Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SecuriteInfo.com.FileRepMalware.20494.7181.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\_MEI42562\Microsoft Edge.exe
|
PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI42562\Runtime Broker.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI42562\VCRUNTIME140.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI42562\_bz2.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI42562\_decimal.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI42562\_hashlib.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI42562\_lzma.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI42562\_socket.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI42562\_ssl.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI42562\api-ms-win-core-console-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI42562\api-ms-win-core-datetime-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI42562\api-ms-win-core-debug-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI42562\api-ms-win-core-errorhandling-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI42562\api-ms-win-core-file-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI42562\api-ms-win-core-file-l1-2-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI42562\api-ms-win-core-handle-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI42562\api-ms-win-core-heap-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI42562\api-ms-win-core-interlocked-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI42562\api-ms-win-core-libraryloader-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI42562\api-ms-win-core-localization-l1-2-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI42562\api-ms-win-core-memory-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI42562\api-ms-win-core-namedpipe-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI42562\api-ms-win-core-processenvironment-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI42562\api-ms-win-core-processthreads-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI42562\api-ms-win-core-processthreads-l1-1-1.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI42562\api-ms-win-core-profile-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI42562\api-ms-win-core-rtlsupport-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI42562\api-ms-win-core-string-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI42562\api-ms-win-core-synch-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI42562\api-ms-win-core-synch-l1-2-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI42562\api-ms-win-core-sysinfo-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI42562\api-ms-win-core-timezone-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI42562\api-ms-win-core-util-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI42562\api-ms-win-crt-conio-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI42562\api-ms-win-crt-convert-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI42562\api-ms-win-crt-environment-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI42562\api-ms-win-crt-filesystem-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI42562\api-ms-win-crt-heap-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI42562\api-ms-win-crt-locale-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI42562\api-ms-win-crt-math-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI42562\api-ms-win-crt-process-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI42562\api-ms-win-crt-runtime-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI42562\api-ms-win-crt-stdio-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI42562\api-ms-win-crt-string-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI42562\api-ms-win-crt-time-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI42562\api-ms-win-crt-utility-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI42562\libcrypto-1_1.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI42562\libssl-1_1.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI42562\python311.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI42562\select.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI42562\unicodedata.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Edge.exe (copy)
|
PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Runtime Broker.exe (copy)
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI42562\api-ms-win-core-file-l2-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI42562\base_library.zip
|
Zip archive data, at least v2.0 to extract, compression method=store
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI42562\ucrtbase.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
There are 47 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20494.7181.exe
|
"C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20494.7181.exe"
|
||
C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20494.7181.exe
|
"C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20494.7181.exe"
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Edge.exe
|
"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Edge.exe"
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Runtime Broker.exe
|
"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Runtime Broker.exe"
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Edge.exe
|
"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Edge"
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Edge.exe
|
"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Edge.exe"
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Runtime Broker.exe
|
"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Runtime Broker.exe"
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Edge.exe
|
"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Edge"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Edge.exe""
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Runtime Broker.exe""
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 5 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L688
|
unknown
|
||
https://www.python.org/download/releases/2.3/mro/.
|
unknown
|
||
https://xmrig.com/wizard%s
|
unknown
|
||
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader
|
unknown
|
||
https://xmrig.com/docs/algorithms
|
unknown
|
||
https://xmrig.com/benchmark/%s
|
unknown
|
||
https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#
|
unknown
|
||
https://xmrig.com/wizard
|
unknown
|
||
https://enigmaprotector.com/taggant/spv.crl0
|
unknown
|
||
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.py
|
unknown
|
||
https://enigmaprotector.com/taggant/user.crl0
|
unknown
|
||
https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_sy
|
unknown
|
||
https://peps.python.org/pep-0263/
|
unknown
|
||
https://www.python.org/psf/license/
|
unknown
|
There are 4 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
donate.ssl.xmrig.com
|
178.128.242.134
|
||
donate.v2.xmrig.com
|
178.128.242.134
|
||
pool-nyc.supportxmr.com
|
104.243.33.118
|
||
pool.supportxmr.com
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.243.43.115
|
unknown
|
United States
|
||
178.128.242.134
|
donate.ssl.xmrig.com
|
Netherlands
|
||
199.247.27.41
|
unknown
|
European Union
|
||
104.243.33.118
|
pool-nyc.supportxmr.com
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
24D4EB4D000
|
heap
|
page read and write
|
||
21D2E371000
|
heap
|
page read and write
|
||
21D2DA25000
|
heap
|
page read and write
|
||
145BBDCD000
|
heap
|
page read and write
|
||
145BB7F5000
|
heap
|
page read and write
|
||
21D2E34D000
|
heap
|
page read and write
|
||
1859C368000
|
heap
|
page read and write
|
||
24D4CA75000
|
heap
|
page read and write
|
||
1859BEA5000
|
heap
|
page read and write
|
||
7FF612933000
|
unkown
|
page readonly
|
||
145BBDF0000
|
heap
|
page read and write
|
||
24D4EB6F000
|
heap
|
page read and write
|
||
1859C0AD000
|
heap
|
page read and write
|
||
1859C0D0000
|
heap
|
page read and write
|
||
21D2E333000
|
heap
|
page read and write
|
||
24D4E6A3000
|
heap
|
page read and write
|
||
224C9AB8000
|
heap
|
page read and write
|
||
7FF612331000
|
unkown
|
page execute read
|
||
29C2D2D0000
|
heap
|
page read and write
|
||
143F97A0000
|
heap
|
page read and write
|
||
7FF747212000
|
unkown
|
page execute and write copy
|
||
224C9917000
|
heap
|
page read and write
|
||
1859A3C0000
|
heap
|
page read and write
|
||
22134510000
|
heap
|
page read and write
|
||
224C9AB8000
|
heap
|
page read and write
|
||
224C8EFC000
|
heap
|
page read and write
|
||
17AE57E000
|
stack
|
page read and write
|
||
1859C220000
|
heap
|
page read and write
|
||
4F193FD000
|
stack
|
page read and write
|
||
224C7131000
|
heap
|
page read and write
|
||
24D4E650000
|
heap
|
page read and write
|
||
4F17FFF000
|
stack
|
page read and write
|
||
29C2B520000
|
heap
|
page read and write
|
||
D9BEDFC000
|
stack
|
page read and write
|
||
22135732000
|
trusted library allocation
|
page read and write
|
||
24D54425000
|
heap
|
page read and write
|
||
1859C18B000
|
heap
|
page read and write
|
||
7FF794E24000
|
unkown
|
page execute and write copy
|
||
D95A5FD000
|
stack
|
page read and write
|
||
224C8DC3000
|
heap
|
page read and write
|
||
7FFD942E0000
|
unkown
|
page read and write
|
||
7FF612331000
|
unkown
|
page execute and write copy
|
||
7FF66DCE7000
|
unkown
|
page execute and read and write
|
||
224C8EA3000
|
heap
|
page read and write
|
||
143F98DD000
|
heap
|
page read and write
|
||
7FF612330000
|
unkown
|
page readonly
|
||
7FFD94252000
|
unkown
|
page read and write
|
||
21D2D910000
|
heap
|
page read and write
|
||
7FF66DB8D000
|
unkown
|
page execute and read and write
|
||
29C2D3E3000
|
heap
|
page read and write
|
||
224C9AD8000
|
heap
|
page read and write
|
||
143414D0000
|
heap
|
page read and write
|
||
224C8EF3000
|
heap
|
page read and write
|
||
202B979B000
|
heap
|
page read and write
|
||
7FF66E380000
|
unkown
|
page execute and read and write
|
||
7FF79427A000
|
unkown
|
page readonly
|
||
7F917BC000
|
stack
|
page read and write
|
||
224C8E14000
|
heap
|
page read and write
|
||
7FF612E5E000
|
unkown
|
page execute and write copy
|
||
221350F0000
|
heap
|
page execute and read and write
|
||
7FF74770E000
|
unkown
|
page execute and write copy
|
||
1862ED28000
|
heap
|
page read and write
|
||
1859C152000
|
heap
|
page read and write
|
||
1862ED15000
|
heap
|
page read and write
|
||
D78A1FF000
|
stack
|
page read and write
|
||
224C99F5000
|
heap
|
page read and write
|
||
24D4EBC9000
|
heap
|
page read and write
|
||
224C9A9B000
|
heap
|
page read and write
|
||
1859C139000
|
heap
|
page read and write
|
||
22134C20000
|
heap
|
page read and write
|
||
29C2B490000
|
heap
|
page read and write
|
||
4F19BFC000
|
stack
|
page read and write
|
||
224C9A86000
|
heap
|
page read and write
|
||
224C8BA0000
|
heap
|
page read and write
|
||
C7FFB9E000
|
stack
|
page read and write
|
||
7FFD33C60000
|
trusted library allocation
|
page read and write
|
||
202BB223000
|
heap
|
page read and write
|
||
1859C301000
|
heap
|
page read and write
|
||
7FF613241000
|
unkown
|
page execute and read and write
|
||
7FFD33C40000
|
trusted library allocation
|
page read and write
|
||
29C2D0D0000
|
trusted library allocation
|
page read and write
|
||
224C9A3F000
|
heap
|
page read and write
|
||
D95C5FC000
|
stack
|
page read and write
|
||
7FF79428D000
|
unkown
|
page execute and write copy
|
||
224C8F21000
|
heap
|
page read and write
|
||
202BB634000
|
unkown
|
page read and write
|
||
224C7020000
|
heap
|
page readonly
|
||
1859C15B000
|
heap
|
page read and write
|
||
22134AF0000
|
trusted library allocation
|
page read and write
|
||
145BBC43000
|
heap
|
page read and write
|
||
202BD5D0000
|
unkown
|
page read and write
|
||
1862ED24000
|
heap
|
page read and write
|
||
224C8EF7000
|
heap
|
page read and write
|
||
21D2BE00000
|
heap
|
page read and write
|
||
29C3DD73000
|
trusted library allocation
|
page read and write
|
||
D9581FE000
|
stack
|
page read and write
|
||
4F183FF000
|
stack
|
page read and write
|
||
1859C1A0000
|
heap
|
page read and write
|
||
3E1F0FB000
|
unkown
|
page read and write
|
||
7FF613A19000
|
unkown
|
page execute and read and write
|
||
224C9AEC000
|
heap
|
page read and write
|
||
202BB1B0000
|
unkown
|
page readonly
|
||
D78B9FE000
|
stack
|
page read and write
|
||
1D49F780000
|
heap
|
page read and write
|
||
22134663000
|
heap
|
page read and write
|
||
29C2D0E0000
|
heap
|
page read and write
|
||
7FF612E5E000
|
unkown
|
page execute and write copy
|
||
224C9DF8000
|
direct allocation
|
page read and write
|
||
224C8EA7000
|
heap
|
page read and write
|
||
7FF66D802000
|
unkown
|
page execute and write copy
|
||
7FF66D808000
|
unkown
|
page execute and write copy
|
||
24D4CAE0000
|
heap
|
page read and write
|
||
224C96E0000
|
direct allocation
|
page read and write
|
||
7FF66D806000
|
unkown
|
page execute and write copy
|
||
224C9A9B000
|
heap
|
page read and write
|
||
202BB197000
|
unkown
|
page read and write
|
||
7FF7942B4000
|
unkown
|
page execute and read and write
|
||
7FF66D806000
|
unkown
|
page execute and write copy
|
||
224C9AEF000
|
heap
|
page read and write
|
||
224C98E1000
|
heap
|
page read and write
|
||
224C98ED000
|
heap
|
page read and write
|
||
1862ED1D000
|
heap
|
page read and write
|
||
224C98F0000
|
heap
|
page read and write
|
||
224C99F8000
|
heap
|
page read and write
|
||
29C2D110000
|
heap
|
page read and write
|
||
24D4EBD9000
|
heap
|
page read and write
|
||
143436CD000
|
unkown
|
page read and write
|
||
24D52625000
|
heap
|
page read and write
|
||
29C2D020000
|
heap
|
page read and write
|
||
7FF612330000
|
unkown
|
page readonly
|
||
D78A5FD000
|
stack
|
page read and write
|
||
224C9979000
|
heap
|
page read and write
|
||
143F96E0000
|
heap
|
page read and write
|
||
3E1EBBE000
|
unkown
|
page read and write
|
||
7FFD9425C000
|
unkown
|
page write copy
|
||
24D4CA70000
|
heap
|
page read and write
|
||
22132A50000
|
heap
|
page read and write
|
||
221349E6000
|
heap
|
page read and write
|
||
29C2E392000
|
trusted library allocation
|
page read and write
|
||
7FF74774E000
|
unkown
|
page execute and write copy
|
||
224C7120000
|
heap
|
page read and write
|
||
224C8F1A000
|
heap
|
page read and write
|
||
21D2DB70000
|
direct allocation
|
page execute read
|
||
145BBC90000
|
heap
|
page read and write
|
||
29C2D1D0000
|
heap
|
page read and write
|
||
224C8F25000
|
heap
|
page read and write
|
||
29C2E3A2000
|
trusted library allocation
|
page read and write
|
||
224C9A6D000
|
heap
|
page read and write
|
||
7FFD94287000
|
unkown
|
page read and write
|
||
1859C17B000
|
heap
|
page read and write
|
||
224C98EB000
|
heap
|
page read and write
|
||
143435B4000
|
unkown
|
page read and write
|
||
7FF612E1E000
|
unkown
|
page execute and write copy
|
||
1859A3D3000
|
heap
|
page read and write
|
||
24D4EA04000
|
heap
|
page read and write
|
||
7FFD94094000
|
unkown
|
page readonly
|
||
7FF66E0BD000
|
unkown
|
page execute and read and write
|
||
7FFDA3784000
|
unkown
|
page read and write
|
||
224C9979000
|
heap
|
page read and write
|
||
7FF66D800000
|
unkown
|
page readonly
|
||
29C2CFE0000
|
unclassified section
|
page read and write
|
||
7FF66E380000
|
unkown
|
page execute and write copy
|
||
23ED480A000
|
unkown
|
page read and write
|
||
A00D3F9000
|
stack
|
page read and write
|
||
7FF613213000
|
unkown
|
page execute and read and write
|
||
7FFD33C3D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF66DB8D000
|
unkown
|
page execute and read and write
|
||
224C70E0000
|
heap
|
page read and write
|
||
1859A250000
|
heap
|
page read and write
|
||
BCB9CFC000
|
stack
|
page read and write
|
||
7FFD94313000
|
unkown
|
page read and write
|
||
224C9AAE000
|
heap
|
page read and write
|
||
7FF66E383000
|
unkown
|
page execute and write copy
|
||
7FFD94312000
|
unkown
|
page write copy
|
||
145BBBB0000
|
heap
|
page read and write
|
||
7FF794629000
|
unkown
|
page execute and read and write
|
||
23ED2D61000
|
unkown
|
page readonly
|
||
1859C010000
|
direct allocation
|
page execute and read and write
|
||
145BBBE1000
|
heap
|
page read and write
|
||
224C991E000
|
heap
|
page read and write
|
||
1859C152000
|
heap
|
page read and write
|
||
22135721000
|
trusted library allocation
|
page read and write
|
||
224C99F9000
|
heap
|
page read and write
|
||
1862ED26000
|
heap
|
page read and write
|
||
224C91D0000
|
heap
|
page read and write
|
||
224C99DC000
|
heap
|
page read and write
|
||
202BB7D2000
|
unkown
|
page read and write
|
||
29C2E37F000
|
trusted library allocation
|
page read and write
|
||
1862ED2B000
|
heap
|
page read and write
|
||
7FF794251000
|
unkown
|
page execute read
|
||
24D53A25000
|
heap
|
page read and write
|
||
7FF612331000
|
unkown
|
page execute and write copy
|
||
24D4FE25000
|
heap
|
page read and write
|
||
7FF66D800000
|
unkown
|
page readonly
|
||
29C2D455000
|
heap
|
page read and write
|
||
7FFD9401A000
|
unkown
|
page readonly
|
||
29C2DD60000
|
heap
|
page read and write
|
||
22135724000
|
trusted library allocation
|
page read and write
|
||
21D31A33000
|
heap
|
page read and write
|
||
224C9993000
|
heap
|
page read and write
|
||
4F197FC000
|
stack
|
page read and write
|
||
224C99EF000
|
heap
|
page read and write
|
||
143439C0000
|
unkown
|
page readonly
|
||
3E1EF7E000
|
unkown
|
page readonly
|
||
7FFDA4161000
|
unkown
|
page execute read
|
||
224C9946000
|
heap
|
page read and write
|
||
21D31033000
|
heap
|
page read and write
|
||
224C8F0C000
|
heap
|
page read and write
|
||
7FFD94293000
|
unkown
|
page read and write
|
||
1C878FE000
|
unkown
|
page readonly
|
||
224C9994000
|
heap
|
page read and write
|
||
7FF794B62000
|
unkown
|
page execute and read and write
|
||
29C2E38E000
|
trusted library allocation
|
page read and write
|
||
29C2D2D3000
|
heap
|
page read and write
|
||
1859C0B3000
|
heap
|
page read and write
|
||
202BBB70000
|
unkown
|
page readonly
|
||
24D4EBC9000
|
heap
|
page read and write
|
||
224C9992000
|
heap
|
page read and write
|
||
29C2D3BE000
|
heap
|
page read and write
|
||
D9595FF000
|
stack
|
page read and write
|
||
224C9987000
|
heap
|
page read and write
|
||
224C8F21000
|
heap
|
page read and write
|
||
7FF613203000
|
unkown
|
page execute and read and write
|
||
27563FE000
|
stack
|
page read and write
|
||
224C9AB8000
|
heap
|
page read and write
|
||
7FF612933000
|
unkown
|
page execute and write copy
|
||
1859C080000
|
heap
|
page read and write
|
||
22134AA0000
|
trusted library allocation
|
page read and write
|
||
1C87BFE000
|
unkown
|
page readonly
|
||
224C8E91000
|
heap
|
page read and write
|
||
23ED2970000
|
unkown
|
page read and write
|
||
7FF4ACB20000
|
direct allocation
|
page execute and read and write
|
||
202B97FE000
|
heap
|
page read and write
|
||
29C2E391000
|
trusted library allocation
|
page read and write
|
||
224C9A20000
|
heap
|
page read and write
|
||
224C8B90000
|
heap
|
page read and write
|
||
143414C0000
|
unkown
|
page readonly
|
||
224C8F22000
|
heap
|
page read and write
|
||
14343684000
|
unkown
|
page read and write
|
||
7FFD33C32000
|
trusted library allocation
|
page read and write
|
||
22134C60000
|
heap
|
page read and write
|
||
24D4EB84000
|
heap
|
page read and write
|
||
7FF612E1E000
|
unkown
|
page execute and write copy
|
||
224C9A21000
|
heap
|
page read and write
|
||
224C9946000
|
heap
|
page read and write
|
||
22134820000
|
heap
|
page read and write
|
||
22132B46000
|
heap
|
page read and write
|
||
29C2DB80000
|
heap
|
page read and write
|
||
29C2D0C0000
|
trusted library allocation
|
page read and write
|
||
24D4EBF2000
|
heap
|
page read and write
|
||
224C8D61000
|
heap
|
page read and write
|
||
1C777B72000
|
heap
|
page read and write
|
||
224C9979000
|
heap
|
page read and write
|
||
D9C09FE000
|
stack
|
page read and write
|
||
7FFDA4341000
|
unkown
|
page readonly
|
||
7FFD33C42000
|
trusted library allocation
|
page read and write
|
||
7FF61336D000
|
unkown
|
page execute and read and write
|
||
24D4EA45000
|
heap
|
page read and write
|
||
1C879FE000
|
unkown
|
page readonly
|
||
7FFD33C50000
|
trusted library allocation
|
page read and write
|
||
29C2E394000
|
trusted library allocation
|
page read and write
|
||
224C9979000
|
heap
|
page read and write
|
||
D78A9FC000
|
stack
|
page read and write
|
||
7FF7942A1000
|
unkown
|
page readonly
|
||
7FF612AC1000
|
unkown
|
page readonly
|
||
24D4CA80000
|
heap
|
page read and write
|
||
202BB898000
|
unkown
|
page read and write
|
||
1859BE70000
|
heap
|
page read and write
|
||
224C998F000
|
heap
|
page read and write
|
||
143435C0000
|
unkown
|
page read and write
|
||
1859C190000
|
heap
|
page read and write
|
||
7FFD9426C000
|
unkown
|
page read and write
|
||
224C9AB8000
|
heap
|
page read and write
|
||
7FF794E21000
|
unkown
|
page execute and write copy
|
||
14342F40000
|
unkown
|
page readonly
|
||
D7889FF000
|
stack
|
page read and write
|
||
23ED461E000
|
unkown
|
page read and write
|
||
224C9979000
|
heap
|
page read and write
|
||
143F98E0000
|
heap
|
page read and write
|
||
224C8EA7000
|
heap
|
page read and write
|
||
23ED4530000
|
unkown
|
page read and write
|
||
143433AE000
|
unkown
|
page read and write
|
||
1D49F660000
|
heap
|
page read and write
|
||
1862ED28000
|
heap
|
page read and write
|
||
7FFD33C4D000
|
trusted library allocation
|
page execute and read and write
|
||
24D4E930000
|
heap
|
page read and write
|
||
24D4EA10000
|
heap
|
page read and write
|
||
1862ED1E000
|
heap
|
page read and write
|
||
145BC2A5000
|
heap
|
page read and write
|
||
1859C442000
|
direct allocation
|
page execute and read and write
|
||
1D49F590000
|
heap
|
page read and write
|
||
143415D5000
|
heap
|
page read and write
|
||
224C8D70000
|
heap
|
page read and write
|
||
224C9984000
|
heap
|
page read and write
|
||
224C8D30000
|
heap
|
page read and write
|
||
202BB0A0000
|
unkown
|
page read and write
|
||
D7895FE000
|
stack
|
page read and write
|
||
224C9AB8000
|
heap
|
page read and write
|
||
1859C16B000
|
heap
|
page read and write
|
||
224C8E85000
|
heap
|
page read and write
|
||
22134AD3000
|
trusted library allocation
|
page read and write
|
||
143435BA000
|
unkown
|
page read and write
|
||
7FF66DBBB000
|
unkown
|
page execute and read and write
|
||
224C9DD8000
|
direct allocation
|
page read and write
|
||
145BBA30000
|
heap
|
page read and write
|
||
143F9670000
|
heap
|
page read and write
|
||
17AD9BE000
|
stack
|
page read and write
|
||
7FF66DBE4000
|
unkown
|
page execute and read and write
|
||
14342F70000
|
heap
|
page read and write
|
||
202BB5D2000
|
unkown
|
page read and write
|
||
224C9919000
|
heap
|
page read and write
|
||
224C9E64000
|
direct allocation
|
page read and write
|
||
3E1F07E000
|
unkown
|
page readonly
|
||
145B9D60000
|
heap
|
page read and write
|
||
23ED29B0000
|
unkown
|
page read and write
|
||
7FF747223000
|
unkown
|
page execute and write copy
|
||
224C9AAE000
|
heap
|
page read and write
|
||
7FF612933000
|
unkown
|
page execute and write copy
|
||
224C8CC0000
|
heap
|
page read and write
|
||
7FF79463D000
|
unkown
|
page execute and read and write
|
||
143415D0000
|
heap
|
page read and write
|
||
224C8EA5000
|
heap
|
page read and write
|
||
7FFD94272000
|
unkown
|
page write copy
|
||
29C2D2E0000
|
heap
|
page read and write
|
||
224C8CA0000
|
heap
|
page read and write
|
||
7FFD9425D000
|
unkown
|
page read and write
|
||
224C8E89000
|
heap
|
page read and write
|
||
145B9D00000
|
heap
|
page read and write
|
||
221348A0000
|
heap
|
page read and write
|
||
145B9D68000
|
heap
|
page read and write
|
||
224C99D4000
|
heap
|
page read and write
|
||
24D4E7B0000
|
direct allocation
|
page execute read
|
||
224C8EB7000
|
heap
|
page read and write
|
||
14341601000
|
unkown
|
page readonly
|
||
7FF612922000
|
unkown
|
page execute and write copy
|
||
7FFDA4171000
|
unkown
|
page read and write
|
||
1862ED19000
|
heap
|
page read and write
|
||
1859BFB0000
|
direct allocation
|
page execute read
|
||
224C9E58000
|
direct allocation
|
page read and write
|
||
21D2D9E0000
|
heap
|
page read and write
|
||
202BDED0000
|
unkown
|
page read and write
|
||
224C9D2C000
|
direct allocation
|
page read and write
|
||
24D4CA20000
|
heap
|
page read and write
|
||
1859D6EB000
|
heap
|
page read and write
|
||
224C998E000
|
heap
|
page read and write
|
||
7FFDB24B0000
|
direct allocation
|
page execute and read and write
|
||
224C99D4000
|
heap
|
page read and write
|
||
224C8ED6000
|
heap
|
page read and write
|
||
145BBDD3000
|
heap
|
page read and write
|
||
7FF79428D000
|
unkown
|
page read and write
|
||
202BB220000
|
heap
|
page read and write
|
||
17AD5D3000
|
stack
|
page read and write
|
||
1862ED19000
|
heap
|
page read and write
|
||
1D49F681000
|
heap
|
page read and write
|
||
7FFDA4347000
|
unkown
|
page readonly
|
||
1859C8E5000
|
heap
|
page read and write
|
||
1859FEEB000
|
heap
|
page read and write
|
||
7FF612E55000
|
unkown
|
page execute and write copy
|
||
224C9941000
|
heap
|
page read and write
|
||
224C9916000
|
heap
|
page read and write
|
||
224C9A9B000
|
heap
|
page read and write
|
||
7FF613A16000
|
unkown
|
page execute and write copy
|
||
7FF7942B3000
|
unkown
|
page execute and write copy
|
||
224C8C60000
|
heap
|
page read and write
|
||
224C9A9B000
|
heap
|
page read and write
|
||
D9C01FF000
|
stack
|
page read and write
|
||
22132D40000
|
heap
|
page read and write
|
||
7FF794E21000
|
unkown
|
page execute and write copy
|
||
7F91BFF000
|
stack
|
page read and write
|
||
7FFD9428F000
|
unkown
|
page read and write
|
||
23ED4756000
|
unkown
|
page read and write
|
||
21D2E350000
|
heap
|
page read and write
|
||
7FF612922000
|
unkown
|
page execute and write copy
|
||
224C9D60000
|
direct allocation
|
page read and write
|
||
1C777AD0000
|
heap
|
page read and write
|
||
7FF794250000
|
unkown
|
page readonly
|
||
1862ED2B000
|
heap
|
page read and write
|
||
224C8E7E000
|
heap
|
page read and write
|
||
7FFD9429C000
|
unkown
|
page read and write
|
||
7FF794639000
|
unkown
|
page execute and read and write
|
||
1862ED24000
|
heap
|
page read and write
|
||
C7FF3D4000
|
stack
|
page read and write
|
||
224C9AC8000
|
heap
|
page read and write
|
||
7FFD9430E000
|
unkown
|
page read and write
|
||
224C9E10000
|
direct allocation
|
page read and write
|
||
224C9A8F000
|
heap
|
page read and write
|
||
145BBDC2000
|
heap
|
page read and write
|
||
24D4EAB5000
|
heap
|
page read and write
|
||
1862ED1D000
|
heap
|
page read and write
|
||
7FF794251000
|
unkown
|
page execute read
|
||
224C8E8C000
|
heap
|
page read and write
|
||
23ED2791000
|
unkown
|
page readonly
|
||
224C99A0000
|
heap
|
page read and write
|
||
224C99D4000
|
heap
|
page read and write
|
||
7FF66D802000
|
unkown
|
page execute and write copy
|
||
A00FFFF000
|
stack
|
page read and write
|
||
14343530000
|
unkown
|
page read and write
|
||
22135724000
|
trusted library allocation
|
page read and write
|
||
21D30633000
|
heap
|
page read and write
|
||
2214D6D0000
|
heap
|
page execute and read and write
|
||
7FF612AC1000
|
unkown
|
page execute and write copy
|
||
224C991C000
|
heap
|
page read and write
|
||
224C98EC000
|
heap
|
page read and write
|
||
224C9A8F000
|
heap
|
page read and write
|
||
224C8E98000
|
heap
|
page read and write
|
||
A00EBFE000
|
stack
|
page read and write
|
||
224C98F0000
|
heap
|
page read and write
|
||
1862ED1F000
|
heap
|
page read and write
|
||
4F1A7FF000
|
stack
|
page read and write
|
||
1C8767F000
|
stack
|
page read and write
|
||
1862ED1F000
|
heap
|
page read and write
|
||
29C2E286000
|
trusted library allocation
|
page read and write
|
||
224C8E92000
|
heap
|
page read and write
|
||
29C2CFB0000
|
heap
|
page read and write
|
||
221347D0000
|
heap
|
page read and write
|
||
7FF61326A000
|
unkown
|
page execute and read and write
|
||
1859C335000
|
heap
|
page read and write
|
||
29C2E39C000
|
trusted library allocation
|
page read and write
|
||
7FFDB24B0000
|
direct allocation
|
page execute and read and write
|
||
224C8E97000
|
heap
|
page read and write
|
||
21D2DED0000
|
heap
|
page read and write
|
||
7FFD94269000
|
unkown
|
page read and write
|
||
23ED491B000
|
unkown
|
page read and write
|
||
29C2DD71000
|
trusted library allocation
|
page read and write
|
||
7FFD33C52000
|
trusted library allocation
|
page read and write
|
||
7FF7942B2000
|
unkown
|
page execute and write copy
|
||
145BBAB0000
|
heap
|
page read and write
|
||
22145101000
|
trusted library allocation
|
page read and write
|
||
224C9A9B000
|
heap
|
page read and write
|
||
21D2DE84000
|
heap
|
page read and write
|
||
224C9A1D000
|
heap
|
page read and write
|
||
21D2DBD3000
|
heap
|
page read and write
|
||
3E1ED73000
|
unkown
|
page read and write
|
||
224C6F40000
|
heap
|
page read and write
|
||
224C9A27000
|
heap
|
page read and write
|
||
7FFDB24B0000
|
direct allocation
|
page execute and read and write
|
||
224C9A8F000
|
heap
|
page read and write
|
||
1D49F66A000
|
heap
|
page read and write
|
||
1859A3C8000
|
heap
|
page read and write
|
||
14341620000
|
unkown
|
page read and write
|
||
7FF79427A000
|
unkown
|
page execute and write copy
|
||
29C2DA6C000
|
heap
|
page read and write
|
||
7FFDA3785000
|
unkown
|
page readonly
|
||
66208FE000
|
unkown
|
page read and write
|
||
1862ED15000
|
heap
|
page read and write
|
||
3E1F17E000
|
unkown
|
page readonly
|
||
143F96A0000
|
heap
|
page read and write
|
||
224C8CB0000
|
heap
|
page read and write
|
||
29C2D100000
|
heap
|
page read and write
|
||
7FF612E1F000
|
unkown
|
page read and write
|
||
23ED4170000
|
unkown
|
page read and write
|
||
7FFD93FD7000
|
unkown
|
page readonly
|
||
145BB873000
|
heap
|
page read and write
|
||
7FF613A16000
|
unkown
|
page execute and write copy
|
||
224C9CE0000
|
direct allocation
|
page read and write
|
||
224C999E000
|
heap
|
page read and write
|
||
A00E7FF000
|
stack
|
page read and write
|
||
224C9DA0000
|
direct allocation
|
page read and write
|
||
24D4E8C0000
|
heap
|
page read and write
|
||
143F96D5000
|
heap
|
page read and write
|
||
7FF794250000
|
unkown
|
page readonly
|
||
1862ED19000
|
heap
|
page read and write
|
||
224C993A000
|
heap
|
page read and write
|
||
224C9919000
|
heap
|
page read and write
|
||
23ED4692000
|
unkown
|
page read and write
|
||
7FFD33C44000
|
trusted library allocation
|
page read and write
|
||
224C8C9D000
|
heap
|
page read and write
|
||
224C98E5000
|
heap
|
page read and write
|
||
21D2E430000
|
heap
|
page read and write
|
||
A00DFFE000
|
stack
|
page read and write
|
||
202B9795000
|
heap
|
page read and write
|
||
1859C131000
|
heap
|
page read and write
|
||
21D2E386000
|
heap
|
page read and write
|
||
224C8B73000
|
heap
|
page read and write
|
||
24D4E6B0000
|
heap
|
page read and write
|
||
7FFD9431C000
|
unkown
|
page read and write
|
||
202B9770000
|
unkown
|
page read and write
|
||
1859C2F4000
|
heap
|
page read and write
|
||
6620758000
|
unkown
|
page read and write
|
||
224C8EC2000
|
heap
|
page read and write
|
||
143433B7000
|
unkown
|
page read and write
|
||
1859EAEB000
|
heap
|
page read and write
|
||
143F9933000
|
heap
|
page read and write
|
||
202BB696000
|
unkown
|
page read and write
|
||
224C98ED000
|
heap
|
page read and write
|
||
224C9AB8000
|
heap
|
page read and write
|
||
224C9A8F000
|
heap
|
page read and write
|
||
7FFD94279000
|
unkown
|
page read and write
|
||
1859C0E0000
|
heap
|
page read and write
|
||
22134A1F000
|
heap
|
page read and write
|
||
23ED4830000
|
unkown
|
page read and write
|
||
145B9D40000
|
heap
|
page read and write
|
||
7FF612331000
|
unkown
|
page execute and write copy
|
||
7FFD947C1000
|
unkown
|
page execute read
|
||
7FF748309000
|
unkown
|
page execute and write copy
|
||
224C9A8F000
|
heap
|
page read and write
|
||
22134AD0000
|
trusted library allocation
|
page read and write
|
||
7FF794793000
|
unkown
|
page execute and read and write
|
||
22134AC0000
|
trusted library allocation
|
page read and write
|
||
A010BFE000
|
stack
|
page read and write
|
||
224C9D88000
|
direct allocation
|
page read and write
|
||
224C9A89000
|
heap
|
page read and write
|
||
29C2D3EF000
|
heap
|
page read and write
|
||
7FF66DCE7000
|
unkown
|
page execute and read and write
|
||
7FF613A16000
|
unkown
|
page execute and write copy
|
||
D78B5FF000
|
stack
|
page read and write
|
||
23ED27A0000
|
heap
|
page read and write
|
||
7FFD33CF0000
|
trusted library allocation
|
page read and write
|
||
224C9DE8000
|
direct allocation
|
page read and write
|
||
1859C251000
|
heap
|
page read and write
|
||
224C9979000
|
heap
|
page read and write
|
||
29C45DA0000
|
trusted library allocation
|
page read and write
|
||
22145103000
|
trusted library allocation
|
page read and write
|
||
202B9680000
|
unkown
|
page readonly
|
||
21D34C33000
|
heap
|
page read and write
|
||
29C2CFF0000
|
trusted library allocation
|
page read and write
|
||
22135720000
|
trusted library allocation
|
page read and write
|
||
145BBCC5000
|
heap
|
page read and write
|
||
7FF66D800000
|
unkown
|
page readonly
|
||
224C9A9B000
|
heap
|
page read and write
|
||
4F1AFFE000
|
stack
|
page read and write
|
||
143436EC000
|
unkown
|
page read and write
|
||
224C8E9B000
|
heap
|
page read and write
|
||
143436AB000
|
unkown
|
page read and write
|
||
2214D130000
|
trusted library allocation
|
page read and write
|
||
7FFD942EA000
|
unkown
|
page readonly
|
||
27573FE000
|
stack
|
page read and write
|
||
21D2DBD0000
|
heap
|
page read and write
|
||
224C9911000
|
heap
|
page read and write
|
||
224C8F2A000
|
heap
|
page read and write
|
||
224C9AB8000
|
heap
|
page read and write
|
||
7FFD94336000
|
unkown
|
page read and write
|
||
224C9E44000
|
direct allocation
|
page read and write
|
||
7FF612B0F000
|
unkown
|
page read and write
|
||
7FFD9423B000
|
unkown
|
page write copy
|
||
14341640000
|
heap
|
page read and write
|
||
224C8E7B000
|
heap
|
page read and write
|
||
7FFD94082000
|
unkown
|
page readonly
|
||
7FFD94282000
|
unkown
|
page write copy
|
||
29C2D0B3000
|
trusted library allocation
|
page read and write
|
||
224C9DB4000
|
direct allocation
|
page read and write
|
||
1859C8EF000
|
heap
|
page read and write
|
||
7FFD94298000
|
unkown
|
page write copy
|
||
7FF612330000
|
unkown
|
page readonly
|
||
14342F60000
|
unkown
|
page readonly
|
||
7FF612E8E000
|
unkown
|
page execute and read and write
|
||
21D2DDF0000
|
heap
|
page read and write
|
||
224C991B000
|
heap
|
page read and write
|
||
1859C473000
|
direct allocation
|
page execute and read and write
|
||
7FFD33D50000
|
trusted library allocation
|
page execute and read and write
|
||
1C777D00000
|
heap
|
page read and write
|
||
224C8F08000
|
heap
|
page read and write
|
||
224C8B95000
|
heap
|
page read and write
|
||
224C9A83000
|
heap
|
page read and write
|
||
224C9A14000
|
heap
|
page read and write
|
||
7FF612922000
|
unkown
|
page execute and write copy
|
||
22145107000
|
trusted library allocation
|
page read and write
|
||
1862ED1E000
|
heap
|
page read and write
|
||
224C99C4000
|
heap
|
page read and write
|
||
21D2E3CC000
|
heap
|
page read and write
|
||
24D4EB53000
|
heap
|
page read and write
|
||
1859C030000
|
heap
|
page read and write
|
||
143F7C70000
|
heap
|
page read and write
|
||
224C998A000
|
heap
|
page read and write
|
||
7FF66D802000
|
unkown
|
page execute read
|
||
7FF79427A000
|
unkown
|
page execute and write copy
|
||
1862ED1A000
|
heap
|
page read and write
|
||
224C8F07000
|
heap
|
page read and write
|
||
1862ED15000
|
heap
|
page read and write
|
||
224C8EC4000
|
heap
|
page read and write
|
||
224C8E9A000
|
heap
|
page read and write
|
||
1859A360000
|
heap
|
page read and write
|
||
29C2B528000
|
heap
|
page read and write
|
||
4F19FFC000
|
stack
|
page read and write
|
||
23ED29A0000
|
heap
|
page read and write
|
||
22135724000
|
trusted library allocation
|
page read and write
|
||
22135713000
|
trusted library allocation
|
page read and write
|
||
22145109000
|
trusted library allocation
|
page read and write
|
||
7FFD33C5D000
|
trusted library allocation
|
page execute and read and write
|
||
224C8E04000
|
heap
|
page read and write
|
||
22132B40000
|
heap
|
page read and write
|
||
1862ED12000
|
heap
|
page read and write
|
||
1862ED15000
|
heap
|
page read and write
|
||
224C99C1000
|
heap
|
page read and write
|
||
7FFD33DE0000
|
trusted library allocation
|
page read and write
|
||
D9BE5F6000
|
stack
|
page read and write
|
||
1C8787C000
|
unkown
|
page read and write
|
||
224C8E83000
|
heap
|
page read and write
|
||
7FFDA416D000
|
unkown
|
page readonly
|
||
1D49F570000
|
heap
|
page read and write
|
||
24D4EB7F000
|
heap
|
page read and write
|
||
1859C000000
|
direct allocation
|
page execute and read and write
|
||
7FFD94239000
|
unkown
|
page read and write
|
||
23ED46F4000
|
unkown
|
page read and write
|
||
1859C139000
|
heap
|
page read and write
|
||
1862ED2A000
|
heap
|
page read and write
|
||
221349B7000
|
heap
|
page read and write
|
||
7FF794667000
|
unkown
|
page execute and read and write
|
||
29C2DB85000
|
heap
|
page read and write
|
||
7FF79428D000
|
unkown
|
page read and write
|
||
24D4EBF2000
|
heap
|
page read and write
|
||
3E1EFFC000
|
unkown
|
page read and write
|
||
1859A330000
|
heap
|
page read and write
|
||
4F18BFE000
|
stack
|
page read and write
|
||
24D4CA30000
|
heap
|
page read and write
|
||
3E1EEFE000
|
unkown
|
page read and write
|
||
1C777B62000
|
heap
|
page read and write
|
||
24D55825000
|
heap
|
page read and write
|
||
224C998D000
|
heap
|
page read and write
|
||
24D4E550000
|
heap
|
page read and write
|
||
21D2DF05000
|
heap
|
page read and write
|
||
21D2DBE0000
|
direct allocation
|
page execute and read and write
|
||
224C9AB9000
|
heap
|
page read and write
|
||
7FF79429C000
|
unkown
|
page read and write
|
||
224C99C2000
|
heap
|
page read and write
|
||
7FFDB24B0000
|
direct allocation
|
page execute and read and write
|
||
7FF66D808000
|
unkown
|
page execute and read and write
|
||
D9BFDFE000
|
stack
|
page read and write
|
||
7FF612AFD000
|
unkown
|
page read and write
|
||
1C777D20000
|
heap
|
page read and write
|
||
6620A7E000
|
unkown
|
page readonly
|
||
221347F0000
|
unclassified section
|
page read and write
|
||
1862ED26000
|
heap
|
page read and write
|
||
7FFD940FB000
|
unkown
|
page readonly
|
||
7FF66E383000
|
unkown
|
page execute and read and write
|
||
7FF66D808000
|
unkown
|
page execute and read and write
|
||
4F1A3FC000
|
stack
|
page read and write
|
||
7FFD33D16000
|
trusted library allocation
|
page execute and read and write
|
||
29C2E39A000
|
trusted library allocation
|
page read and write
|
||
202BB1D0000
|
unkown
|
page read and write
|
||
24D54E25000
|
heap
|
page read and write
|
||
23ED41E0000
|
heap
|
page read and write
|
||
202BB770000
|
unkown
|
page read and write
|
||
23ED2770000
|
unkown
|
page readonly
|
||
23ED48F4000
|
unkown
|
page read and write
|
||
21D2BE50000
|
heap
|
page read and write
|
||
22134B90000
|
heap
|
page read and write
|
||
7FFDA3778000
|
unkown
|
page readonly
|
||
202BB6E0000
|
unkown
|
page read and write
|
||
1862ED28000
|
heap
|
page read and write
|
||
22134B50000
|
trusted library allocation
|
page read and write
|
||
D9BF5FE000
|
stack
|
page read and write
|
||
27577FF000
|
stack
|
page read and write
|
||
1859C152000
|
heap
|
page read and write
|
||
7FF66DB91000
|
unkown
|
page execute and read and write
|
||
21D2FC33000
|
heap
|
page read and write
|
||
A00D7FE000
|
stack
|
page read and write
|
||
224C9942000
|
heap
|
page read and write
|
||
7FF66DB7D000
|
unkown
|
page execute and read and write
|
||
24D4F425000
|
heap
|
page read and write
|
||
224C7030000
|
heap
|
page read and write
|
||
7FF794667000
|
unkown
|
page execute and read and write
|
||
145BB880000
|
direct allocation
|
page execute read
|
||
22135729000
|
trusted library allocation
|
page read and write
|
||
1859BD60000
|
heap
|
page read and write
|
||
7FF7473B1000
|
unkown
|
page execute and write copy
|
||
1C87588000
|
unkown
|
page read and write
|
||
145BB7F0000
|
heap
|
page read and write
|
||
2213497D000
|
heap
|
page read and write
|
||
7FF612922000
|
unkown
|
page read and write
|
||
224C8EA1000
|
heap
|
page read and write
|
||
23ED2780000
|
heap
|
page read and write
|
||
29C2E395000
|
trusted library allocation
|
page read and write
|
||
202BB200000
|
unkown
|
page readonly
|
||
7FF612D9C000
|
unkown
|
page read and write
|
||
21D34233000
|
heap
|
page read and write
|
||
7FF612E5E000
|
unkown
|
page execute and write copy
|
||
3E1EABE000
|
stack
|
page read and write
|
||
7FF613A19000
|
unkown
|
page execute and write copy
|
||
7FF794251000
|
unkown
|
page execute and write copy
|
||
7FF425B20000
|
direct allocation
|
page execute and read and write
|
||
224C9922000
|
heap
|
page read and write
|
||
21D2DD60000
|
heap
|
page read and write
|
||
224C9AAE000
|
heap
|
page read and write
|
||
24D51C25000
|
heap
|
page read and write
|
||
7FFD33C42000
|
trusted library allocation
|
page read and write
|
||
7FFD94237000
|
unkown
|
page write copy
|
||
224C8EDD000
|
heap
|
page read and write
|
||
7FF794290000
|
unkown
|
page read and write
|
||
24D4E6A0000
|
heap
|
page read and write
|
||
1859C421000
|
direct allocation
|
page execute and read and write
|
||
D9579F6000
|
stack
|
page read and write
|
||
7FF66D800000
|
unkown
|
page readonly
|
||
224C8E7D000
|
heap
|
page read and write
|
||
24D4E961000
|
heap
|
page read and write
|
||
224C8F0D000
|
heap
|
page read and write
|
||
224C8E88000
|
heap
|
page read and write
|
||
224C8EFD000
|
heap
|
page read and write
|
||
7FF66D806000
|
unkown
|
page execute and write copy
|
||
7FFD94296000
|
unkown
|
page read and write
|
||
224C9AAE000
|
heap
|
page read and write
|
||
A0103FF000
|
stack
|
page read and write
|
||
22134AE0000
|
trusted library allocation
|
page read and write
|
||
1862ED19000
|
heap
|
page read and write
|
||
224C9A21000
|
heap
|
page read and write
|
||
D7885F9000
|
stack
|
page read and write
|
||
1859C183000
|
heap
|
page read and write
|
||
22134515000
|
heap
|
page read and write
|
||
2755FF9000
|
stack
|
page read and write
|
||
7FFD33D60000
|
trusted library allocation
|
page execute and read and write
|
||
22134660000
|
heap
|
page read and write
|
||
7FFD33C33000
|
trusted library allocation
|
page execute and read and write
|
||
1862ED1D000
|
heap
|
page read and write
|
||
4F16FF9000
|
stack
|
page read and write
|
||
1862ED2A000
|
heap
|
page read and write
|
||
24D53025000
|
heap
|
page read and write
|
||
202B97F0000
|
heap
|
page read and write
|
||
7FF612E1E000
|
unkown
|
page execute and write copy
|
||
224C8E86000
|
heap
|
page read and write
|
||
22134540000
|
heap
|
page read and write
|
||
202B97C1000
|
unkown
|
page readonly
|
||
1859CCEB000
|
heap
|
page read and write
|
||
224C98EF000
|
heap
|
page read and write
|
||
A00DBFE000
|
stack
|
page read and write
|
||
2213493C000
|
heap
|
page read and write
|
||
224C8E9C000
|
heap
|
page read and write
|
||
C7803FE000
|
stack
|
page read and write
|
||
7FF66E383000
|
unkown
|
page execute and read and write
|
||
22135720000
|
trusted library allocation
|
page read and write
|
||
24D4E8A0000
|
heap
|
page read and write
|
||
24D50825000
|
heap
|
page read and write
|
||
1859C0A2000
|
heap
|
page read and write
|
||
22135101000
|
trusted library allocation
|
page read and write
|
||
224C9E6C000
|
direct allocation
|
page read and write
|
||
202BB89C000
|
unkown
|
page read and write
|
||
7FFD9425E000
|
unkown
|
page write copy
|
||
D9C11FD000
|
stack
|
page read and write
|
||
143F9984000
|
heap
|
page read and write
|
||
14342EF0000
|
unkown
|
page readonly
|
||
21D35633000
|
heap
|
page read and write
|
||
224C9987000
|
heap
|
page read and write
|
||
202BB896000
|
unkown
|
page read and write
|
||
224C9938000
|
heap
|
page read and write
|
||
24D4F02E000
|
heap
|
page read and write
|
||
224C8F21000
|
heap
|
page read and write
|
||
143F9BE0000
|
heap
|
page read and write
|
||
7FF746C21000
|
unkown
|
page execute and write copy
|
||
143436C3000
|
unkown
|
page read and write
|
||
7FF794B62000
|
unkown
|
page execute and read and write
|
||
29C2D37C000
|
heap
|
page read and write
|
||
24D4E610000
|
heap
|
page read and write
|
||
2214D482000
|
heap
|
page read and write
|
||
21D2F233000
|
heap
|
page read and write
|
||
1859C2B3000
|
heap
|
page read and write
|
||
1C777B40000
|
heap
|
page read and write
|
||
143F7B50000
|
heap
|
page read and write
|
||
22134600000
|
heap
|
page read and write
|
||
21D2E342000
|
heap
|
page read and write
|
||
221348D1000
|
heap
|
page read and write
|
||
29C2D320000
|
heap
|
page read and write
|
||
7FFD33C34000
|
trusted library allocation
|
page read and write
|
||
3E1ED71000
|
unkown
|
page read and write
|
||
1862ED15000
|
heap
|
page read and write
|
||
1D49F760000
|
heap
|
page read and write
|
||
66209FC000
|
unkown
|
page read and write
|
||
23ED4892000
|
unkown
|
page read and write
|
||
7FFD9429F000
|
unkown
|
page read and write
|
||
29C2D418000
|
heap
|
page read and write
|
||
7FF4ACA70000
|
trusted library allocation
|
page execute and read and write
|
||
14341648000
|
heap
|
page read and write
|
||
7FF61374E000
|
unkown
|
page execute and read and write
|
||
224C8EA6000
|
heap
|
page read and write
|
||
7FFD9426F000
|
unkown
|
page write copy
|
||
24D4EB37000
|
heap
|
page read and write
|
||
7FFDB24B0000
|
direct allocation
|
page execute and read and write
|
||
7FFD94284000
|
unkown
|
page write copy
|
||
7FFD94295000
|
unkown
|
page write copy
|
||
224C99B6000
|
heap
|
page read and write
|
||
C7FF7BE000
|
stack
|
page read and write
|
||
224C8D6D000
|
heap
|
page read and write
|
||
24D51225000
|
heap
|
page read and write
|
||
143F9810000
|
heap
|
page read and write
|
||
29C2E392000
|
trusted library allocation
|
page read and write
|
||
224C9E08000
|
direct allocation
|
page read and write
|
||
202BB18E000
|
unkown
|
page read and write
|
||
7FF613A19000
|
unkown
|
page execute and write copy
|
||
1C777B4B000
|
heap
|
page read and write
|
||
2213571F000
|
trusted library allocation
|
page read and write
|
||
7FFD33CF0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF66D806000
|
unkown
|
page execute and write copy
|
||
145BB870000
|
heap
|
page read and write
|
||
224C9A85000
|
heap
|
page read and write
|
||
224C8E96000
|
heap
|
page read and write
|
||
221349A1000
|
heap
|
page read and write
|
||
143F9673000
|
heap
|
page read and write
|
||
22134800000
|
unclassified section
|
page read and write
|
||
202BB85B000
|
unkown
|
page read and write
|
||
224C99FC000
|
heap
|
page read and write
|
||
145BBA20000
|
heap
|
page read and write
|
||
7FFD33D00000
|
trusted library allocation
|
page execute and read and write
|
||
224C9E0C000
|
direct allocation
|
page read and write
|
||
7FFD33CE0000
|
trusted library allocation
|
page read and write
|
||
224C8ED3000
|
heap
|
page read and write
|
||
1862ED1B000
|
heap
|
page read and write
|
||
7FF66DB7D000
|
unkown
|
page execute and read and write
|
||
D9C31FC000
|
stack
|
page read and write
|
||
1862ED26000
|
heap
|
page read and write
|
||
7FFD33C6D000
|
trusted library allocation
|
page execute and read and write
|
||
224C8ECF000
|
heap
|
page read and write
|
||
224C90A8000
|
direct allocation
|
page read and write
|
||
1C777AF0000
|
heap
|
page read and write
|
||
29C2E385000
|
trusted library allocation
|
page read and write
|
||
1D49F5D0000
|
heap
|
page read and write
|
||
1D49F5D5000
|
heap
|
page read and write
|
||
24D4EB84000
|
heap
|
page read and write
|
||
224C9A8F000
|
heap
|
page read and write
|
||
29C462E0000
|
heap
|
page execute and read and write
|
||
2213572A000
|
trusted library allocation
|
page read and write
|
||
7FFDA4331000
|
unkown
|
page execute read
|
||
224C9A04000
|
heap
|
page read and write
|
||
17ADD9F000
|
stack
|
page read and write
|
||
7FFD33C8C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF7942B4000
|
unkown
|
page execute and read and write
|
||
7FF612AC1000
|
unkown
|
page execute and write copy
|
||
7FF79463D000
|
unkown
|
page execute and read and write
|
||
21D2DC80000
|
heap
|
page read and write
|
||
D956E8F000
|
stack
|
page read and write
|
||
202BD6D0000
|
unkown
|
page read and write
|
||
7FF7942A1000
|
unkown
|
page readonly
|
||
143436A6000
|
unkown
|
page read and write
|
||
29C2D0F0000
|
trusted library allocation
|
page read and write
|
||
7FF613A19000
|
unkown
|
page execute and write copy
|
||
7FFD94274000
|
unkown
|
page read and write
|
||
224C8EB6000
|
heap
|
page read and write
|
||
224C98E9000
|
heap
|
page read and write
|
||
D9BDAEE000
|
stack
|
page read and write
|
||
D9591FE000
|
stack
|
page read and write
|
||
143F98A0000
|
heap
|
page read and write
|
||
7FF794E24000
|
unkown
|
page execute and read and write
|
||
2213571D000
|
trusted library allocation
|
page read and write
|
||
7FF794639000
|
unkown
|
page execute and read and write
|
||
224C9AAE000
|
heap
|
page read and write
|
||
1C87582000
|
unkown
|
page read and write
|
||
1C777CF0000
|
heap
|
page read and write
|
||
2213570D000
|
trusted library allocation
|
page read and write
|
||
1D49F692000
|
heap
|
page read and write
|
||
224C8F07000
|
heap
|
page read and write
|
||
224C99FF000
|
heap
|
page read and write
|
||
7FF748306000
|
unkown
|
page execute and write copy
|
||
1862ED1D000
|
heap
|
page read and write
|
||
224C9DE4000
|
direct allocation
|
page read and write
|
||
29C2E32B000
|
trusted library allocation
|
page read and write
|
||
7DF433E10000
|
direct allocation
|
page execute and read and write
|
||
143F96D0000
|
heap
|
page read and write
|
||
24D4EB99000
|
heap
|
page read and write
|
||
224C8EA3000
|
heap
|
page read and write
|
||
1859C0B0000
|
heap
|
page read and write
|
||
224C99E4000
|
heap
|
page read and write
|
||
7FF747745000
|
unkown
|
page execute and write copy
|
||
29C2D0A0000
|
trusted library allocation
|
page read and write
|
||
1C87B7E000
|
unkown
|
page read and write
|
||
1862ED1E000
|
heap
|
page read and write
|
||
29C2D010000
|
heap
|
page read and write
|
||
1862ED15000
|
heap
|
page read and write
|
||
1862ED26000
|
heap
|
page read and write
|
||
1862ED26000
|
heap
|
page read and write
|
||
7FFD94259000
|
unkown
|
page write copy
|
||
7FFD94291000
|
unkown
|
page write copy
|
||
7FFD94280000
|
unkown
|
page write copy
|
||
1859C0EA000
|
heap
|
page read and write
|
||
D788DFF000
|
stack
|
page read and write
|
||
1859C129000
|
heap
|
page read and write
|
||
7FF794690000
|
unkown
|
page execute and read and write
|
||
224C8AD0000
|
direct allocation
|
page read and write
|
||
7FF79429C000
|
unkown
|
page read and write
|
||
22134670000
|
heap
|
page read and write
|
||
143436E8000
|
unkown
|
page read and write
|
||
7FFDA3761000
|
unkown
|
page execute read
|
||
29C2D690000
|
heap
|
page read and write
|
||
7FFDA4346000
|
unkown
|
page read and write
|
||
23ED4916000
|
unkown
|
page read and write
|
||
221349B5000
|
heap
|
page read and write
|
||
1C7779F0000
|
heap
|
page read and write
|
||
224C9940000
|
heap
|
page read and write
|
||
14343622000
|
unkown
|
page read and write
|
||
1859F4EB000
|
heap
|
page read and write
|
||
1C87AFE000
|
unkown
|
page readonly
|
||
7FF7942A1000
|
unkown
|
page execute and write copy
|
||
224C9A9B000
|
heap
|
page read and write
|
||
224C99A3000
|
heap
|
page read and write
|
||
14343664000
|
unkown
|
page read and write
|
||
202BB814000
|
unkown
|
page read and write
|
||
14343484000
|
unkown
|
page read and write
|
||
224C9A24000
|
heap
|
page read and write
|
||
224C998E000
|
heap
|
page read and write
|
||
7FF794E24000
|
unkown
|
page execute and write copy
|
||
224C8EBD000
|
heap
|
page read and write
|
||
22132B4C000
|
heap
|
page read and write
|
||
145BB920000
|
heap
|
page read and write
|
||
143F7CB0000
|
heap
|
page read and write
|
||
7FFD948A9000
|
unkown
|
page read and write
|
||
14342F10000
|
unkown
|
page read and write
|
||
7FF794E24000
|
unkown
|
page execute and read and write
|
||
224C99E7000
|
heap
|
page read and write
|
||
224C9A4A000
|
heap
|
page read and write
|
||
224C9DF0000
|
direct allocation
|
page read and write
|
||
202BD5C0000
|
unkown
|
page readonly
|
||
29C2E39C000
|
trusted library allocation
|
page read and write
|
||
7FFD9431B000
|
unkown
|
page write copy
|
||
224C9E4C000
|
direct allocation
|
page read and write
|
||
29C2B460000
|
heap
|
page read and write
|
||
7FFD34590000
|
direct allocation
|
page execute and read and write
|
||
21D2DEC4000
|
heap
|
page read and write
|
||
21D33833000
|
heap
|
page read and write
|
||
1C777CF5000
|
heap
|
page read and write
|
||
24D4EBD9000
|
heap
|
page read and write
|
||
C7FFF7F000
|
stack
|
page read and write
|
||
224C997A000
|
heap
|
page read and write
|
||
7FF612AC1000
|
unkown
|
page execute and write copy
|
||
7FFD33C5D000
|
trusted library allocation
|
page execute and read and write
|
||
1859C431000
|
direct allocation
|
page execute and read and write
|
||
224C998E000
|
heap
|
page read and write
|
||
22134810000
|
heap
|
page read and write
|
||
224C99F5000
|
heap
|
page read and write
|
||
29C2CFD0000
|
unclassified section
|
page read and write
|
||
224C9A6C000
|
heap
|
page read and write
|
||
221349A9000
|
heap
|
page read and write
|
||
1859BEA0000
|
heap
|
page read and write
|
||
7FFD948AC000
|
unkown
|
page readonly
|
||
7FFD94281000
|
unkown
|
page read and write
|
||
21D2DD70000
|
heap
|
page read and write
|
||
24D4CAE9000
|
heap
|
page read and write
|
||
224C9AAE000
|
heap
|
page read and write
|
||
1D49F490000
|
heap
|
page read and write
|
||
4F173FE000
|
stack
|
page read and write
|
||
224C9A8F000
|
heap
|
page read and write
|
||
143F7C30000
|
heap
|
page readonly
|
||
1C87A7B000
|
unkown
|
page read and write
|
||
7FFD9427D000
|
unkown
|
page read and write
|
||
224C8F0F000
|
heap
|
page read and write
|
||
29C2D105000
|
heap
|
page read and write
|
||
224C7060000
|
heap
|
page read and write
|
||
202BB856000
|
unkown
|
page read and write
|
||
D7891FF000
|
stack
|
page read and write
|
||
7FFD33DD0000
|
trusted library allocation
|
page read and write
|
||
22134790000
|
heap
|
page read and write
|
||
7FF66D802000
|
unkown
|
page execute read
|
||
224C99C1000
|
heap
|
page read and write
|
||
1862ED2E000
|
heap
|
page read and write
|
||
224C8F06000
|
heap
|
page read and write
|
||
1859C463000
|
direct allocation
|
page execute and read and write
|
||
A00F7FC000
|
stack
|
page read and write
|
||
17AE17F000
|
stack
|
page read and write
|
||
2213570B000
|
trusted library allocation
|
page read and write
|
||
224C9AAE000
|
heap
|
page read and write
|
||
21D2DF39000
|
heap
|
page read and write
|
||
224C9A86000
|
heap
|
page read and write
|
||
7FFDA4172000
|
unkown
|
page readonly
|
||
202BB74A000
|
unkown
|
page read and write
|
||
7FFDA4330000
|
unkown
|
page readonly
|
||
7FF66DBE4000
|
unkown
|
page execute and read and write
|
||
D9BDB2E000
|
stack
|
page read and write
|
||
202BB764000
|
unkown
|
page read and write
|
||
202BB834000
|
unkown
|
page read and write
|
||
22134AF0000
|
trusted library allocation
|
page read and write
|
||
7FF425A70000
|
trusted library allocation
|
page execute and read and write
|
||
23ED4630000
|
unkown
|
page read and write
|
||
1862ED1E000
|
heap
|
page read and write
|
||
224C9A48000
|
heap
|
page read and write
|
||
224C8ECA000
|
heap
|
page read and write
|
||
1859C040000
|
direct allocation
|
page execute and read and write
|
||
224C99D5000
|
heap
|
page read and write
|
||
7FFDA3760000
|
unkown
|
page readonly
|
||
29C3DD79000
|
trusted library allocation
|
page read and write
|
||
21D2E331000
|
heap
|
page read and write
|
||
24D4F020000
|
heap
|
page read and write
|
||
224C8F26000
|
heap
|
page read and write
|
||
143F9974000
|
heap
|
page read and write
|
||
224C8F01000
|
heap
|
page read and write
|
||
29C2D2B0000
|
heap
|
page execute and read and write
|
||
1862ED19000
|
heap
|
page read and write
|
||
224C9E48000
|
direct allocation
|
page read and write
|
||
1859C1B0000
|
heap
|
page read and write
|
||
7FFD33C4D000
|
trusted library allocation
|
page execute and read and write
|
||
24D4EBF2000
|
heap
|
page read and write
|
||
29C2E3A2000
|
trusted library allocation
|
page read and write
|
||
29C2D311000
|
heap
|
page read and write
|
||
1859C129000
|
heap
|
page read and write
|
||
224C997F000
|
heap
|
page read and write
|
||
1C8797E000
|
unkown
|
page read and write
|
||
7FFD33C43000
|
trusted library allocation
|
page execute and read and write
|
||
7FF612330000
|
unkown
|
page readonly
|
||
224C98EB000
|
heap
|
page read and write
|
||
224C8F1D000
|
heap
|
page read and write
|
||
24D4E7F0000
|
direct allocation
|
page execute and read and write
|
||
224C99A2000
|
heap
|
page read and write
|
||
22134830000
|
heap
|
page read and write
|
||
143F9820000
|
heap
|
page read and write
|
||
1859C8E0000
|
heap
|
page read and write
|
||
224C9DE0000
|
direct allocation
|
page read and write
|
||
2756FFE000
|
stack
|
page read and write
|
||
14343422000
|
unkown
|
page read and write
|
||
21D2DA20000
|
heap
|
page read and write
|
||
224C9A21000
|
heap
|
page read and write
|
||
7F91AFF000
|
unkown
|
page read and write
|
||
7FF66DBBB000
|
unkown
|
page execute and read and write
|
||
224C99B1000
|
heap
|
page read and write
|
||
29C2D0B0000
|
trusted library allocation
|
page read and write
|
||
7FF612E55000
|
unkown
|
page execute and write copy
|
||
1862ED19000
|
heap
|
page read and write
|
||
A00FBFF000
|
stack
|
page read and write
|
||
7FFD93D80000
|
unkown
|
page readonly
|
||
1C87586000
|
unkown
|
page read and write
|
||
1859C0F9000
|
heap
|
page read and write
|
||
29C2D0D0000
|
trusted library allocation
|
page read and write
|
||
224C9A63000
|
heap
|
page read and write
|
||
7FFD94271000
|
unkown
|
page read and write
|
||
D956ECE000
|
stack
|
page read and write
|
||
1859C139000
|
heap
|
page read and write
|
||
221349E2000
|
heap
|
page read and write
|
||
7FF66E0BD000
|
unkown
|
page execute and read and write
|
||
21D2E833000
|
heap
|
page read and write
|
||
29C3DD77000
|
trusted library allocation
|
page read and write
|
||
224C8EC5000
|
heap
|
page read and write
|
||
224C9A7F000
|
heap
|
page read and write
|
||
7FFD947C0000
|
unkown
|
page readonly
|
||
145BBB70000
|
heap
|
page read and write
|
||
1862ED24000
|
heap
|
page read and write
|
||
24D4EBD9000
|
heap
|
page read and write
|
||
145BB830000
|
heap
|
page read and write
|
||
1859C139000
|
heap
|
page read and write
|
||
7FF66E383000
|
unkown
|
page execute and write copy
|
||
662097E000
|
unkown
|
page readonly
|
||
3E1ED6B000
|
unkown
|
page read and write
|
||
29C2B450000
|
heap
|
page read and write
|
||
7FFD94103000
|
unkown
|
page readonly
|
||
21D2BE58000
|
heap
|
page read and write
|
||
224C8ED4000
|
heap
|
page read and write
|
||
224C99E4000
|
heap
|
page read and write
|
||
7FF612933000
|
unkown
|
page execute and write copy
|
||
4F1ABFF000
|
stack
|
page read and write
|
||
4F1B3FF000
|
stack
|
page read and write
|
||
21D2D8C0000
|
heap
|
page read and write
|
||
7FFD33C50000
|
trusted library allocation
|
page read and write
|
||
7FFDA377C000
|
unkown
|
page readonly
|
||
21D2DB30000
|
heap
|
page read and write
|
||
7FFDA4160000
|
unkown
|
page readonly
|
||
D78BDFF000
|
stack
|
page read and write
|
||
29C2D41D000
|
heap
|
page read and write
|
||
A00E3FE000
|
stack
|
page read and write
|
||
2213571F000
|
trusted library allocation
|
page read and write
|
||
224C9E5C000
|
direct allocation
|
page read and write
|
||
143F7CB8000
|
heap
|
page read and write
|
||
7FFD9427C000
|
unkown
|
page write copy
|
||
224C9A8F000
|
heap
|
page read and write
|
||
29C2E394000
|
trusted library allocation
|
page read and write
|
||
7FFD33D26000
|
trusted library allocation
|
page execute and read and write
|
||
143432C0000
|
unkown
|
page read and write
|
||
1862ED1F000
|
heap
|
page read and write
|
||
D789DFE000
|
stack
|
page read and write
|
||
224C99B6000
|
heap
|
page read and write
|
||
21D2E381000
|
heap
|
page read and write
|
||
224C98F1000
|
heap
|
page read and write
|
||
7FF499F00000
|
direct allocation
|
page execute and read and write
|
||
7FFD94871000
|
unkown
|
page readonly
|
||
27567FF000
|
stack
|
page read and write
|
||
224C8E88000
|
heap
|
page read and write
|
||
7FFD94268000
|
unkown
|
page write copy
|
||
7FF66E380000
|
unkown
|
page execute and read and write
|
||
21D32E33000
|
heap
|
page read and write
|
||
29C2D3ED000
|
heap
|
page read and write
|
||
7FF7942B2000
|
unkown
|
page execute and write copy
|
||
7FFD9428C000
|
unkown
|
page write copy
|
||
D95CDFC000
|
stack
|
page read and write
|
||
224C8EBD000
|
heap
|
page read and write
|
||
143415E0000
|
unkown
|
page read and write
|
||
1434359A000
|
unkown
|
page read and write
|
||
224C99B1000
|
heap
|
page read and write
|
||
24D4EC50000
|
heap
|
page read and write
|
||
224C9AB8000
|
heap
|
page read and write
|
||
224C9979000
|
heap
|
page read and write
|
||
7FF613217000
|
unkown
|
page execute and read and write
|
||
7FF612E55000
|
unkown
|
page readonly
|
||
224C99D4000
|
heap
|
page read and write
|
||
2756BFE000
|
stack
|
page read and write
|
||
224C9E68000
|
direct allocation
|
page read and write
|
||
7FFD94337000
|
unkown
|
page readonly
|
||
7FFD94261000
|
unkown
|
page read and write
|
||
1859C163000
|
heap
|
page read and write
|
||
202B9790000
|
heap
|
page read and write
|
||
D78ADFE000
|
stack
|
page read and write
|
||
24D4E9C3000
|
heap
|
page read and write
|
||
1862ED2B000
|
heap
|
page read and write
|
||
224C9A22000
|
heap
|
page read and write
|
||
21D2E38C000
|
heap
|
page read and write
|
||
D9C39FB000
|
stack
|
page read and write
|
||
145BBDD0000
|
heap
|
page read and write
|
||
29C2B500000
|
heap
|
page read and write
|
||
7DF46E1D0000
|
direct allocation
|
page execute and read and write
|
||
224C8EC3000
|
heap
|
page read and write
|
||
7FF612E21000
|
unkown
|
page read and write
|
||
224C9922000
|
heap
|
page read and write
|
||
A0107FE000
|
stack
|
page read and write
|
||
7FF612E5E000
|
unkown
|
page execute and write copy
|
||
7FF66DB91000
|
unkown
|
page execute and read and write
|
||
7FFD940D6000
|
unkown
|
page readonly
|
||
1859C510000
|
heap
|
page read and write
|
||
145BBDB1000
|
heap
|
page read and write
|
||
224C9E34000
|
direct allocation
|
page read and write
|
||
21D2DF76000
|
heap
|
page read and write
|
||
7FF612E55000
|
unkown
|
page execute and write copy
|
||
1862ED19000
|
heap
|
page read and write
|
||
224C99C1000
|
heap
|
page read and write
|
||
7FFD94198000
|
unkown
|
page read and write
|
||
143F98D1000
|
heap
|
page read and write
|
||
143434E6000
|
unkown
|
page read and write
|
||
7FFD9426A000
|
unkown
|
page write copy
|
||
1859E0EB000
|
heap
|
page read and write
|
||
21D2BE10000
|
heap
|
page read and write
|
||
D78B1FE000
|
stack
|
page read and write
|
||
224C8F0E000
|
heap
|
page read and write
|
||
4F187FE000
|
stack
|
page read and write
|
||
7FF746C20000
|
unkown
|
page readonly
|
||
7FFD33C9C000
|
trusted library allocation
|
page execute and read and write
|
||
224C8E87000
|
heap
|
page read and write
|
||
202B97A0000
|
unkown
|
page read and write
|
||
202B9690000
|
heap
|
page read and write
|
||
224C98E0000
|
heap
|
page read and write
|
||
7FFD9427F000
|
unkown
|
page read and write
|
||
224C9989000
|
heap
|
page read and write
|
||
24D56225000
|
heap
|
page read and write
|
||
24D4EBD9000
|
heap
|
page read and write
|
||
7FFD9427E000
|
unkown
|
page write copy
|
||
A00EFFF000
|
stack
|
page read and write
|
||
2757BFE000
|
stack
|
page read and write
|
||
1C8758A000
|
unkown
|
page read and write
|
||
7FFD94283000
|
unkown
|
page read and write
|
||
D7899FE000
|
stack
|
page read and write
|
||
23ED47A0000
|
unkown
|
page read and write
|
||
224C8E88000
|
heap
|
page read and write
|
||
1862ED15000
|
heap
|
page read and write
|
||
202BB76A000
|
unkown
|
page read and write
|
||
24D4EB42000
|
heap
|
page read and write
|
||
24D4E8B0000
|
heap
|
page read and write
|
||
224C8EBD000
|
heap
|
page read and write
|
||
7FF79427A000
|
unkown
|
page readonly
|
||
224C9A22000
|
heap
|
page read and write
|
||
21D2DE21000
|
heap
|
page read and write
|
||
7FF7942B3000
|
unkown
|
page execute and write copy
|
||
202BB570000
|
unkown
|
page read and write
|
||
224C9979000
|
heap
|
page read and write
|
||
1859C452000
|
direct allocation
|
page execute and read and write
|
||
224C9020000
|
direct allocation
|
page read and write
|
||
1859C033000
|
heap
|
page read and write
|
||
23ED48D4000
|
unkown
|
page read and write
|
||
1862ED2A000
|
heap
|
page read and write
|
||
224C8F0D000
|
heap
|
page read and write
|
||
224C99EA000
|
heap
|
page read and write
|
||
7FF66D808000
|
unkown
|
page execute and write copy
|
||
24D4EB7F000
|
heap
|
page read and write
|
||
143F7C40000
|
heap
|
page read and write
|
||
224C993F000
|
heap
|
page read and write
|
||
7FF794250000
|
unkown
|
page readonly
|
||
7FF79428D000
|
unkown
|
page execute and write copy
|
||
224C8F1B000
|
heap
|
page read and write
|
||
224C8B70000
|
heap
|
page read and write
|
||
7FFD9425B000
|
unkown
|
page read and write
|
||
224C8EF8000
|
heap
|
page read and write
|
||
224C9E50000
|
direct allocation
|
page read and write
|
||
22134A15000
|
heap
|
page read and write
|
||
224C8EC1000
|
heap
|
page read and write
|
||
2213571D000
|
trusted library allocation
|
page read and write
|
||
202B97E0000
|
unkown
|
page read and write
|
||
7FF794250000
|
unkown
|
page readonly
|
||
224C99B6000
|
heap
|
page read and write
|
||
145BBC84000
|
heap
|
page read and write
|
||
A00F3FD000
|
stack
|
page read and write
|
||
21D2D920000
|
heap
|
page read and write
|
||
29C2D030000
|
heap
|
page read and write
|
||
7FF794251000
|
unkown
|
page execute and write copy
|
||
145B9D10000
|
heap
|
page read and write
|
||
224C9986000
|
heap
|
page read and write
|
||
1859C173000
|
heap
|
page read and write
|
||
22134C25000
|
heap
|
page read and write
|
||
221348E0000
|
heap
|
page read and write
|
||
1859C0E4000
|
heap
|
page read and write
|
||
145BBED0000
|
heap
|
page read and write
|
||
7FF61336B000
|
unkown
|
page execute and read and write
|
||
143415B0000
|
unkown
|
page read and write
|
||
224C9AAE000
|
heap
|
page read and write
|
||
22134520000
|
heap
|
page read and write
|
||
21D32433000
|
heap
|
page read and write
|
||
202B97F8000
|
heap
|
page read and write
|
||
224C98F0000
|
heap
|
page read and write
|
||
23ED27A8000
|
heap
|
page read and write
|
||
7FF794690000
|
unkown
|
page execute and read and write
|
||
224C8E86000
|
heap
|
page read and write
|
||
7FF794793000
|
unkown
|
page execute and read and write
|
||
224C991A000
|
heap
|
page read and write
|
||
143F7CC2000
|
heap
|
page read and write
|
||
1C8777E000
|
unkown
|
page read and write
|
||
7FF794629000
|
unkown
|
page execute and read and write
|
||
14342F73000
|
heap
|
page read and write
|
||
7FF7942A1000
|
unkown
|
page execute and write copy
|
||
D959DFE000
|
stack
|
page read and write
|
||
7FF66E380000
|
unkown
|
page execute and write copy
|
||
143433C0000
|
unkown
|
page read and write
|
||
224C9D54000
|
direct allocation
|
page read and write
|
||
224C9A9B000
|
heap
|
page read and write
|
||
7FFD94278000
|
unkown
|
page write copy
|
||
7FFD93D81000
|
unkown
|
page execute read
|
||
1859BE20000
|
heap
|
page read and write
|
||
29C3DD71000
|
trusted library allocation
|
page read and write
|
There are 1193 hidden memdumps, click here to show them.