IOC Report
MXpl6HFisn.exe

loading gif

Files

File Path
Type
Category
Malicious
MXpl6HFisn.exe
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\Users\Public\Libraries\(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\gC7STejDE3WmjzylxWa3QT6.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
malicious
C:\Users\user\AppData\Local\Temp\adobe3S903DOZntEK\Cookies\Chrome_Default.txt
ASCII text, with very long lines (769), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\adobe3S903DOZntEK\History\Firefox_fqs92o4p.default-release.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\adobe3S903DOZntEK\information.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\adobe3S903DOZntEK\passwords.txt
Unicode text, UTF-8 text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\adobe3S903DOZntEK\screenshot.png
PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\heidi3S903DOZntEK\02zdBXl47cvzcookies.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\heidi3S903DOZntEK\3b6N2Xdh3CYwplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidi3S903DOZntEK\5tU4KAXUt9OSHistory
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidi3S903DOZntEK\6wUviFtkLbmKHistory
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidi3S903DOZntEK\D87fZN3R3jFeplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidi3S903DOZntEK\E7Z56Nq_1sMBWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\heidi3S903DOZntEK\K_00k_T5Oq4gLogin Data For Account
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidi3S903DOZntEK\PJtnoOjdEp4lWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidi3S903DOZntEK\QJXLTeG3O9FPCookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\Users\user\AppData\Local\Temp\heidi3S903DOZntEK\TEtREnT7JaI7Login Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidi3S903DOZntEK\_yZ506nUxjW4Web Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\heidi3S903DOZntEK\dQLVfhd8fARCWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidi3S903DOZntEK\hnCoccud199lHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\heidi3S903DOZntEK\iESNtbPBNR52Login Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidi3S903DOZntEK\jAjfxjmkXEluHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\heidi3S903DOZntEK\jKXEuRSxIEMXWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\heidi3S903DOZntEK\jMRljO8o4ModWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
There are 15 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\MXpl6HFisn.exe
"C:\Users\user\Desktop\MXpl6HFisn.exe"
malicious
C:\Users\Public\Libraries\(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe
"C:\Users\Public\Libraries\(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe"
malicious
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
malicious
C:\Users\Public\Libraries\(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe
"C:\Users\Public\Libraries\(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe"
malicious
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
malicious
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
malicious

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
unknown
https://ipinfo.io:443/widget/demo/102.165.48.43:
unknown
https://duckduckgo.com/ac/?q=
unknown
https://db-ip.com/demo/home.php?s=102.165.48.43
104.26.5.15
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://ipinfo.io/O
unknown
https://t.me/risepro_botrisep
unknown
https://ipinfo.io/R
unknown
https://db-ip.com/
unknown
https://ipinfo.io/widget/demo/102.165.48.43o
unknown
https://t.p
unknown
https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://golang.org/doc/faq#nil_errortls:
unknown
https://ipinfo.io:443/widget/demo/102.165.48.43P$
unknown
https://db-ip.com/s
unknown
https://t.me/RiseProSUPPORT
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://db-ip.com/-
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://db-ip.com:443/demo/home.php?s=102.165.48.43
unknown
https://www.ecosia.org/newtab/
unknown
https://ipinfo.io/Mozilla/5.0
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://t.me/risepro_bot
unknown
https://t.V
unknown
https://ipinfo.io/
unknown
https://t.me/RiseProSUPPORTR
unknown
https://t.me/risepro_botbackup
unknown
https://www.maxmind.com/en/locate-my-ip-address
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://ipinfo.io/s
unknown
https://ipinfo.io/t
unknown
https://ipinfo.io/widget/demo/102.165.48.43
34.117.186.192
http://www.winimage.com/zLibDll
unknown
https://ipinfo.io:443/widget/demo/102.165.48.43
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://t.me/risepro_bott
unknown
https://t.me/risepro_botisepro_botc
unknown
There are 32 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ipinfo.io
34.117.186.192
db-ip.com
104.26.5.15

IPs

IP
Domain
Country
Malicious
95.216.41.236
unknown
Germany
malicious
34.117.186.192
ipinfo.io
United States
104.26.5.15
db-ip.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
5203000
heap
page read and write
malicious
4F00000
heap
page read and write
malicious
C003FB2000
direct allocation
page read and write
4F5E000
heap
page read and write
7FF7B86AA000
unkown
page readonly
C00006B000
direct allocation
page read and write
C0016DD000
direct allocation
page read and write
4F44000
heap
page read and write
7FF7B86DD000
unkown
page readonly
C0005CE000
direct allocation
page read and write
50C4000
direct allocation
page execute and read and write
C000315000
direct allocation
page read and write
C0040FB000
direct allocation
page read and write
4F67000
heap
page read and write
C000301000
direct allocation
page read and write
277316B4000
direct allocation
page read and write
C000112000
direct allocation
page read and write
23CE7866000
direct allocation
page read and write
C0002B9000
direct allocation
page read and write
C0016F6000
direct allocation
page read and write
C000010000
direct allocation
page read and write
C003FB9000
direct allocation
page read and write
1E67D950000
direct allocation
page read and write
C000331000
direct allocation
page read and write
7FF7B86F9000
unkown
page readonly
C0040AD000
direct allocation
page read and write
320F000
heap
page read and write
5100000
trusted library allocation
page read and write
27F0000
heap
page read and write
7FF7B8714000
unkown
page readonly
C000124000
direct allocation
page read and write
C000178000
direct allocation
page read and write
C0001B4000
direct allocation
page read and write
C000504000
direct allocation
page read and write
27776B40000
direct allocation
page read and write
C000470000
direct allocation
page read and write
C001E3E000
direct allocation
page read and write
4FBE000
heap
page read and write
C002D1F000
direct allocation
page read and write
5100000
trusted library allocation
page read and write
C003FFA000
direct allocation
page read and write
C003FE3000
direct allocation
page read and write
C000092000
direct allocation
page read and write
7FF7B8D91000
unkown
page write copy
2C8E000
heap
page read and write
7FF7B86AF000
unkown
page readonly
1E658476000
heap
page read and write
C000458000
direct allocation
page read and write
887C7FF000
stack
page read and write
4F78000
heap
page read and write
4F7D000
heap
page read and write
C0000D2000
direct allocation
page read and write
7FF6A6B5E000
unkown
page read and write
545F000
stack
page read and write
C000488000
direct allocation
page read and write
C0001D7000
direct allocation
page read and write
C0001C9000
direct allocation
page read and write
C002BD6000
direct allocation
page read and write
C00169E000
direct allocation
page read and write
4F6F000
heap
page read and write
C002D14000
direct allocation
page read and write
C004147000
direct allocation
page read and write
C0016B8000
direct allocation
page read and write
7FF6A5780000
unkown
page readonly
2E7C000
stack
page read and write
C0001FF000
direct allocation
page read and write
4F64000
heap
page read and write
C0001B8000
direct allocation
page read and write
C002D35000
direct allocation
page read and write
C00180F000
direct allocation
page read and write
7FF7B8735000
unkown
page readonly
7FF7B805A000
unkown
page readonly
54257FE000
stack
page read and write
7FF7B8D95000
unkown
page write copy
C00038F000
direct allocation
page read and write
7FF7B86AF000
unkown
page readonly
C000030000
direct allocation
page read and write
C000524000
direct allocation
page read and write
C000301000
direct allocation
page read and write
C000448000
direct allocation
page read and write
277316BD000
direct allocation
page read and write
7FF7B805A000
unkown
page readonly
C0003D3000
direct allocation
page read and write
C003FE4000
direct allocation
page read and write
4F10000
heap
page read and write
C003FD6000
direct allocation
page read and write
C0004D0000
direct allocation
page read and write
2A8E000
stack
page read and write
C000289000
direct allocation
page read and write
C0002F1000
direct allocation
page read and write
30F0000
heap
page read and write
C003F67000
direct allocation
page read and write
C00028B000
direct allocation
page read and write
2BC3000
heap
page read and write
27731A10000
heap
page read and write
7FF7B8DA8000
unkown
page readonly
C00042C000
direct allocation
page read and write
4F76000
heap
page read and write
7FF7B8718000
unkown
page readonly
4F3C000
heap
page read and write
C000275000
direct allocation
page read and write
C0003EC000
direct allocation
page read and write
7FF7B8718000
unkown
page readonly
4FC2000
heap
page read and write
C000086000
direct allocation
page read and write
C003FCF000
direct allocation
page read and write
C002C97000
direct allocation
page read and write
2E0E000
stack
page read and write
4820000
remote allocation
page read and write
C000800000
direct allocation
page read and write
C001CF8000
direct allocation
page read and write
4F4E000
heap
page read and write
C0001ED000
direct allocation
page read and write
7FF7B86B7000
unkown
page readonly
23CC22E8000
heap
page read and write
1E658644000
direct allocation
page read and write
C00036B000
direct allocation
page read and write
2BF1000
heap
page read and write
C000509000
direct allocation
page read and write
4FCA000
heap
page read and write
7FF6A6517000
unkown
page readonly
C0001F5000
direct allocation
page read and write
C000628000
direct allocation
page read and write
C0001C9000
direct allocation
page read and write
7FF7B86C6000
unkown
page readonly
C002BE7000
direct allocation
page read and write
C0004CE000
direct allocation
page read and write
4F67000
heap
page read and write
7FF6A6BF1000
unkown
page read and write
4F64000
heap
page read and write
32A1000
heap
page read and write
C001666000
direct allocation
page read and write
5000000
trusted library allocation
page read and write
C00017E000
direct allocation
page read and write
2C29000
heap
page read and write
C000106000
direct allocation
page read and write
C000112000
direct allocation
page read and write
C0004A8000
direct allocation
page read and write
C0002A7000
direct allocation
page read and write
C0017C7000
direct allocation
page read and write
7FF7B7FF4000
unkown
page write copy
5100000
trusted library allocation
page read and write
C0004A3000
direct allocation
page read and write
4F76000
heap
page read and write
317E000
stack
page read and write
C000096000
direct allocation
page read and write
2C76000
heap
page read and write
23CE7890000
direct allocation
page read and write
1E658470000
heap
page read and write
7FF7B8702000
unkown
page readonly
7FF7B8D8C000
unkown
page read and write
C00411C000
direct allocation
page read and write
7FF7B7FED000
unkown
page write copy
C002BF3000
direct allocation
page read and write
277316B8000
direct allocation
page read and write
329B000
heap
page read and write
C0005EE000
direct allocation
page read and write
C00026D000
direct allocation
page read and write
1E658640000
direct allocation
page read and write
C00037C000
direct allocation
page read and write
C000043000
direct allocation
page read and write
23CE77D1000
direct allocation
page read and write
552B000
heap
page read and write
54F3000
heap
page read and write
7FF7B867B000
unkown
page readonly
887B9FE000
stack
page read and write
C0016C7000
direct allocation
page read and write
7FF7B7921000
unkown
page execute read
C00006D000
direct allocation
page read and write
C0026F0000
direct allocation
page read and write
C003FD4000
direct allocation
page read and write
C003FBD000
direct allocation
page read and write
7FF6A6538000
unkown
page readonly
7FF6A657C000
unkown
page readonly
C0001C9000
direct allocation
page read and write
C00055B000
direct allocation
page read and write
4F6E000
heap
page read and write
C0002D9000
direct allocation
page read and write
2C84000
heap
page read and write
C00010A000
direct allocation
page read and write
C000616000
direct allocation
page read and write
27776CA0000
direct allocation
page read and write
2773172F000
heap
page read and write
7FF6A5E93000
unkown
page write copy
4F62000
heap
page read and write
C000221000
direct allocation
page read and write
C0016A5000
direct allocation
page read and write
7FF6A655E000
unkown
page readonly
C003FC4000
direct allocation
page read and write
C00181F000
direct allocation
page read and write
272B000
stack
page read and write
1E67D955000
direct allocation
page read and write
4770000
remote allocation
page read and write
4F80000
heap
page read and write
C0002B6000
direct allocation
page read and write
31A0000
remote allocation
page read and write
C002D3D000
direct allocation
page read and write
C0000B2000
direct allocation
page read and write
C000514000
direct allocation
page read and write
C002CFF000
direct allocation
page read and write
C001691000
direct allocation
page read and write
7FF7B8D95000
unkown
page write copy
54BA000
heap
page read and write
3229000
heap
page read and write
1E6587A5000
heap
page read and write
C0001A6000
direct allocation
page read and write
47BD000
stack
page read and write
2C72000
heap
page read and write
C0017B6000
direct allocation
page read and write
7FF7B86C0000
unkown
page readonly
2C14000
heap
page read and write
C00045C000
direct allocation
page read and write
3242000
heap
page read and write
4F63000
heap
page read and write
4F7B000
heap
page read and write
C00030F000
direct allocation
page read and write
C000048000
direct allocation
page read and write
C003FA4000
direct allocation
page read and write
4F76000
heap
page read and write
C0016CB000
direct allocation
page read and write
7FF7B8D8C000
unkown
page read and write
C000096000
direct allocation
page read and write
4F82000
heap
page read and write
C0005B0000
direct allocation
page read and write
C002C22000
direct allocation
page read and write
4F22000
heap
page read and write
C002814000
direct allocation
page read and write
4F8F000
heap
page read and write
C0000CC000
direct allocation
page read and write
4F1B000
heap
page read and write
C003354000
direct allocation
page read and write
C00070E000
direct allocation
page read and write
C0016B7000
direct allocation
page read and write
C0005EA000
direct allocation
page read and write
C00044A000
direct allocation
page read and write
7FF7B805A000
unkown
page readonly
C0002A5000
direct allocation
page read and write
C0017B1000
direct allocation
page read and write
7FF6A6562000
unkown
page readonly
C00163B000
direct allocation
page read and write
C00009A000
direct allocation
page read and write
306E000
stack
page read and write
C002D06000
direct allocation
page read and write
C00009C000
direct allocation
page read and write
C00023A000
direct allocation
page read and write
C0005B6000
direct allocation
page read and write
C003FCB000
direct allocation
page read and write
C000530000
direct allocation
page read and write
C002598000
direct allocation
page read and write
C000400000
direct allocation
page read and write
7FF6A655E000
unkown
page readonly
C000295000
direct allocation
page read and write
C00033D000
direct allocation
page read and write
4F6F000
heap
page read and write
7FF6A5E92000
unkown
page read and write
4F67000
heap
page read and write
C001678000
direct allocation
page read and write
C00050B000
direct allocation
page read and write
C0002A1000
direct allocation
page read and write
7FF7B86ED000
unkown
page readonly
C00011A000
direct allocation
page read and write
C0002A9000
direct allocation
page read and write
C000485000
direct allocation
page read and write
7FF6A6559000
unkown
page readonly
7FF7B7920000
unkown
page readonly
C0003E6000
direct allocation
page read and write
2C7D000
heap
page read and write
C0005F6000
direct allocation
page read and write
4F3D000
heap
page read and write
C0016CF000
direct allocation
page read and write
C002CFB000
direct allocation
page read and write
C003FBF000
direct allocation
page read and write
4F4E000
heap
page read and write
C0004A7000
direct allocation
page read and write
C0005E4000
direct allocation
page read and write
C000014000
direct allocation
page read and write
4F45000
heap
page read and write
C00049C000
direct allocation
page read and write
C002D31000
direct allocation
page read and write
C00005F000
direct allocation
page read and write
C000480000
direct allocation
page read and write
7FF6A6BF2000
unkown
page write copy
C000062000
direct allocation
page read and write
4F3C000
heap
page read and write
4F76000
heap
page read and write
2C34000
heap
page read and write
7FF7B8707000
unkown
page readonly
C000622000
direct allocation
page read and write
C0001EB000
direct allocation
page read and write
C00002C000
direct allocation
page read and write
7FF6A5E56000
unkown
page write copy
C0002C9000
direct allocation
page read and write
C0016F7000
direct allocation
page read and write
C00414F000
direct allocation
page read and write
3211000
heap
page read and write
2B0E000
stack
page read and write
3242000
heap
page read and write
27776B51000
direct allocation
page read and write
C000292000
direct allocation
page read and write
1E67D9E9000
direct allocation
page read and write
C000106000
direct allocation
page read and write
C000128000
direct allocation
page read and write
7FF7B8CFE000
unkown
page read and write
C00030D000
direct allocation
page read and write
4F62000
heap
page read and write
7FF7B867B000
unkown
page readonly
C003FC6000
direct allocation
page read and write
C00046A000
direct allocation
page read and write
2B96000
heap
page read and write
49ED000
stack
page read and write
7FF7B86C0000
unkown
page readonly
4F8B000
heap
page read and write
4F2D000
heap
page read and write
7FF7B871C000
unkown
page readonly
C000004000
direct allocation
page read and write
C0005F2000
direct allocation
page read and write
4F7D000
heap
page read and write
7FF7B7FED000
unkown
page write copy
54259FE000
stack
page read and write
5100000
trusted library allocation
page read and write
C000600000
direct allocation
page read and write
7FF7B8748000
unkown
page readonly
C0000D0000
direct allocation
page read and write
54B9000
heap
page read and write
31B7000
heap
page read and write
C00006F000
direct allocation
page read and write
7FF7B86C6000
unkown
page readonly
C0003B4000
direct allocation
page read and write
7FF7B871C000
unkown
page readonly
7FF7B867B000
unkown
page readonly
C001809000
direct allocation
page read and write
2BC3000
heap
page read and write
C0002B7000
direct allocation
page read and write
27776B8E000
direct allocation
page read and write
C0001FF000
direct allocation
page read and write
7FF7B8D91000
unkown
page read and write
7FF7B8CFE000
unkown
page read and write
C0016AA000
direct allocation
page read and write
23CE78A0000
direct allocation
page read and write
23CE7850000
direct allocation
page read and write
4F37000
heap
page read and write
C002CE2000
direct allocation
page read and write
C004153000
direct allocation
page read and write
27B0000
heap
page read and write
C000038000
direct allocation
page read and write
7FF7B8058000
unkown
page read and write
C004117000
direct allocation
page read and write
C0002EE000
direct allocation
page read and write
C000376000
direct allocation
page read and write
C003FDC000
direct allocation
page read and write
C00320E000
direct allocation
page read and write
4F9F000
heap
page read and write
C000084000
direct allocation
page read and write
7FF6A6C08000
unkown
page readonly
7FF7B86E9000
unkown
page readonly
4F9E000
heap
page read and write
C000474000
direct allocation
page read and write
C00043A000
direct allocation
page read and write
C00052E000
direct allocation
page read and write
7FF6A654D000
unkown
page readonly
4F86000
heap
page read and write
7FF7B7FF5000
unkown
page read and write
C004122000
direct allocation
page read and write
C004023000
direct allocation
page read and write
7FF7B871F000
unkown
page readonly
C00023D000
direct allocation
page read and write
1E658440000
heap
page read and write
4F80000
heap
page read and write
4F50000
heap
page read and write
7FF7B870C000
unkown
page readonly
887BBFF000
stack
page read and write
C000112000
direct allocation
page read and write
2C8B000
heap
page read and write
23CE7C70000
direct allocation
page read and write
2BF9000
heap
page read and write
1E67DEE6000
direct allocation
page read and write
C003FDD000
direct allocation
page read and write
4F7D000
heap
page read and write
4F7C000
heap
page read and write
27731680000
heap
page read and write
C0005D6000
direct allocation
page read and write
C000303000
direct allocation
page read and write
C00042A000
direct allocation
page read and write
27731710000
direct allocation
page read and write
C002400000
direct allocation
page read and write
C00414B000
direct allocation
page read and write
54261FF000
stack
page read and write
7FF6A6553000
unkown
page readonly
C0001D7000
direct allocation
page read and write
C002D2A000
direct allocation
page read and write
C000618000
direct allocation
page read and write
C003F55000
direct allocation
page read and write
4F45000
heap
page read and write
C0002BF000
direct allocation
page read and write
4F6B000
heap
page read and write
C00003E000
direct allocation
page read and write
4D5D000
stack
page read and write
7FF7B86F7000
unkown
page readonly
C0000D2000
direct allocation
page read and write
3206000
heap
page read and write
C0016C9000
direct allocation
page read and write
60C000
stack
page read and write
50D0000
direct allocation
page execute and read and write
4F61000
heap
page read and write
1E67DDB0000
direct allocation
page read and write
C00028D000
direct allocation
page read and write
5100000
trusted library allocation
page read and write
4820000
remote allocation
page read and write
7FF7B804A000
unkown
page write copy
7FF7B871F000
unkown
page readonly
C0001D1000
direct allocation
page read and write
4770000
remote allocation
page read and write
C002B4E000
direct allocation
page read and write
23CE77DD000
direct allocation
page read and write
C002BF7000
direct allocation
page read and write
C00014A000
direct allocation
page read and write
C000458000
direct allocation
page read and write
C0002AC000
direct allocation
page read and write
C000368000
direct allocation
page read and write
3E739FE000
stack
page read and write
271E000
stack
page read and write
C000153000
direct allocation
page read and write
7FF7B8034000
unkown
page read and write
2C8D000
heap
page read and write
C00039E000
direct allocation
page read and write
C000353000
direct allocation
page read and write
C001681000
direct allocation
page read and write
C00003A000
direct allocation
page read and write
C0016D5000
direct allocation
page read and write
C001806000
direct allocation
page read and write
5425BFE000
stack
page read and write
7FF7B86E2000
unkown
page readonly
4FCA000
heap
page read and write
C003F97000
direct allocation
page read and write
C000446000
direct allocation
page read and write
C003FEF000
direct allocation
page read and write
C0002A3000
direct allocation
page read and write
27776B8B000
direct allocation
page read and write
C002BCE000
direct allocation
page read and write
C00038D000
direct allocation
page read and write
2C28000
heap
page read and write
4F7B000
heap
page read and write
7FF7B804E000
unkown
page read and write
54255FD000
stack
page read and write
5050000
direct allocation
page execute and read and write
7FF7B8033000
unkown
page write copy
23CE77D5000
direct allocation
page read and write
C00004F000
direct allocation
page read and write
4F4E000
heap
page read and write
C00044A000
direct allocation
page read and write
7FF7B86D8000
unkown
page readonly
23CE77F7000
direct allocation
page read and write
55D8000
heap
page read and write
C0004B8000
direct allocation
page read and write
3E735FE000
stack
page read and write
7FF7B86E2000
unkown
page readonly
C000088000
direct allocation
page read and write
476D000
stack
page read and write
23CE7829000
direct allocation
page read and write
7FF7B804E000
unkown
page read and write
C0001A8000
direct allocation
page read and write
C00048A000
direct allocation
page read and write
326C000
heap
page read and write
4F6C000
heap
page read and write
1E67D8B0000
direct allocation
page read and write
C0001F5000
direct allocation
page read and write
23CE77EE000
direct allocation
page read and write
7FF7B8702000
unkown
page readonly
C00050E000
direct allocation
page read and write
C002BC6000
direct allocation
page read and write
C000136000
direct allocation
page read and write
2C81000
heap
page read and write
7FF7B8DA8000
unkown
page readonly
506F000
stack
page read and write
4876000
heap
page read and write
C000321000
direct allocation
page read and write
2BD0000
heap
page read and write
C0001F3000
direct allocation
page read and write
C00169A000
direct allocation
page read and write
C0003B8000
direct allocation
page read and write
27731650000
heap
page read and write
7FF6A650A000
unkown
page readonly
2B48000
heap
page read and write
C000504000
direct allocation
page read and write
C000100000
direct allocation
page read and write
4F6E000
heap
page read and write
C002BEB000
direct allocation
page read and write
C0002B2000
direct allocation
page read and write
C000308000
direct allocation
page read and write
C0003B0000
direct allocation
page read and write
C002CE5000
direct allocation
page read and write
C000253000
direct allocation
page read and write
7FF7B7FF9000
unkown
page read and write
C000140000
direct allocation
page read and write
277316B0000
direct allocation
page read and write
7FF7B8D87000
unkown
page read and write
2C8D000
heap
page read and write
2B40000
heap
page read and write
4F64000
heap
page read and write
533C000
stack
page read and write
C00014E000
direct allocation
page read and write
C00047E000
direct allocation
page read and write
C00181B000
direct allocation
page read and write
C000464000
direct allocation
page read and write
3E737FE000
stack
page read and write
C0002BD000
direct allocation
page read and write
C0004BA000
direct allocation
page read and write
C000476000
direct allocation
page read and write
4F45000
heap
page read and write
7FF7B7FED000
unkown
page read and write
4F45000
heap
page read and write
C0001A4000
direct allocation
page read and write
C000092000
direct allocation
page read and write
7FF6A5EAA000
unkown
page write copy
7FF7B7921000
unkown
page execute read
4F3B000
heap
page read and write
C0005FE000
direct allocation
page read and write
C00023F000
direct allocation
page read and write
C0017FB000
direct allocation
page read and write
C00034D000
direct allocation
page read and write
7FF7B86F7000
unkown
page readonly
C003F9C000
direct allocation
page read and write
23CC22E0000
heap
page read and write
C0017FE000
direct allocation
page read and write
C000500000
direct allocation
page read and write
C0005A8000
direct allocation
page read and write
4FBE000
heap
page read and write
2C81000
heap
page read and write
7FF7B8D92000
unkown
page write copy
52BC000
stack
page read and write
27776B20000
direct allocation
page read and write
7FF7B8702000
unkown
page readonly
4E9E000
stack
page read and write
887BFFE000
stack
page read and write
54263FF000
stack
page read and write
C000279000
direct allocation
page read and write
5100000
trusted library allocation
page read and write
C000365000
direct allocation
page read and write
4F4E000
heap
page read and write
C0017CF000
direct allocation
page read and write
1E658648000
direct allocation
page read and write
C0005AC000
direct allocation
page read and write
2C83000
heap
page read and write
7FF7B86F3000
unkown
page readonly
23CE7B30000
direct allocation
page read and write
C000249000
direct allocation
page read and write
1E67DA20000
direct allocation
page read and write
C0000C4000
direct allocation
page read and write
27776D70000
direct allocation
page read and write
C000400000
direct allocation
page read and write
4FAF000
heap
page read and write
4F88000
heap
page read and write
4F50000
heap
page read and write
1E67DB70000
direct allocation
page read and write
7FF7B8707000
unkown
page readonly
7FF6A6549000
unkown
page readonly
7FF6A5781000
unkown
page execute read
7FF6A6557000
unkown
page readonly
C00025B000
direct allocation
page read and write
C0016A6000
direct allocation
page read and write
7FF7B86B7000
unkown
page readonly
C003F92000
direct allocation
page read and write
C0002AF000
direct allocation
page read and write
7FF7B8D91000
unkown
page read and write
C00036C000
direct allocation
page read and write
7FF7B7FED000
unkown
page read and write
3070000
heap
page read and write
1E67D962000
direct allocation
page read and write
7FF7B8714000
unkown
page readonly
C0002A5000
direct allocation
page read and write
C00034B000
direct allocation
page read and write
C0004B2000
direct allocation
page read and write
C00412A000
direct allocation
page read and write
C0016E4000
direct allocation
page read and write
C004010000
direct allocation
page read and write
C000436000
direct allocation
page read and write
2B10000
heap
page read and write
C0000FE000
direct allocation
page read and write
3E73DFE000
stack
page read and write
7FF7B805A000
unkown
page readonly
C0002D5000
direct allocation
page read and write
4F67000
heap
page read and write
4F63000
heap
page read and write
2BAA000
heap
page read and write
C0002A5000
direct allocation
page read and write
7FF6A650A000
unkown
page readonly
C000448000
direct allocation
page read and write
C0001E1000
direct allocation
page read and write
2C84000
heap
page read and write
C00012A000
direct allocation
page read and write
2BDE000
heap
page read and write
7FF7B8735000
unkown
page readonly
2C31000
heap
page read and write
C00029D000
direct allocation
page read and write
C00047C000
direct allocation
page read and write
277763A0000
direct allocation
page read and write
2C7D000
heap
page read and write
C0001D9000
direct allocation
page read and write
C002BE8000
direct allocation
page read and write
2C84000
heap
page read and write
C000098000
direct allocation
page read and write
C0040EA000
direct allocation
page read and write
C000148000
direct allocation
page read and write
7FF7B8DA8000
unkown
page readonly
7FF6A6511000
unkown
page readonly
4F94000
heap
page read and write
4870000
heap
page read and write
C000452000
direct allocation
page read and write
C0016C3000
direct allocation
page read and write
C0000E2000
direct allocation
page read and write
C000062000
direct allocation
page read and write
4F60000
heap
page read and write
C000084000
direct allocation
page read and write
2BEF000
heap
page read and write
C000339000
direct allocation
page read and write
C0000F8000
direct allocation
page read and write
3E73FFE000
stack
page read and write
7FF6A6BEC000
unkown
page read and write
2AC0000
heap
page read and write
4D30000
heap
page read and write
C000614000
direct allocation
page read and write
4F76000
heap
page read and write
7FF7B867B000
unkown
page readonly
C000389000
direct allocation
page read and write
C003FAD000
direct allocation
page read and write
C00005F000
direct allocation
page read and write
7FF7B7FF5000
unkown
page read and write
4F76000
heap
page read and write
4F52000
heap
page read and write
4F8E000
heap
page read and write
4F45000
heap
page read and write
C000142000
direct allocation
page read and write
54265FE000
stack
page read and write
5425DFE000
stack
page read and write
C000241000
direct allocation
page read and write
7FF7B86D8000
unkown
page readonly
2C0E000
heap
page read and write
4F4E000
heap
page read and write
5207000
heap
page read and write
326C000
heap
page read and write
4F6E000
heap
page read and write
27731A15000
heap
page read and write
C000480000
direct allocation
page read and write
C000010000
direct allocation
page read and write
4F50000
heap
page read and write
4F5E000
heap
page read and write
2C84000
heap
page read and write
4F66000
heap
page read and write
C001698000
direct allocation
page read and write
2C8D000
heap
page read and write
C000386000
direct allocation
page read and write
C00015C000
direct allocation
page read and write
C00002C000
direct allocation
page read and write
5100000
trusted library allocation
page read and write
C004035000
direct allocation
page read and write
7FF6A6B79000
unkown
page read and write
C0001D9000
direct allocation
page read and write
C00027F000
direct allocation
page read and write
7FF6A650F000
unkown
page readonly
7FF7B86AA000
unkown
page readonly
C000309000
direct allocation
page read and write
4DFE000
stack
page read and write
C00037F000
direct allocation
page read and write
C0000BB000
direct allocation
page read and write
C0016C3000
direct allocation
page read and write
4F6A000
heap
page read and write
C003FD1000
direct allocation
page read and write
C000483000
direct allocation
page read and write
4F55000
heap
page read and write
4F5E000
heap
page read and write
C00049A000
direct allocation
page read and write
23CE79F0000
direct allocation
page read and write
C004168000
direct allocation
page read and write
C0000F8000
direct allocation
page read and write
C000428000
direct allocation
page read and write
7FF6A6C08000
unkown
page readonly
4F7F000
heap
page read and write
4F60000
heap
page read and write
C000602000
direct allocation
page read and write
C0040E2000
direct allocation
page read and write
7FF7B8718000
unkown
page readonly
C0002CB000
direct allocation
page read and write
C0004B4000
direct allocation
page read and write
23CE7DA6000
direct allocation
page read and write
C000624000
direct allocation
page read and write
7FF6A5EB1000
unkown
page write copy
C000102000
direct allocation
page read and write
4F45000
heap
page read and write
4F54000
heap
page read and write
C000080000
direct allocation
page read and write
7FF6A6562000
unkown
page readonly
4F4E000
heap
page read and write
C000340000
direct allocation
page read and write
C002BAE000
direct allocation
page read and write
C002D0C000
direct allocation
page read and write
4F76000
heap
page read and write
C00017F000
direct allocation
page read and write
7FF7B86ED000
unkown
page readonly
7FF7B86F3000
unkown
page readonly
7FF6A656C000
unkown
page readonly
3235000
heap
page read and write
4F9F000
heap
page read and write
C00043C000
direct allocation
page read and write
C0005E6000
direct allocation
page read and write
C000080000
direct allocation
page read and write
7FF6A6526000
unkown
page readonly
C000036000
direct allocation
page read and write
C00008E000
direct allocation
page read and write
4F45000
heap
page read and write
C00015C000
direct allocation
page read and write
5566000
heap
page read and write
7FF7B8735000
unkown
page readonly
C0016B0000
direct allocation
page read and write
C000168000
direct allocation
page read and write
C003FF3000
direct allocation
page read and write
C0002DF000
direct allocation
page read and write
C004135000
direct allocation
page read and write
7FF6A5EAE000
unkown
page read and write
C003FEF000
direct allocation
page read and write
23CC22D0000
heap
page read and write
C000084000
direct allocation
page read and write
C0000EA000
direct allocation
page read and write
7FF7B86B1000
unkown
page readonly
C0004D4000
direct allocation
page read and write
7FF6A6553000
unkown
page readonly
C0000BB000
direct allocation
page read and write
7FF7B86B1000
unkown
page readonly
C00005D000
direct allocation
page read and write
C000361000
direct allocation
page read and write
313D000
stack
page read and write
C000361000
direct allocation
page read and write
5100000
trusted library allocation
page read and write
C0001CD000
direct allocation
page read and write
4F6F000
heap
page read and write
C0000C2000
direct allocation
page read and write
C001781000
direct allocation
page read and write
C00044E000
direct allocation
page read and write
C001817000
direct allocation
page read and write
C0002CD000
direct allocation
page read and write
C00028B000
direct allocation
page read and write
7FF6A6578000
unkown
page readonly
7FF6A6578000
unkown
page readonly
31CF000
heap
page read and write
23CC2534000
direct allocation
page read and write
C000158000
direct allocation
page read and write
C0000EA000
direct allocation
page read and write
C0016BC000
direct allocation
page read and write
C001814000
direct allocation
page read and write
C000000000
direct allocation
page read and write
C000353000
direct allocation
page read and write
C0002FE000
direct allocation
page read and write
7FF6A5780000
unkown
page readonly
C00003A000
direct allocation
page read and write
7FF7B86C0000
unkown
page readonly
C0003F6000
direct allocation
page read and write
C001689000
direct allocation
page read and write
C00041A000
direct allocation
page read and write
1E67D8D0000
direct allocation
page read and write
C0000B6000
direct allocation
page read and write
23CC2310000
heap
page read and write
2C8C000
heap
page read and write
C000168000
direct allocation
page read and write
4FB3000
heap
page read and write
C000400000
direct allocation
page read and write
2B5E000
heap
page read and write
23CE6FF0000
direct allocation
page read and write
C0016A3000
direct allocation
page read and write
C004005000
direct allocation
page read and write
C0002BD000
direct allocation
page read and write
C002BE4000
direct allocation
page read and write
4F76000
heap
page read and write
2C8A000
heap
page read and write
23CC22E5000
heap
page read and write
C000438000
direct allocation
page read and write
2BF6000
heap
page read and write
C00019C000
direct allocation
page read and write
7FF7B7FF4000
unkown
page write copy
2F0E000
stack
page read and write
C000434000
direct allocation
page read and write
7FF7B8032000
unkown
page read and write
C00413B000
direct allocation
page read and write
C0002D1000
direct allocation
page read and write
C000502000
direct allocation
page read and write
5100000
trusted library allocation
page read and write
1E67D130000
direct allocation
page read and write
C0001E1000
direct allocation
page read and write
C002BCB000
direct allocation
page read and write
3208000
heap
page read and write
3211000
heap
page read and write
C000C00000
direct allocation
page read and write
23CC22F0000
heap
page read and write
7FF6A5E99000
unkown
page read and write
C003FE6000
direct allocation
page read and write
7FF6A6574000
unkown
page readonly
C000152000
direct allocation
page read and write
3235000
heap
page read and write
4F7C000
heap
page read and write
C000000000
direct allocation
page read and write
C000136000
direct allocation
page read and write
C000432000
direct allocation
page read and write
4E5C000
stack
page read and write
C003FEC000
direct allocation
page read and write
7FF6A653D000
unkown
page readonly
23CC2530000
direct allocation
page read and write
23CE78EF000
direct allocation
page read and write
4F35000
heap
page read and write
7FF7B86C0000
unkown
page readonly
7FF7B86FE000
unkown
page readonly
7FF7B8039000
unkown
page read and write
C0016A3000
direct allocation
page read and write
C000608000
direct allocation
page read and write
C00006B000
direct allocation
page read and write
7FF7B8748000
unkown
page readonly
32A1000
heap
page read and write
556A000
heap
page read and write
4F6E000
stack
page read and write
C000012000
direct allocation
page read and write
C0005F4000
direct allocation
page read and write
3E733FC000
stack
page read and write
4F6E000
heap
page read and write
7FF7B86AF000
unkown
page readonly
C0002E3000
direct allocation
page read and write
C0005C4000
direct allocation
page read and write
C003FFD000
direct allocation
page read and write
5110000
heap
page read and write
C00011D000
direct allocation
page read and write
497E000
stack
page read and write
C000004000
direct allocation
page read and write
C0002EB000
direct allocation
page read and write
C000283000
direct allocation
page read and write
7FF7B7FFA000
unkown
page write copy
2A4D000
stack
page read and write
2A00000
remote allocation
page execute and read and write
7FF6A6520000
unkown
page readonly
2BD0000
heap
page read and write
C0004AC000
direct allocation
page read and write
C000800000
direct allocation
page read and write
4F7D000
heap
page read and write
7FF7B86DD000
unkown
page readonly
C00044D000
direct allocation
page read and write
7FF6A6542000
unkown
page readonly
C00037F000
direct allocation
page read and write
26B0000
remote allocation
page execute and read and write
7FF7B86F7000
unkown
page readonly
7FF7B7FFA000
unkown
page write copy
7FF7B86C6000
unkown
page readonly
7FF6A654D000
unkown
page readonly
C000148000
direct allocation
page read and write
7FF7B86FE000
unkown
page readonly
4F3B000
heap
page read and write
C0005F8000
direct allocation
page read and write
C000444000
direct allocation
page read and write
C000100000
direct allocation
page read and write
357F000
stack
page read and write
4F54000
heap
page read and write
4F52000
heap
page read and write
4F79000
heap
page read and write
C00047A000
direct allocation
page read and write
C003F85000
direct allocation
page read and write
C000287000
direct allocation
page read and write
4F8F000
heap
page read and write
C003FD2000
direct allocation
page read and write
4F3D000
heap
page read and write
C000381000
direct allocation
page read and write
7FF6A5E94000
unkown
page read and write
C000604000
direct allocation
page read and write
23CE7842000
direct allocation
page read and write
C003F9B000
direct allocation
page read and write
C0004D6000
direct allocation
page read and write
1E6587A0000
heap
page read and write
4F2F000
heap
page read and write
C0001BC000
direct allocation
page read and write
5100000
trusted library allocation
page read and write
C0001D1000
direct allocation
page read and write
C00035D000
direct allocation
page read and write
C000058000
direct allocation
page read and write
C00006F000
direct allocation
page read and write
5481000
heap
page read and write
7FF7B871C000
unkown
page readonly
C000500000
direct allocation
page read and write
7FF6A6BF5000
unkown
page write copy
C000287000
direct allocation
page read and write
C000456000
direct allocation
page read and write
549E000
stack
page read and write
7FF7B8051000
unkown
page write copy
4F55000
heap
page read and write
C002C0D000
direct allocation
page read and write
5CC000
stack
page read and write
C002BFA000
direct allocation
page read and write
C000048000
direct allocation
page read and write
7FF7B86F7000
unkown
page readonly
7FF7B8D19000
unkown
page read and write
4F62000
heap
page read and write
7FF6A5EB8000
unkown
page read and write
C0006D4000
direct allocation
page read and write
C00168D000
direct allocation
page read and write
C00007A000
direct allocation
page read and write
C000492000
direct allocation
page read and write
1E65847C000
heap
page read and write
27776B6B000
direct allocation
page read and write
C0005C0000
direct allocation
page read and write
50F0000
heap
page read and write
3020000
heap
page read and write
4F4E000
heap
page read and write
C0005D4000
direct allocation
page read and write
7FF6A6595000
unkown
page readonly
3E743FE000
stack
page read and write
4F4E000
heap
page read and write
C002D25000
direct allocation
page read and write
7FF6A6559000
unkown
page readonly
4F3C000
heap
page read and write
7FF6A653D000
unkown
page readonly
5381000
heap
page read and write
C0003BC000
direct allocation
page read and write
7FF7B8714000
unkown
page readonly
C00183C000
direct allocation
page read and write
C000140000
direct allocation
page read and write
C0003F8000
direct allocation
page read and write
7FF6A5E54000
unkown
page write copy
7FF7B8D91000
unkown
page write copy
C0002A7000
direct allocation
page read and write
C0006B2000
direct allocation
page read and write
C0016CE000
direct allocation
page read and write
4F76000
heap
page read and write
5425FFF000
stack
page read and write
C000062000
direct allocation
page read and write
C00007C000
direct allocation
page read and write
C0016B1000
direct allocation
page read and write
23CE7770000
direct allocation
page read and write
C000006000
direct allocation
page read and write
4F54000
heap
page read and write
5203000
heap
page read and write
4F6F000
heap
page read and write
C00004A000
direct allocation
page read and write
4F77000
heap
page read and write
7FF7B7920000
unkown
page readonly
C0000D4000
direct allocation
page read and write
C000487000
direct allocation
page read and write
2BA8000
heap
page read and write
4F7B000
heap
page read and write
C0040DD000
direct allocation
page read and write
4F14000
heap
page read and write
C00049E000
direct allocation
page read and write
2C81000
heap
page read and write
2E3C000
stack
page read and write
C00007C000
direct allocation
page read and write
4F39000
heap
page read and write
4F82000
heap
page read and write
47FE000
stack
page read and write
7FF6A650F000
unkown
page readonly
C00038F000
direct allocation
page read and write
C003FCF000
direct allocation
page read and write
4F7B000
heap
page read and write
C00036F000
direct allocation
page read and write
27776B5B000
direct allocation
page read and write
C003FF7000
direct allocation
page read and write
C0004C0000
direct allocation
page read and write
329B000
heap
page read and write
C000319000
direct allocation
page read and write
7FF7B8D87000
unkown
page read and write
C0016BF000
direct allocation
page read and write
7FF7B86F3000
unkown
page readonly
5100000
heap
page read and write
1E658420000
heap
page read and write
4820000
remote allocation
page read and write
7FF7B7FF9000
unkown
page read and write
2C84000
heap
page read and write
C000345000
direct allocation
page read and write
7FF6A6549000
unkown
page readonly
C000279000
direct allocation
page read and write
7FF7B86AF000
unkown
page readonly
7FF7B8058000
unkown
page read and write
C0000FC000
direct allocation
page read and write
C001693000
direct allocation
page read and write
C004022000
direct allocation
page read and write
C0001F7000
direct allocation
page read and write
7FF7B8707000
unkown
page readonly
27776C60000
direct allocation
page read and write
C000168000
direct allocation
page read and write
C001677000
direct allocation
page read and write
7FF7B8034000
unkown
page read and write
C000074000
direct allocation
page read and write
4FBE000
heap
page read and write
C000299000
direct allocation
page read and write
4A7D000
stack
page read and write
30F5000
heap
page read and write
C0005BE000
direct allocation
page read and write
C0003A9000
direct allocation
page read and write
7FF6A5E5A000
unkown
page write copy
C0016C0000
direct allocation
page read and write
4F50000
heap
page read and write
C001688000
direct allocation
page read and write
4770000
remote allocation
page read and write
C0000C4000
direct allocation
page read and write
4F3C000
heap
page read and write
5100000
trusted library allocation
page read and write
C0025AA000
direct allocation
page read and write
4FCA000
heap
page read and write
2BDE000
heap
page read and write
56F9000
stack
page read and write
7FF7B8033000
unkown
page write copy
4F9F000
heap
page read and write
7FF7B8032000
unkown
page read and write
C0001F5000
direct allocation
page read and write
4F5E000
heap
page read and write
C0016A8000
direct allocation
page read and write
C003FE1000
direct allocation
page read and write
5101000
heap
page read and write
4F50000
heap
page read and write
C000339000
direct allocation
page read and write
2BF1000
heap
page read and write
4F67000
heap
page read and write
C0017E9000
direct allocation
page read and write
C0002EF000
direct allocation
page read and write
27776B28000
direct allocation
page read and write
4F45000
heap
page read and write
C00296C000
direct allocation
page read and write
C000454000
direct allocation
page read and write
C000098000
direct allocation
page read and write
7FF7B86E9000
unkown
page readonly
7FF6A6595000
unkown
page readonly
C000536000
direct allocation
page read and write
C000351000
direct allocation
page read and write
C000292000
direct allocation
page read and write
2A90000
heap
page read and write
C000283000
direct allocation
page read and write
7FF7B871C000
unkown
page readonly
C00005F000
direct allocation
page read and write
7FF7B86FE000
unkown
page readonly
23CE7880000
direct allocation
page read and write
4F88000
heap
page read and write
C000359000
direct allocation
page read and write
4F50000
heap
page read and write
2C8B000
heap
page read and write
7FF7B804A000
unkown
page write copy
4F9F000
heap
page read and write
7FF7B8036000
unkown
page write copy
4F2F000
stack
page read and write
7FF6A657F000
unkown
page readonly
C0017E5000
direct allocation
page read and write
C002CDD000
direct allocation
page read and write
7FF7B86FE000
unkown
page readonly
7FF6A5E55000
unkown
page read and write
C0000FC000
direct allocation
page read and write
C000069000
direct allocation
page read and write
C0003C6000
direct allocation
page read and write
C0004B1000
direct allocation
page read and write
C002D01000
direct allocation
page read and write
2A00000
heap
page read and write
C000253000
direct allocation
page read and write
4FCA000
heap
page read and write
C000032000
direct allocation
page read and write
C002CF6000
direct allocation
page read and write
3219000
heap
page read and write
5213000
heap
page read and write
C001827000
direct allocation
page read and write
C000430000
direct allocation
page read and write
C000273000
direct allocation
page read and write
C00006F000
direct allocation
page read and write
C0017F6000
direct allocation
page read and write
C000034000
direct allocation
page read and write
C00038B000
direct allocation
page read and write
1E67D97D000
direct allocation
page read and write
4F8E000
heap
page read and write
C002D65000
direct allocation
page read and write
C0017E0000
direct allocation
page read and write
C000058000
direct allocation
page read and write
C000064000
direct allocation
page read and write
4FBE000
heap
page read and write
7FF7B86D8000
unkown
page readonly
47E0000
heap
page read and write
C0004A0000
direct allocation
page read and write
C0016D1000
direct allocation
page read and write
4F3B000
heap
page read and write
C000426000
direct allocation
page read and write
C000152000
direct allocation
page read and write
C002CC7000
direct allocation
page read and write
2EA0000
remote allocation
page execute and read and write
C0001F7000
direct allocation
page read and write
27731660000
heap
page read and write
C0040F8000
direct allocation
page read and write
1E65864C000
direct allocation
page read and write
7FF7B8D19000
unkown
page read and write
7FF6A6567000
unkown
page readonly
C0000C6000
direct allocation
page read and write
4FAE000
heap
page read and write
548C000
heap
page read and write
C004115000
direct allocation
page read and write
C000104000
direct allocation
page read and write
4F3C000
heap
page read and write
C00003A000
direct allocation
page read and write
559E000
stack
page read and write
7FF6A64DB000
unkown
page readonly
C0000A2000
direct allocation
page read and write
C002400000
direct allocation
page read and write
C0016B5000
direct allocation
page read and write
C00004F000
direct allocation
page read and write
7FF7B7921000
unkown
page execute read
4F8D000
heap
page read and write
4FB3000
heap
page read and write
C0002C3000
direct allocation
page read and write
23CE77D7000
direct allocation
page read and write
4EFE000
stack
page read and write
C00009E000
direct allocation
page read and write
C000243000
direct allocation
page read and write
C00026B000
direct allocation
page read and write
C002D39000
direct allocation
page read and write
7FF7B8707000
unkown
page readonly
C004009000
direct allocation
page read and write
C00013E000
direct allocation
page read and write
C000518000
direct allocation
page read and write
5100000
trusted library allocation
page read and write
C00010A000
direct allocation
page read and write
1E67D91F000
direct allocation
page read and write
4F4E000
heap
page read and write
7FF7B8748000
unkown
page readonly
C000038000
direct allocation
page read and write
7FF7B86F9000
unkown
page readonly
7FF6A5E59000
unkown
page read and write
23CC2369000
heap
page read and write
1E67D982000
direct allocation
page read and write
2760000
heap
page read and write
C00005D000
direct allocation
page read and write
7FF6A6BF1000
unkown
page write copy
1E658410000
heap
page read and write
7FF7B8735000
unkown
page readonly
5100000
trusted library allocation
page read and write
7FF7B7920000
unkown
page readonly
C00166B000
direct allocation
page read and write
C00035B000
direct allocation
page read and write
C00000A000
direct allocation
page read and write
C002BEF000
direct allocation
page read and write
7FF7B8051000
unkown
page write copy
C000064000
direct allocation
page read and write
7FF6A6557000
unkown
page readonly
C0016D9000
direct allocation
page read and write
27776B60000
direct allocation
page read and write
7FF7B8036000
unkown
page write copy
7FF7B7920000
unkown
page readonly
537F000
stack
page read and write
23CC2374000
heap
page read and write
C000468000
direct allocation
page read and write
27776EB0000
direct allocation
page read and write
4F3B000
heap
page read and write
C000124000
direct allocation
page read and write
7FF7B8718000
unkown
page readonly
47DE000
stack
page read and write
C00002C000
direct allocation
page read and write
C00010C000
direct allocation
page read and write
7FF7B86AA000
unkown
page readonly
C000515000
direct allocation
page read and write
C00417B000
direct allocation
page read and write
52FE000
stack
page read and write
27731720000
heap
page read and write
C004111000
direct allocation
page read and write
7FF7B86ED000
unkown
page readonly
C00033B000
direct allocation
page read and write
C00166F000
direct allocation
page read and write
C000626000
direct allocation
page read and write
C002CD4000
direct allocation
page read and write
C000069000
direct allocation
page read and write
C000275000
direct allocation
page read and write
C003FE8000
direct allocation
page read and write
4F6C000
heap
page read and write
7FF6A6BF5000
unkown
page write copy
4FC3000
heap
page read and write
C0031FC000
direct allocation
page read and write
C000243000
direct allocation
page read and write
C0002E7000
direct allocation
page read and write
1E67DAB0000
direct allocation
page read and write
C000489000
direct allocation
page read and write
7FF6A6BE7000
unkown
page read and write
C0017F0000
direct allocation
page read and write
C000126000
direct allocation
page read and write
2C14000
heap
page read and write
C000036000
direct allocation
page read and write
C00004F000
direct allocation
page read and write
C003FCA000
direct allocation
page read and write
1E658479000
heap
page read and write
C0005B8000
direct allocation
page read and write
C000088000
direct allocation
page read and write
4F23000
heap
page read and write
C000478000
direct allocation
page read and write
C00026D000
direct allocation
page read and write
C0005E2000
direct allocation
page read and write
27731728000
heap
page read and write
7FF6A657C000
unkown
page readonly
7FF7B7FF6000
unkown
page write copy
4F60000
heap
page read and write
2C8C000
heap
page read and write
887C1FE000
stack
page read and write
472D000
stack
page read and write
7FF6A657F000
unkown
page readonly
4F50000
heap
page read and write
4F50000
heap
page read and write
C0000B6000
direct allocation
page read and write
4F4E000
heap
page read and write
4F8E000
heap
page read and write
C003C00000
direct allocation
page read and write
C000221000
direct allocation
page read and write
C0002DF000
direct allocation
page read and write
31B0000
heap
page read and write
C001629000
direct allocation
page read and write
C000076000
direct allocation
page read and write
7FF7B86E9000
unkown
page readonly
C00400D000
direct allocation
page read and write
C002826000
direct allocation
page read and write
7FF6A5EBA000
unkown
page readonly
30BE000
stack
page read and write
C0000B8000
direct allocation
page read and write
C002BD0000
direct allocation
page read and write
4F50000
heap
page read and write
C0000D6000
direct allocation
page read and write
C001686000
direct allocation
page read and write
C000484000
direct allocation
page read and write
887C3FF000
stack
page read and write
4F62000
heap
page read and write
C002BDF000
direct allocation
page read and write
C000096000
direct allocation
page read and write
7FF6A6520000
unkown
page readonly
56FD000
stack
page read and write
7FF7B86B1000
unkown
page readonly
C00060E000
direct allocation
page read and write
4F3D000
heap
page read and write
4F3C000
heap
page read and write
4F45000
heap
page read and write
7FF7B8748000
unkown
page readonly
4F70000
heap
page read and write
4F62000
heap
page read and write
7FF6A6526000
unkown
page readonly
2C0D000
heap
page read and write
501E000
stack
page read and write
C0000E2000
direct allocation
page read and write
7FF6A5E4D000
unkown
page read and write
4F50000
heap
page read and write
3E741FF000
stack
page read and write
2C84000
heap
page read and write
C0016BA000
direct allocation
page read and write
7FF6A64DB000
unkown
page readonly
23CE7791000
direct allocation
page read and write
C0001DF000
direct allocation
page read and write
C000337000
direct allocation
page read and write
C002D52000
direct allocation
page read and write
7FF7B871F000
unkown
page readonly
7FF7B8D95000
unkown
page write copy
C00412C000
direct allocation
page read and write
C003FB4000
direct allocation
page read and write
C0005AE000
direct allocation
page read and write
7FF6A6517000
unkown
page readonly
C00410C000
direct allocation
page read and write
4F3C000
heap
page read and write
C000C00000
direct allocation
page read and write
C00006D000
direct allocation
page read and write
C000313000
direct allocation
page read and write
7FF6A5781000
unkown
page execute read
C00165E000
direct allocation
page read and write
C002400000
direct allocation
page read and write
C00017F000
direct allocation
page read and write
2C7D000
heap
page read and write
4F50000
heap
page read and write
C00011A000
direct allocation
page read and write
54B9000
heap
page read and write
23CE7A30000
direct allocation
page read and write
C000078000
direct allocation
page read and write
5480000
heap
page read and write
C00004D000
direct allocation
page read and write
C0003E8000
direct allocation
page read and write
4F7F000
heap
page read and write
C00036D000
direct allocation
page read and write
C00001A000
direct allocation
page read and write
54F2000
heap
page read and write
C004140000
direct allocation
page read and write
3211000
heap
page read and write
4F82000
heap
page read and write
C0005FC000
direct allocation
page read and write
1E67D9AC000
direct allocation
page read and write
C000490000
direct allocation
page read and write
C00005D000
direct allocation
page read and write
C0001AC000
direct allocation
page read and write
C0017EB000
direct allocation
page read and write
2C8E000
heap
page read and write
7FF7B86F9000
unkown
page readonly
2B90000
heap
page read and write
C000486000
direct allocation
page read and write
C0003A7000
direct allocation
page read and write
C004143000
direct allocation
page read and write
C0000B8000
direct allocation
page read and write
C004127000
direct allocation
page read and write
C000307000
direct allocation
page read and write
4F88000
heap
page read and write
C0002F3000
direct allocation
page read and write
C000010000
direct allocation
page read and write
7FF7B86C6000
unkown
page readonly
C000C00000
direct allocation
page read and write
1E67DB30000
direct allocation
page read and write
2C84000
heap
page read and write
7FF7B86E9000
unkown
page readonly
7FF7B7921000
unkown
page execute read
C00015A000
direct allocation
page read and write
887C5FF000
stack
page read and write
4F3A000
heap
page read and write
C002BD9000
direct allocation
page read and write
7FF7B8D95000
unkown
page write copy
C00012A000
direct allocation
page read and write
C003F8A000
direct allocation
page read and write
C00035D000
direct allocation
page read and write
C0001DD000
direct allocation
page read and write
C000043000
direct allocation
page read and write
C000800000
direct allocation
page read and write
C003FF5000
direct allocation
page read and write
46EE000
stack
page read and write
7FF7B7FF6000
unkown
page write copy
4F52000
heap
page read and write
27776C29000
direct allocation
page read and write
C0001DF000
direct allocation
page read and write
7FF6A65A8000
unkown
page readonly
2C28000
heap
page read and write
7FF7B86E2000
unkown
page readonly
7FF6A5E96000
unkown
page write copy
C00000A000
direct allocation
page read and write
7FF7B86B1000
unkown
page readonly
27776B65000
direct allocation
page read and write
7FF7B86D8000
unkown
page readonly
3E73BFE000
stack
page read and write
27731A00000
direct allocation
page read and write
7FF7B86F3000
unkown
page readonly
4F67000
heap
page read and write
C000043000
direct allocation
page read and write
887BDFF000
stack
page read and write
C000446000
direct allocation
page read and write
2C2B000
heap
page read and write
23CE7800000
direct allocation
page read and write
C0004A9000
direct allocation
page read and write
7FF7B86E2000
unkown
page readonly
C003FA0000
direct allocation
page read and write
5100000
trusted library allocation
page read and write
27776FF0000
direct allocation
page read and write
27776DB0000
direct allocation
page read and write
C0003E8000
direct allocation
page read and write
C000000000
direct allocation
page read and write
C000371000
direct allocation
page read and write
4F8D000
heap
page read and write
27776B7E000
direct allocation
page read and write
C003FFB000
direct allocation
page read and write
7FF6A6542000
unkown
page readonly
C000100000
direct allocation
page read and write
23CE7960000
direct allocation
page read and write
C0005C2000
direct allocation
page read and write
2BA5000
heap
page read and write
C002CCC000
direct allocation
page read and write
C0001E5000
direct allocation
page read and write
1E67D990000
direct allocation
page read and write
7FF6A6567000
unkown
page readonly
C000036000
direct allocation
page read and write
C000456000
direct allocation
page read and write
C0005DA000
direct allocation
page read and write
4F88000
heap
page read and write
26EC000
stack
page read and write
7FF7B86B7000
unkown
page readonly
7FF7B86ED000
unkown
page readonly
30D0000
heap
page read and write
C0017CC000
direct allocation
page read and write
23CC2360000
heap
page read and write
56BC000
stack
page read and write
50E0000
heap
page read and write
C00025B000
direct allocation
page read and write
4F74000
heap
page read and write
4F54000
heap
page read and write
4F5A000
heap
page read and write
C001800000
direct allocation
page read and write
5100000
trusted library allocation
page read and write
C000058000
direct allocation
page read and write
C00169F000
direct allocation
page read and write
3216000
heap
page read and write
7FF7B871F000
unkown
page readonly
C00004D000
direct allocation
page read and write
7FF7B86DD000
unkown
page readonly
C0040F3000
direct allocation
page read and write
23CC236C000
heap
page read and write
C000069000
direct allocation
page read and write
4F76000
heap
page read and write
C0005BC000
direct allocation
page read and write
C004001000
direct allocation
page read and write
4F6E000
heap
page read and write
320F000
heap
page read and write
C00018C000
direct allocation
page read and write
C002C1F000
direct allocation
page read and write
C0000D0000
direct allocation
page read and write
7FF7B8D92000
unkown
page write copy
C00048C000
direct allocation
page read and write
C00061C000
direct allocation
page read and write
5380000
heap
page read and write
7FF7B8DA8000
unkown
page readonly
4F45000
heap
page read and write
C000038000
direct allocation
page read and write
C00000A000
direct allocation
page read and write
C0000D4000
direct allocation
page read and write
3208000
heap
page read and write
C000317000
direct allocation
page read and write
C002D1C000
direct allocation
page read and write
C0001B0000
direct allocation
page read and write
C000323000
direct allocation
page read and write
31A0000
remote allocation
page read and write
27F7000
heap
page read and write
4F5B000
heap
page read and write
C0000B2000
direct allocation
page read and write
C0005C6000
direct allocation
page read and write
C000329000
direct allocation
page read and write
27D0000
heap
page read and write
4F4E000
heap
page read and write
7FF7B8039000
unkown
page read and write
1E67D8D8000
direct allocation
page read and write
C00051C000
direct allocation
page read and write
C003FEB000
direct allocation
page read and write
C003FDA000
direct allocation
page read and write
7FF6A656C000
unkown
page readonly
48EE000
stack
page read and write
C002D11000
direct allocation
page read and write
4F50000
heap
page read and write
C00010C000
direct allocation
page read and write
4EFF000
stack
page read and write
23CC2538000
direct allocation
page read and write
C003FB5000
direct allocation
page read and write
C0000D0000
direct allocation
page read and write
27F5000
heap
page read and write
7FF6A6538000
unkown
page readonly
31A0000
remote allocation
page read and write
C001823000
direct allocation
page read and write
C0003FA000
direct allocation
page read and write
C00039F000
direct allocation
page read and write
4F3C000
heap
page read and write
7FF7B86DD000
unkown
page readonly
C000349000
direct allocation
page read and write
27776B6E000
direct allocation
page read and write
C000299000
direct allocation
page read and write
C000492000
direct allocation
page read and write
C0016E1000
direct allocation
page read and write
C002D2D000
direct allocation
page read and write
2AC5000
heap
page read and write
5A76000
heap
page read and write
C00184F000
direct allocation
page read and write
C00051D000
direct allocation
page read and write
C000192000
direct allocation
page read and write
C0016AE000
direct allocation
page read and write
7FF6A6574000
unkown
page readonly
C0002F9000
direct allocation
page read and write
C00032D000
direct allocation
page read and write
7FF7B86AA000
unkown
page readonly
C00006D000
direct allocation
page read and write
C000534000
direct allocation
page read and write
C0017BE000
direct allocation
page read and write
C000172000
direct allocation
page read and write
C001674000
direct allocation
page read and write
C000452000
direct allocation
page read and write
7FF7B86F9000
unkown
page readonly
3217000
heap
page read and write
C00059C000
direct allocation
page read and write
C00043A000
direct allocation
page read and write
C0003C8000
direct allocation
page read and write
C00047C000
direct allocation
page read and write
C004132000
direct allocation
page read and write
347E000
stack
page read and write
2C89000
heap
page read and write
C00008E000
direct allocation
page read and write
7FF7B870C000
unkown
page readonly
C000295000
direct allocation
page read and write
7FF6A5EBA000
unkown
page readonly
7FF7B8714000
unkown
page readonly
C001709000
direct allocation
page read and write
4F45000
heap
page read and write
C003FA3000
direct allocation
page read and write
C001659000
direct allocation
page read and write
C001CE6000
direct allocation
page read and write
5020000
heap
page read and write
4F5E000
heap
page read and write
52B5000
heap
page read and write
3229000
heap
page read and write
C000273000
direct allocation
page read and write
C000364000
direct allocation
page read and write
7FF7B870C000
unkown
page readonly
7FF7B870C000
unkown
page readonly
7FF6A5E4D000
unkown
page write copy
7FF6A65A8000
unkown
page readonly
4FC2000
heap
page read and write
C00030A000
direct allocation
page read and write
2C31000
heap
page read and write
5560000
heap
page read and write
4F3C000
heap
page read and write
2BA5000
heap
page read and write
7FF7B8702000
unkown
page readonly
C002C0C000
direct allocation
page read and write
C000378000
direct allocation
page read and write
C0005D2000
direct allocation
page read and write
C00014C000
direct allocation
page read and write
4F44000
heap
page read and write
C00027F000
direct allocation
page read and write
1E67DC70000
direct allocation
page read and write
C0002C3000
direct allocation
page read and write
C002D16000
direct allocation
page read and write
C00049E000
direct allocation
page read and write
4FAE000
heap
page read and write
4F6E000
heap
page read and write
C001670000
direct allocation
page read and write
887B7FC000
stack
page read and write
C0004BC000
direct allocation
page read and write
7FF7B86B7000
unkown
page readonly
4F50000
heap
page read and write
C000466000
direct allocation
page read and write
7FF6A6511000
unkown
page readonly
There are 1499 hidden memdumps, click here to show them.