkown
|
page read and write
|
||
2AD0000
|
direct allocation
|
page read and write
|
||
5BC1000
|
unkown
|
page read and write
|
||
61A0000
|
unkown
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
4F7000
|
heap
|
page read and write
|
||
1401F4000
|
unkown
|
page readonly
|
||
5BC1000
|
unkown
|
page read and write
|
||
2F47000
|
heap
|
page read and write
|
||
728000
|
heap
|
page read and write
|
||
4AC000
|
heap
|
page read and write
|
||
40E0000
|
unkown
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
499000
|
heap
|
page read and write
|
||
5C1E000
|
stack
|
page read and write
|
||
5BC1000
|
unkown
|
page read and write
|
||
5BC1000
|
unkown
|
page read and write
|
||
664B1000
|
unkown
|
page readonly
|
||
5BC1000
|
unkown
|
page read and write
|
||
7FF718370000
|
unkown
|
page readonly
|
||
2C7F000
|
stack
|
page read and write
|
||
4A60000
|
unkown
|
page read and write
|
||
7FFE0CF90000
|
unkown
|
page readonly
|
||
1401E0000
|
unkown
|
page readonly
|
||
4660000
|
trusted library allocation
|
page read and write
|
||
664C0000
|
unkown
|
page readonly
|
||
3EE2000
|
heap
|
page read and write
|
||
67E3000
|
unkown
|
page read and write
|
||
7FF6C5943000
|
unkown
|
page write copy
|
||
6E253000
|
unkown
|
page readonly
|
||
EF8000
|
stack
|
page read and write
|
||
519000
|
heap
|
page read and write
|
||
1401C7000
|
unkown
|
page readonly
|
||
3370000
|
heap
|
page read and write
|
||
37CC000
|
trusted library allocation
|
page read and write
|
||
8BB000
|
unkown
|
page readonly
|
||
597000
|
heap
|
page read and write
|
||
2C20000
|
heap
|
page read and write
|
||
7FFDFB2C5000
|
unkown
|
page read and write
|
||
7FFDFB2B3000
|
unkown
|
page write copy
|
||
1401A9000
|
unkown
|
page write copy
|
||
2770000
|
direct allocation
|
page read and write
|
||
1898000
|
stack
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
66551000
|
unkown
|
page readonly
|
||
1401C7000
|
unkown
|
page readonly
|
||
37CB000
|
trusted library allocation
|
page read and write
|
||
1391000
|
unkown
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
543000
|
heap
|
page read and write
|
||
34DC000
|
stack
|
page read and write
|
||
307E000
|
unkown
|
page read and write
|
||
7064000
|
unkown
|
page read and write
|
||
5BC1000
|
unkown
|
page read and write
|
||
1C0000
|
heap
|
page read and write
|
||
B40000
|
heap
|
page read and write
|
||
3120000
|
heap
|
page read and write
|
||
3450000
|
heap
|
page read and write
|
||
485000
|
heap
|
page read and write
|
||
5BC1000
|
unkown
|
page read and write
|
||
3FDE000
|
unkown
|
page read and write
|
||
665A1000
|
unkown
|
page execute read
|
||
7FF6AB9A5000
|
unkown
|
page read and write
|
||
5BC1000
|
unkown
|
page read and write
|
||
140000000
|
unkown
|
page readonly
|
||
7FFDFB061000
|
unkown
|
page execute read
|
||
B10000
|
heap
|
page read and write
|
||
485A000
|
unkown
|
page read and write
|
||
E50000
|
heap
|
page read and write
|
||
2D05000
|
direct allocation
|
page read and write
|
||
2332000
|
heap
|
page read and write
|
||
60E0000
|
unkown
|
page read and write
|
||
37CA000
|
trusted library allocation
|
page read and write
|
||
F2B000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
7FFE0E187000
|
unkown
|
page write copy
|
||
318B000
|
heap
|
page read and write
|
||
48FD000
|
heap
|
page read and write
|
||
606C000
|
unkown
|
page read and write
|
||
6662C000
|
unkown
|
page read and write
|
||
3B5A000
|
heap
|
page read and write
|
||
7FFE0CF91000
|
unkown
|
page execute read
|
||
EA0000
|
heap
|
page read and write
|
||
2FAF000
|
stack
|
page read and write
|
||
44B000
|
heap
|
page read and write
|
||
52D9000
|
direct allocation
|
page read and write
|
||
2B9A000
|
stack
|
page read and write
|
||
3E66000
|
trusted library allocation
|
page read and write
|
||
66640000
|
unkown
|
page readonly
|
||
7FF69E53F000
|
unkown
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
71DC000
|
unkown
|
page read and write
|
||
558000
|
heap
|
page read and write
|
||
5BC1000
|
unkown
|
page read and write
|
||
138D000
|
heap
|
page read and write
|
||
D00000
|
unkown
|
page readonly
|
||
2F74000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
499000
|
heap
|
page read and write
|
||
358F000
|
stack
|
page read and write
|
||
CF9000
|
stack
|
page read and write
|
||
2C84000
|
heap
|
page read and write
|
||
1325000
|
heap
|
page read and write
|
||
1367000
|
heap
|
page read and write
|
||
33AF000
|
stack
|
page read and write
|
||
462000
|
heap
|
page read and write
|
||
7FF718371000
|
unkown
|
page execute read
|
||
2C84000
|
heap
|
page read and write
|
||
2C84000
|
heap
|
page read and write
|
||
52EB000
|
unkown
|
page read and write
|
||
7DF000
|
stack
|
page read and write
|
||
6EEC000
|
unkown
|
page read and write
|
||
2C60000
|
direct allocation
|
page read and write
|
||
2F70000
|
heap
|
page read and write
|
||
3A50000
|
heap
|
page execute read
|
||
5BC1000
|
unkown
|
page read and write
|
||
4AEC000
|
unkown
|
page read and write
|
||
50EC000
|
unkown
|
page read and write
|
||
38D0000
|
heap
|
page execute read
|
||
7FF718370000
|
unkown
|
page readonly
|
||
2C84000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
58E3000
|
unkown
|
page read and write
|
||
7FF718643000
|
unkown
|
page write copy
|
||
4AB000
|
heap
|
page read and write
|
||
47D2000
|
trusted library allocation
|
page read and write
|
||
5BC1000
|
unkown
|
page read and write
|
||
2E0B000
|
heap
|
page read and write
|
||
D6D000
|
unkown
|
page readonly
|
||
7FFDFB420000
|
unkown
|
page read and write
|
||
154D000
|
heap
|
page read and write
|
||
44EF000
|
unkown
|
page read and write
|
||
6C64000
|
unkown
|
page read and write
|
||
2B30000
|
direct allocation
|
page read and write
|
||
7FF718370000
|
unkown
|
page readonly
|
||
30B0000
|
direct allocation
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
66631000
|
unkown
|
page readonly
|
||
2D0E000
|
direct allocation
|
page read and write
|
||
7FFDFB060000
|
unkown
|
page readonly
|
||
5BC1000
|
unkown
|
page read and write
|
||
416000
|
heap
|
page read and write
|
||
2C84000
|
heap
|
page read and write
|
||
519000
|
heap
|
page read and write
|
||
4F3000
|
heap
|
page read and write
|
||
2C84000
|
heap
|
page read and write
|
||
7FFDFB43A000
|
unkown
|
page read and write
|
||
6260000
|
unkown
|
page read and write
|
||
664C1000
|
unkown
|
page execute read
|
||
354E000
|
stack
|
page read and write
|
||
1401A9000
|
unkown
|
page write copy
|
||
263C000
|
stack
|
page read and write
|
||
595000
|
heap
|
page read and write
|
||
7FF718371000
|
unkown
|
page execute read
|
||
2880000
|
heap
|
page read and write
|
||
2C84000
|
heap
|
page read and write
|
||
60FF000
|
stack
|
page read and write
|
||
D7D000
|
stack
|
page read and write
|
||
18F9000
|
heap
|
page read and write
|
||
140156000
|
unkown
|
page readonly
|
||
2D07000
|
direct allocation
|
page read and write
|
||
A1E000
|
stack
|
page read and write
|
||
37AF000
|
stack
|
page read and write
|
||
58C0000
|
unkown
|
page read and write
|
||
1401C7000
|
unkown
|
page readonly
|
||
13F2000
|
unkown
|
page read and write
|
||
25B5000
|
unkown
|
page read and write
|
||
4C64000
|
unkown
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
37C9000
|
trusted library allocation
|
page read and write
|
||
5067000
|
unkown
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
4F8000
|
heap
|
page read and write
|
||
425B000
|
unkown
|
page read and write
|
||
5BC1000
|
unkown
|
page read and write
|
||
3550000
|
heap
|
page read and write
|
||
1401F4000
|
unkown
|
page readonly
|
||
5BC1000
|
unkown
|
page read and write
|
||
2B00000
|
direct allocation
|
page read and write
|
||
47F000
|
heap
|
page read and write
|
||
48EE000
|
unkown
|
page read and write
|
||
3600000
|
heap
|
page read and write
|
||
66702000
|
unkown
|
page execute
|
||
1401E0000
|
unkown
|
page readonly
|
||
BBF000
|
stack
|
page read and write
|
||
5BC1000
|
unkown
|
page read and write
|
||
3EE5000
|
unkown
|
page read and write
|
||
1250000
|
heap
|
page read and write
|
||
5BC1000
|
unkown
|
page read and write
|
||
6861000
|
unkown
|
page read and write
|
||
6465000
|
unkown
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
2D03000
|
direct allocation
|
page read and write
|
||
5BC1000
|
unkown
|
page read and write
|
||
6E231000
|
unkown
|
page execute read
|
||
3394000
|
heap
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
6662F000
|
unkown
|
page read and write
|
||
7FF718370000
|
unkown
|
page readonly
|
||
56E8000
|
unkown
|
page read and write
|
||
66706000
|
unkown
|
page readonly
|
||
35A0000
|
heap
|
page read and write
|
||
5BC1000
|
unkown
|
page read and write
|
||
18A0000
|
heap
|
page read and write
|
||
5BC1000
|
unkown
|
page read and write
|
||
5810000
|
direct allocation
|
page read and write
|
||
3E66000
|
unkown
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
46B7000
|
trusted library allocation
|
page read and write
|
||
7FFE0E189000
|
unkown
|
page readonly
|
||
871000
|
unkown
|
page execute read
|
||
2894000
|
heap
|
page read and write
|
||
4939000
|
unkown
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
7FF6AB9A8000
|
unkown
|
page read and write
|
||
E30000
|
heap
|
page read and write
|
||
2894000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
6AE9000
|
unkown
|
page read and write
|
||
66702000
|
unkown
|
page execute
|
||
136C000
|
heap
|
page read and write
|
||
6A61000
|
unkown
|
page read and write
|
||
53DD000
|
unkown
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
2D38000
|
heap
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
2C84000
|
heap
|
page read and write
|
||
3394000
|
heap
|
page read and write
|
||
552000
|
heap
|
page read and write
|
||
1401A9000
|
unkown
|
page write copy
|
||
7FFE01359000
|
unkown
|
page readonly
|
||
6E26B000
|
unkown
|
page readonly
|
||
2C96000
|
direct allocation
|
page read and write
|
||
3713000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
5BC1000
|
unkown
|
page read and write
|
||
CE0000
|
heap
|
page read and write
|
||
5D60000
|
unkown
|
page read and write
|
||
7FFE01357000
|
unkown
|
page write copy
|
||
5BC1000
|
unkown
|
page read and write
|
||
7A1F000
|
stack
|
page read and write
|
||
5BC1000
|
unkown
|
page read and write
|
||
3E46000
|
trusted library allocation
|
page read and write
|
||
5CEC000
|
unkown
|
page read and write
|
||
7FF718577000
|
unkown
|
page readonly
|
||
595000
|
heap
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
66631000
|
unkown
|
page readonly
|
||
18E0000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
140001000
|
unkown
|
page execute read
|
||
2D00000
|
direct allocation
|
page read and write
|
||
41DD000
|
unkown
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
2C84000
|
heap
|
page read and write
|
||
4E67000
|
unkown
|
page read and write
|
||
2C84000
|
heap
|
page read and write
|
||
2894000
|
heap
|
page read and write
|
||
9B0000
|
heap
|
page read and write
|
||
4F5000
|
heap
|
page read and write
|
||
51F000
|
heap
|
page read and write
|
||
4F3000
|
heap
|
page read and write
|
||
37C3000
|
trusted library allocation
|
page read and write
|
||
1517000
|
heap
|
page read and write
|
||
5A64000
|
unkown
|
page read and write
|
||
665EF000
|
unkown
|
page readonly
|
||
5561000
|
unkown
|
page read and write
|
||
4D8000
|
heap
|
page read and write
|
||
18F6000
|
heap
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
761B000
|
stack
|
page read and write
|
||
6CE4000
|
unkown
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
870000
|
unkown
|
page readonly
|
||
499000
|
heap
|
page read and write
|
||
154F000
|
heap
|
page read and write
|
||
5561000
|
unkown
|
page read and write
|
||
35D0000
|
remote allocation
|
page read and write
|
||
37CD000
|
trusted library allocation
|
page read and write
|
||
7FFDFB435000
|
unkown
|
page read and write
|
||
7FF69E310000
|
unkown
|
page readonly
|
||
5BC1000
|
unkown
|
page read and write
|
||
5BC1000
|
unkown
|
page read and write
|
||
2890000
|
heap
|
page read and write
|
||
35AF000
|
stack
|
page read and write
|
||
6662E000
|
unkown
|
page write copy
|
||
31B4000
|
heap
|
page read and write
|
||
5BC1000
|
unkown
|
page read and write
|
||
552000
|
heap
|
page read and write
|
||
6E265000
|
unkown
|
page readonly
|
||
64EC000
|
unkown
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
7FF6ABA0A000
|
unkown
|
page read and write
|
||
540000
|
heap
|
page read and write
|
||
1320000
|
heap
|
page read and write
|
||
5A5B000
|
unkown
|
page read and write
|
||
4267000
|
unkown
|
page read and write
|
||
5BC1000
|
unkown
|
page read and write
|
||
5BC1000
|
unkown
|
page read and write
|
||
5BC1000
|
unkown
|
page read and write
|
||
2994000
|
heap
|
page read and write
|
||
3A5C000
|
unkown
|
page read and write
|
||
37FA000
|
heap
|
page read and write
|
||
170E000
|
stack
|
page read and write
|
||
5BC1000
|
unkown
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
7FF69E5CA000
|
unkown
|
page read and write
|
||
2B7E000
|
unkown
|
page read and write
|
||
6E26A000
|
unkown
|
page write copy
|
||
410000
|
heap
|
page read and write
|
||
7FF718371000
|
unkown
|
page execute read
|
||
36A0000
|
heap
|
page read and write
|
||
7FF69E5CE000
|
unkown
|
page readonly
|
||
5BC1000
|
unkown
|
page read and write
|
||
6662C000
|
unkown
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
46B1000
|
unkown
|
page read and write
|
||
4DD000
|
heap
|
page read and write
|
||
493000
|
heap
|
page read and write
|
||
190000
|
heap
|
page read and write
|
||
4262000
|
heap
|
page read and write
|
||
2F20000
|
heap
|
page read and write
|
||
6E5C000
|
unkown
|
page read and write
|
||
2CF7000
|
direct allocation
|
page read and write
|
||
666F7000
|
unkown
|
page read and write
|
||
7FF6AB999000
|
unkown
|
page readonly
|
||
7FFDFB86D000
|
unkown
|
page readonly
|
||
7FFDFB43D000
|
unkown
|
page readonly
|
||
46E2000
|
unkown
|
page read and write
|
||
D4B000
|
unkown
|
page readonly
|
||
1376000
|
heap
|
page read and write
|
||
21DE000
|
heap
|
page read and write
|
||
43DA000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
6DDC000
|
unkown
|
page read and write
|
||
7FFDFB86A000
|
unkown
|
page read and write
|
||
2D35000
|
direct allocation
|
page read and write
|
||
7FFDFB420000
|
unkown
|
page read and write
|
||
665A0000
|
unkown
|
page readonly
|
||
2F74000
|
heap
|
page read and write
|
||
7FFDFB2CD000
|
unkown
|
page readonly
|
||
D00000
|
heap
|
page read and write
|
||
499000
|
heap
|
page read and write
|
||
2C70000
|
heap
|
page read and write
|
||
720000
|
heap
|
page read and write
|
||
5F20000
|
direct allocation
|
page read and write
|
||
140156000
|
unkown
|
page readonly
|
||
140156000
|
unkown
|
page readonly
|
||
2D4F000
|
direct allocation
|
page read and write
|
||
7FFDFB490000
|
unkown
|
page readonly
|
||
499000
|
heap
|
page read and write
|
||
2C84000
|
heap
|
page read and write
|
||
13EE000
|
stack
|
page read and write
|
||
3ED7000
|
trusted library allocation
|
page read and write
|
||
2316000
|
direct allocation
|
page read and write
|
||
4A20000
|
heap
|
page read and write
|
||
2D88000
|
direct allocation
|
page read and write
|
||
2D88000
|
heap
|
page read and write
|
||
7FF718653000
|
unkown
|
page readonly
|
||
3850000
|
heap
|
page read and write
|
||
32D5000
|
heap
|
page read and write
|
||
5121000
|
trusted library allocation
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
2D7B000
|
direct allocation
|
page read and write
|
||
7FF6AB98F000
|
unkown
|
page readonly
|
||
17B0000
|
heap
|
page read and write
|
||
5560000
|
unkown
|
page read and write
|
||
55DE000
|
unkown
|
page read and write
|
||
42EB000
|
unkown
|
page read and write
|
||
FC6000
|
heap
|
page read and write
|
||
273A000
|
stack
|
page read and write
|
||
5EFF000
|
stack
|
page read and write
|
||
6662E000
|
unkown
|
page write copy
|
||
5BC1000
|
unkown
|
page read and write
|
||
467000
|
heap
|
page read and write
|
||
123C000
|
stack
|
page read and write
|
||
666B000
|
unkown
|
page read and write
|
||
7FF6C5943000
|
unkown
|
page write copy
|
||
140000000
|
unkown
|
page readonly
|
||
7FFDFB865000
|
unkown
|
page read and write
|
||
D4B000
|
unkown
|
page readonly
|
||
37C0000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
69E1000
|
unkown
|
page read and write
|
||
485000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
1366000
|
heap
|
page read and write
|
||
2D76000
|
direct allocation
|
page read and write
|
||
2D6E000
|
direct allocation
|
page read and write
|
||
37DE000
|
stack
|
page read and write
|
||
5C62000
|
unkown
|
page read and write
|
||
47E4000
|
unkown
|
page read and write
|
||
4DB000
|
heap
|
page read and write
|
||
1401F4000
|
unkown
|
page readonly
|
||
40E3000
|
unkown
|
page read and write
|
||
666F2000
|
unkown
|
page read and write
|
||
43DF000
|
unkown
|
page read and write
|
||
3CE0000
|
trusted library allocation
|
page read and write
|
||
5BC1000
|
unkown
|
page read and write
|
||
37C8000
|
trusted library allocation
|
page read and write
|
||
507A000
|
heap
|
page read and write
|
||
7FFE0E130000
|
unkown
|
page readonly
|
||
51F000
|
heap
|
page read and write
|
||
2D57000
|
direct allocation
|
page read and write
|
||
44F000
|
heap
|
page read and write
|
||
3440000
|
heap
|
page read and write
|
||
135E000
|
heap
|
page read and write
|
||
462000
|
heap
|
page read and write
|
||
1C0000
|
heap
|
page read and write
|
||
6E267000
|
unkown
|
page read and write
|
||
7D80000
|
heap
|
page read and write
|
||
466C000
|
unkown
|
page read and write
|
||
140001000
|
unkown
|
page execute read
|
||
666D1000
|
unkown
|
page readonly
|
||
2F74000
|
heap
|
page read and write
|
||
37E0000
|
remote allocation
|
page read and write
|
||
6664000
|
unkown
|
page read and write
|
||
5BC1000
|
unkown
|
page read and write
|
||
5BC1000
|
unkown
|
page read and write
|
||
42EF000
|
unkown
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
D01000
|
unkown
|
page execute read
|
||
184E000
|
stack
|
page read and write
|
||
1401E0000
|
unkown
|
page readonly
|
||
595000
|
heap
|
page read and write
|
||
148000
|
stack
|
page read and write
|
||
4F8000
|
heap
|
page read and write
|
||
7510000
|
unkown
|
page read and write
|
||
37C0000
|
trusted library allocation
|
page read and write
|
||
5BC1000
|
unkown
|
page read and write
|
||
1430000
|
heap
|
page read and write
|
||
7FF718370000
|
unkown
|
page readonly
|
||
28BC000
|
stack
|
page read and write
|
||
33D7000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
2F75000
|
heap
|
page read and write
|
||
5BC1000
|
unkown
|
page read and write
|
||
66641000
|
unkown
|
page execute read
|
||
4F57000
|
heap
|
page read and write
|
||
4F8000
|
heap
|
page read and write
|
||
5061000
|
unkown
|
page read and write
|
||
7FF718371000
|
unkown
|
page execute read
|
||
7FF69E559000
|
unkown
|
page readonly
|
||
2F74000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
F8F000
|
heap
|
page read and write
|
||
6662E000
|
unkown
|
page write copy
|
||
6E67000
|
unkown
|
page read and write
|
||
7FF718653000
|
unkown
|
page readonly
|
||
12EE000
|
stack
|
page read and write
|
||
7FFDFB295000
|
unkown
|
page readonly
|
||
4F5000
|
heap
|
page read and write
|
||
7FFE0CFE7000
|
unkown
|
page write copy
|
||
2D4B000
|
direct allocation
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
7FF6AB751000
|
unkown
|
page execute read
|
||
2F74000
|
heap
|
page read and write
|
||
2D62000
|
direct allocation
|
page read and write
|
||
5869000
|
unkown
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
154D000
|
heap
|
page read and write
|
||
665EF000
|
unkown
|
page readonly
|
||
870000
|
unkown
|
page readonly
|
||
7FFDFAEF1000
|
unkown
|
page execute read
|
||
5C5E000
|
stack
|
page read and write
|
||
4626000
|
trusted library allocation
|
page read and write
|
||
1401E0000
|
unkown
|
page readonly
|
||
2F74000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
There are 1104 hidden memdumps, click here to show them.