Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
|
initial sample
|
||
C:\Users\Public\AccountPictures\(29e57e917fdba537d4d31a6f12a1a9bc)Z914UZ05TWILZJPY6FFQ8Q.exe
|
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Z914UZ05TWILZJPY6FFQ8Q.exe
|
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\config
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
|
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
|
||
C:\Users\user\AppData\Local\Temp\Z914UZ05TWILZJPY6FFQ8Q.exe
|
"C:\Users\user\AppData\Local\Temp\Z914UZ05TWILZJPY6FFQ8Q.exe"
|
||
C:\Users\Public\AccountPictures\(29e57e917fdba537d4d31a6f12a1a9bc)Z914UZ05TWILZJPY6FFQ8Q.exe
|
"C:\Users\Public\AccountPictures\(29e57e917fdba537d4d31a6f12a1a9bc)Z914UZ05TWILZJPY6FFQ8Q.exe"
|
||
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
|
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
|
||
C:\Users\Public\AccountPictures\(29e57e917fdba537d4d31a6f12a1a9bc)Z914UZ05TWILZJPY6FFQ8Q.exe
|
"C:\Users\Public\AccountPictures\(29e57e917fdba537d4d31a6f12a1a9bc)Z914UZ05TWILZJPY6FFQ8Q.exe"
|
||
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
|
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
|
||
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
|
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 2656 -s 412
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 2356 -s 412
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://195.2.70.38:30001/api/helper-first-register?buildVersion=05DI.JAU2w9y&md5=a64beab5d4516beca4c40b25dc0c1cd8&proxyPassword=9oMhAjNv&proxyUsername=1s8zDjlU&userId=MmYpaDvQrUoakoZku4BqsBUP
|
195.2.70.38
|
||
bordersoarmanusjuw.shop
|
|||
mealplayerpreceodsju.shop
|
|||
absentconvicsjawun.shop
|
|||
pushjellysingeywus.shop
|
|||
stripmarrystresew.shop
|
|||
economicscreateojsu.shop
|
|||
wifeplasterbakewis.shop
|
|||
suitcaseacanehalk.shop
|
|||
entitlementappwo.shop
|
|||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://newvideo.link:443/temp/imgdrive_2.1.4_2.exe
|
unknown
|
||
https://stripmarrystresew.shop:443/api
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://stripmarrystresew.shop/h
|
unknown
|
||
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
|
unknown
|
||
https://management.core.usgovcloudapi.netGODEBUG
|
unknown
|
||
https://stripmarrystresew.shop/apito
|
unknown
|
||
https://stripmarrystresew.shop/apiN
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://picsum.photos/500/500%02x:%02x:%02x:%02x:%02x:%02x
|
unknown
|
||
https://stripmarrystresew.shop/
|
unknown
|
||
https://newvideo.link/temp/imgdrive_2.1.4_2.exe
|
216.10.247.145
|
||
https://stripmarrystresew.shop/api:
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
https://stripmarrystresew.shop/apiG
|
unknown
|
||
http://195.2.70.38:30001/api/helper-first-register?
|
unknown
|
||
http://195.2.70.38:30001/api/helper-first-register?abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVW
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://stripmarrystresew.shop/9
|
unknown
|
||
https://picsum.photos/208/500
|
unknown
|
||
https://management.core.chinacloudapi.cnchacha20poly1305:
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
http://www.principalproductize.biz/targetPronoun
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://login.microsoftonline.us/scalar
|
unknown
|
||
https://management.chinacloudapi.cnP224
|
unknown
|
||
https://stripmarrystresew.shop/--
|
unknown
|
||
https://support.microsof
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://login.chinacloudapi.cn/crypto/aes:
|
unknown
|
||
https://login.microsoftonline.com/crypto/rc4:
|
unknown
|
||
http://crl.microsoft.c
|
unknown
|
||
https://management.azure.cominvalid
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://stripmarrystresew.shop/api
|
104.21.15.37
|
There are 46 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
stripmarrystresew.shop
|
104.21.15.37
|
||
newvideo.link
|
216.10.247.145
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.21.15.37
|
stripmarrystresew.shop
|
United States
|
||
195.2.70.38
|
unknown
|
Russian Federation
|
||
178.20.42.152
|
unknown
|
Russian Federation
|
||
216.10.247.145
|
newvideo.link
|
India
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
(29e57e917fdba537d4d31a6f12a1a9bc)Z914UZ05TWILZJPY6FFQ8Q.exe
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
27B6C300000
|
direct allocation
|
page read and write
|
||
1A95F8C0000
|
direct allocation
|
page read and write
|
||
C0001C8000
|
direct allocation
|
page read and write
|
||
350C000
|
heap
|
page read and write
|
||
27B46FB4000
|
direct allocation
|
page read and write
|
||
7FF6FD997000
|
unkown
|
page write copy
|
||
27B47000000
|
direct allocation
|
page read and write
|
||
C00000C000
|
direct allocation
|
page read and write
|
||
C000070000
|
direct allocation
|
page read and write
|
||
C000046000
|
direct allocation
|
page read and write
|
||
34FB000
|
heap
|
page read and write
|
||
C00013C000
|
direct allocation
|
page read and write
|
||
56D9000
|
trusted library allocation
|
page read and write
|
||
C00E000
|
direct allocation
|
page read and write
|
||
3533000
|
heap
|
page read and write
|
||
C00007C000
|
direct allocation
|
page read and write
|
||
C0001E4000
|
direct allocation
|
page read and write
|
||
C0001E2000
|
direct allocation
|
page read and write
|
||
C000047000
|
direct allocation
|
page read and write
|
||
C0000B8000
|
direct allocation
|
page read and write
|
||
C00009C000
|
direct allocation
|
page read and write
|
||
C000086000
|
direct allocation
|
page read and write
|
||
27B46D20000
|
heap
|
page read and write
|
||
350B000
|
heap
|
page read and write
|
||
3536000
|
heap
|
page read and write
|
||
C032000
|
direct allocation
|
page read and write
|
||
C000400000
|
direct allocation
|
page read and write
|
||
56DE000
|
trusted library allocation
|
page read and write
|
||
353A000
|
heap
|
page read and write
|
||
C03E000
|
direct allocation
|
page read and write
|
||
7FF623137000
|
unkown
|
page readonly
|
||
1A95FFC0000
|
direct allocation
|
page read and write
|
||
350D000
|
heap
|
page read and write
|
||
C000088000
|
direct allocation
|
page read and write
|
||
1F9F63A6000
|
direct allocation
|
page read and write
|
||
7FF6FD5E4000
|
unkown
|
page write copy
|
||
C000100000
|
direct allocation
|
page read and write
|
||
C070000
|
direct allocation
|
page read and write
|
||
C000074000
|
direct allocation
|
page read and write
|
||
C128000
|
direct allocation
|
page read and write
|
||
C00017E000
|
direct allocation
|
page read and write
|
||
5A60000
|
trusted library allocation
|
page read and write
|
||
35B7000
|
remote allocation
|
page execute and read and write
|
||
59C7000
|
trusted library allocation
|
page read and write
|
||
C0001AA000
|
direct allocation
|
page read and write
|
||
C0001DC000
|
direct allocation
|
page read and write
|
||
C000064000
|
direct allocation
|
page read and write
|
||
3535000
|
heap
|
page read and write
|
||
56C2000
|
trusted library allocation
|
page read and write
|
||
34DA000
|
heap
|
page read and write
|
||
56DF000
|
trusted library allocation
|
page read and write
|
||
C00003D000
|
direct allocation
|
page read and write
|
||
21A7EEF0000
|
direct allocation
|
page read and write
|
||
353A000
|
heap
|
page read and write
|
||
C00030F000
|
direct allocation
|
page read and write
|
||
C0000AA000
|
direct allocation
|
page read and write
|
||
350F000
|
heap
|
page read and write
|
||
56F7000
|
trusted library allocation
|
page read and write
|
||
34DA000
|
heap
|
page read and write
|
||
56F9000
|
trusted library allocation
|
page read and write
|
||
5823000
|
trusted library allocation
|
page read and write
|
||
C00045A000
|
direct allocation
|
page read and write
|
||
C000118000
|
direct allocation
|
page read and write
|
||
56E9000
|
trusted library allocation
|
page read and write
|
||
C00000A000
|
direct allocation
|
page read and write
|
||
C00013A000
|
direct allocation
|
page read and write
|
||
C018000
|
direct allocation
|
page read and write
|
||
34FD000
|
heap
|
page read and write
|
||
C0000B6000
|
direct allocation
|
page read and write
|
||
C000136000
|
direct allocation
|
page read and write
|
||
5741000
|
trusted library allocation
|
page read and write
|
||
C000052000
|
direct allocation
|
page read and write
|
||
C00E000
|
direct allocation
|
page read and write
|
||
C00019B000
|
direct allocation
|
page read and write
|
||
34F7000
|
heap
|
page read and write
|
||
365E000
|
stack
|
page read and write
|
||
C00005D000
|
direct allocation
|
page read and write
|
||
1F9F5520000
|
direct allocation
|
page read and write
|
||
34FF000
|
heap
|
page read and write
|
||
C000064000
|
direct allocation
|
page read and write
|
||
C0000E2000
|
direct allocation
|
page read and write
|
||
353A000
|
heap
|
page read and write
|
||
C02E000
|
direct allocation
|
page read and write
|
||
C00010C000
|
direct allocation
|
page read and write
|
||
C196000
|
direct allocation
|
page read and write
|
||
375E000
|
stack
|
page read and write
|
||
BDDE000
|
stack
|
page read and write
|
||
C000132000
|
direct allocation
|
page read and write
|
||
7FF6FD95C000
|
unkown
|
page read and write
|
||
5A61000
|
trusted library allocation
|
page read and write
|
||
C0000B2000
|
direct allocation
|
page read and write
|
||
5B07000
|
trusted library allocation
|
page read and write
|
||
C000050000
|
direct allocation
|
page read and write
|
||
378C000
|
direct allocation
|
page read and write
|
||
C000E6A000
|
direct allocation
|
page read and write
|
||
7FF7F8285000
|
unkown
|
page write copy
|
||
C00011C000
|
direct allocation
|
page read and write
|
||
C00001C000
|
direct allocation
|
page read and write
|
||
353D000
|
heap
|
page read and write
|
||
BE7F000
|
stack
|
page read and write
|
||
3535000
|
heap
|
page read and write
|
||
BF1E000
|
stack
|
page read and write
|
||
34F6000
|
heap
|
page read and write
|
||
860D7FD000
|
stack
|
page read and write
|
||
C000076000
|
direct allocation
|
page read and write
|
||
5A72000
|
trusted library allocation
|
page read and write
|
||
3533000
|
heap
|
page read and write
|
||
7FF623717000
|
unkown
|
page write copy
|
||
2EDB000
|
stack
|
page read and write
|
||
5C11000
|
trusted library allocation
|
page read and write
|
||
C000400000
|
direct allocation
|
page read and write
|
||
C0000B2000
|
direct allocation
|
page read and write
|
||
C0023AC000
|
direct allocation
|
page read and write
|
||
350E000
|
heap
|
page read and write
|
||
BC5000
|
heap
|
page read and write
|
||
3621000
|
direct allocation
|
page read and write
|
||
34FB000
|
heap
|
page read and write
|
||
C000156000
|
direct allocation
|
page read and write
|
||
59C7000
|
trusted library allocation
|
page read and write
|
||
C0000D6000
|
direct allocation
|
page read and write
|
||
3535000
|
heap
|
page read and write
|
||
C0000D6000
|
direct allocation
|
page read and write
|
||
59C1000
|
trusted library allocation
|
page read and write
|
||
C0001DE000
|
direct allocation
|
page read and write
|
||
3535000
|
heap
|
page read and write
|
||
3508000
|
heap
|
page read and write
|
||
C000307000
|
direct allocation
|
page read and write
|
||
570D000
|
trusted library allocation
|
page read and write
|
||
C02C000
|
direct allocation
|
page read and write
|
||
3482000
|
heap
|
page read and write
|
||
C0001A2000
|
direct allocation
|
page read and write
|
||
BC0000
|
direct allocation
|
page read and write
|
||
C00112D000
|
direct allocation
|
page read and write
|
||
C000168000
|
direct allocation
|
page read and write
|
||
C000172000
|
direct allocation
|
page read and write
|
||
3533000
|
heap
|
page read and write
|
||
C000066000
|
direct allocation
|
page read and write
|
||
7FF6FD639000
|
unkown
|
page readonly
|
||
C00001E000
|
direct allocation
|
page read and write
|
||
C00006A000
|
direct allocation
|
page read and write
|
||
7FF623137000
|
unkown
|
page readonly
|
||
C0001DA000
|
direct allocation
|
page read and write
|
||
BF9E000
|
stack
|
page read and write
|
||
ABB000
|
heap
|
page read and write
|
||
27B6C34A000
|
direct allocation
|
page read and write
|
||
3508000
|
heap
|
page read and write
|
||
3502000
|
heap
|
page read and write
|
||
C000024000
|
direct allocation
|
page read and write
|
||
3510000
|
heap
|
page read and write
|
||
3538000
|
heap
|
page read and write
|
||
27B6C1B0000
|
direct allocation
|
page read and write
|
||
C00009C000
|
direct allocation
|
page read and write
|
||
34EF000
|
heap
|
page read and write
|
||
7FF622737000
|
unkown
|
page readonly
|
||
75D000
|
stack
|
page read and write
|
||
C000462000
|
direct allocation
|
page read and write
|
||
C001BA5000
|
direct allocation
|
page read and write
|
||
34FF000
|
heap
|
page read and write
|
||
56C1000
|
trusted library allocation
|
page read and write
|
||
C000084000
|
direct allocation
|
page read and write
|
||
353C000
|
heap
|
page read and write
|
||
C00047C000
|
direct allocation
|
page read and write
|
||
C00009C000
|
direct allocation
|
page read and write
|
||
C00006D000
|
direct allocation
|
page read and write
|
||
C0001E0000
|
direct allocation
|
page read and write
|
||
56E6000
|
trusted library allocation
|
page read and write
|
||
3508000
|
heap
|
page read and write
|
||
C07E000
|
direct allocation
|
page read and write
|
||
27B46FE0000
|
direct allocation
|
page read and write
|
||
6581FD000
|
stack
|
page read and write
|
||
56D9000
|
trusted library allocation
|
page read and write
|
||
34FD000
|
heap
|
page read and write
|
||
C000400000
|
direct allocation
|
page read and write
|
||
C008000
|
direct allocation
|
page read and write
|
||
C0001E4000
|
direct allocation
|
page read and write
|
||
59CD000
|
trusted library allocation
|
page read and write
|
||
C06E000
|
direct allocation
|
page read and write
|
||
C001BA7000
|
direct allocation
|
page read and write
|
||
56ED000
|
trusted library allocation
|
page read and write
|
||
C000510000
|
direct allocation
|
page read and write
|
||
C002000
|
direct allocation
|
page read and write
|
||
C000480000
|
direct allocation
|
page read and write
|
||
57D2000
|
trusted library allocation
|
page read and write
|
||
C001D00000
|
direct allocation
|
page read and write
|
||
C000004000
|
direct allocation
|
page read and write
|
||
C00006C000
|
direct allocation
|
page read and write
|
||
BCDE000
|
stack
|
page read and write
|
||
C30000
|
heap
|
page read and write
|
||
3501000
|
heap
|
page read and write
|
||
34FD000
|
heap
|
page read and write
|
||
34FA000
|
heap
|
page read and write
|
||
C000580000
|
direct allocation
|
page read and write
|
||
860DFFF000
|
stack
|
page read and write
|
||
27B46FD0000
|
direct allocation
|
page read and write
|
||
3490000
|
heap
|
page read and write
|
||
C000020000
|
direct allocation
|
page read and write
|
||
6575FD000
|
stack
|
page read and write
|
||
E30000
|
heap
|
page read and write
|
||
C000140000
|
direct allocation
|
page read and write
|
||
C00018E000
|
direct allocation
|
page read and write
|
||
C0001DE000
|
direct allocation
|
page read and write
|
||
C002000000
|
direct allocation
|
page read and write
|
||
756E9FE000
|
stack
|
page read and write
|
||
5721000
|
trusted library allocation
|
page read and write
|
||
C018000
|
direct allocation
|
page read and write
|
||
C000466000
|
direct allocation
|
page read and write
|
||
C003846000
|
direct allocation
|
page read and write
|
||
6111000
|
trusted library allocation
|
page read and write
|
||
C001110000
|
direct allocation
|
page read and write
|
||
C000E00000
|
direct allocation
|
page read and write
|
||
7FF6FD994000
|
unkown
|
page write copy
|
||
3535000
|
heap
|
page read and write
|
||
34FF000
|
heap
|
page read and write
|
||
C00000A000
|
direct allocation
|
page read and write
|
||
56F1000
|
trusted library allocation
|
page read and write
|
||
59C2000
|
trusted library allocation
|
page read and write
|
||
5ADF000
|
trusted library allocation
|
page read and write
|
||
C00011A000
|
direct allocation
|
page read and write
|
||
C000138000
|
direct allocation
|
page read and write
|
||
BEC0000
|
heap
|
page read and write
|
||
5ACF000
|
trusted library allocation
|
page read and write
|
||
21A7E7F0000
|
direct allocation
|
page read and write
|
||
C0000BA000
|
direct allocation
|
page read and write
|
||
3524000
|
heap
|
page read and write
|
||
C000036000
|
direct allocation
|
page read and write
|
||
C000198000
|
direct allocation
|
page read and write
|
||
C000025000
|
direct allocation
|
page read and write
|
||
349F000
|
heap
|
page read and write
|
||
5ACC000
|
trusted library allocation
|
page read and write
|
||
79E000
|
stack
|
page read and write
|
||
C000400000
|
direct allocation
|
page read and write
|
||
C00004B000
|
direct allocation
|
page read and write
|
||
63C0000
|
trusted library allocation
|
page read and write
|
||
C0001D8000
|
direct allocation
|
page read and write
|
||
C000076000
|
direct allocation
|
page read and write
|
||
C000104000
|
direct allocation
|
page read and write
|
||
C000059000
|
direct allocation
|
page read and write
|
||
A70000
|
heap
|
page read and write
|
||
C000200000
|
direct allocation
|
page read and write
|
||
5BF5000
|
trusted library allocation
|
page read and write
|
||
C00011E000
|
direct allocation
|
page read and write
|
||
C00010A000
|
direct allocation
|
page read and write
|
||
34DA000
|
heap
|
page read and write
|
||
575E000
|
trusted library allocation
|
page read and write
|
||
7FF7F9208000
|
unkown
|
page readonly
|
||
C05C000
|
direct allocation
|
page read and write
|
||
3508000
|
heap
|
page read and write
|
||
27B47020000
|
heap
|
page read and write
|
||
C001400000
|
direct allocation
|
page read and write
|
||
FE427FE000
|
stack
|
page read and write
|
||
34EF000
|
heap
|
page read and write
|
||
C00003D000
|
direct allocation
|
page read and write
|
||
C000004000
|
direct allocation
|
page read and write
|
||
C000136000
|
direct allocation
|
page read and write
|
||
C0001BA000
|
direct allocation
|
page read and write
|
||
3533000
|
heap
|
page read and write
|
||
C000020000
|
direct allocation
|
page read and write
|
||
57C1000
|
trusted library allocation
|
page read and write
|
||
C00006C000
|
direct allocation
|
page read and write
|
||
C0000D6000
|
direct allocation
|
page read and write
|
||
C00017C000
|
direct allocation
|
page read and write
|
||
C00A000
|
direct allocation
|
page read and write
|
||
56E7000
|
trusted library allocation
|
page read and write
|
||
5B0F000
|
trusted library allocation
|
page read and write
|
||
34DA000
|
heap
|
page read and write
|
||
C0023A7000
|
direct allocation
|
page read and write
|
||
1A960B6F000
|
direct allocation
|
page read and write
|
||
34A8000
|
heap
|
page read and write
|
||
C000E72000
|
direct allocation
|
page read and write
|
||
5AD2000
|
trusted library allocation
|
page read and write
|
||
350F000
|
heap
|
page read and write
|
||
56D9000
|
trusted library allocation
|
page read and write
|
||
C061000
|
direct allocation
|
page read and write
|
||
56C8000
|
trusted library allocation
|
page read and write
|
||
349B000
|
heap
|
page read and write
|
||
4E90000
|
remote allocation
|
page read and write
|
||
34FB000
|
heap
|
page read and write
|
||
3535000
|
heap
|
page read and write
|
||
C054000
|
direct allocation
|
page read and write
|
||
C002BAE000
|
direct allocation
|
page read and write
|
||
5AF3000
|
trusted library allocation
|
page read and write
|
||
330F000
|
remote allocation
|
page execute and read and write
|
||
C000024000
|
direct allocation
|
page read and write
|
||
C00006E000
|
direct allocation
|
page read and write
|
||
1A95F880000
|
direct allocation
|
page read and write
|
||
3508000
|
heap
|
page read and write
|
||
59C3000
|
trusted library allocation
|
page read and write
|
||
C000000000
|
direct allocation
|
page read and write
|
||
349D000
|
heap
|
page read and write
|
||
3533000
|
heap
|
page read and write
|
||
C000200000
|
direct allocation
|
page read and write
|
||
C0000E7000
|
direct allocation
|
page read and write
|
||
5ACD000
|
trusted library allocation
|
page read and write
|
||
3507000
|
heap
|
page read and write
|
||
34DA000
|
heap
|
page read and write
|
||
59C1000
|
trusted library allocation
|
page read and write
|
||
C001400000
|
direct allocation
|
page read and write
|
||
349F000
|
heap
|
page read and write
|
||
34F7000
|
heap
|
page read and write
|
||
C0001BE000
|
direct allocation
|
page read and write
|
||
C0001C4000
|
direct allocation
|
page read and write
|
||
756EDFE000
|
stack
|
page read and write
|
||
C0000B8000
|
direct allocation
|
page read and write
|
||
5B2C000
|
trusted library allocation
|
page read and write
|
||
C000056000
|
direct allocation
|
page read and write
|
||
FE425FE000
|
stack
|
page read and write
|
||
5A9F000
|
trusted library allocation
|
page read and write
|
||
C001BB8000
|
direct allocation
|
page read and write
|
||
3526000
|
heap
|
page read and write
|
||
C004A00000
|
direct allocation
|
page read and write
|
||
3508000
|
heap
|
page read and write
|
||
C000029000
|
direct allocation
|
page read and write
|
||
C130000
|
direct allocation
|
page read and write
|
||
7FF6FD632000
|
unkown
|
page read and write
|
||
C000176000
|
direct allocation
|
page read and write
|
||
C0000C6000
|
direct allocation
|
page read and write
|
||
3508000
|
heap
|
page read and write
|
||
C0000B4000
|
direct allocation
|
page read and write
|
||
3508000
|
heap
|
page read and write
|
||
C0011B2000
|
direct allocation
|
page read and write
|
||
C000088000
|
direct allocation
|
page read and write
|
||
3533000
|
heap
|
page read and write
|
||
7FF6FD371000
|
unkown
|
page execute read
|
||
C000020000
|
direct allocation
|
page read and write
|
||
5ACF000
|
trusted library allocation
|
page read and write
|
||
C00003B000
|
direct allocation
|
page read and write
|
||
C000307000
|
direct allocation
|
page read and write
|
||
C0000E2000
|
direct allocation
|
page read and write
|
||
56EF000
|
trusted library allocation
|
page read and write
|
||
369E000
|
stack
|
page read and write
|
||
C002402000
|
direct allocation
|
page read and write
|
||
C00001C000
|
direct allocation
|
page read and write
|
||
C000140000
|
direct allocation
|
page read and write
|
||
C00016E000
|
direct allocation
|
page read and write
|
||
C134000
|
direct allocation
|
page read and write
|
||
7FF623713000
|
unkown
|
page write copy
|
||
C0001E8000
|
direct allocation
|
page read and write
|
||
35BB000
|
remote allocation
|
page execute and read and write
|
||
5AA2000
|
trusted library allocation
|
page read and write
|
||
C035000
|
direct allocation
|
page read and write
|
||
C00005B000
|
direct allocation
|
page read and write
|
||
BCC000
|
direct allocation
|
page read and write
|
||
C000124000
|
direct allocation
|
page read and write
|
||
5B10000
|
trusted library allocation
|
page read and write
|
||
56C4000
|
trusted library allocation
|
page read and write
|
||
C0001CA000
|
direct allocation
|
page read and write
|
||
C00001A000
|
direct allocation
|
page read and write
|
||
C0001CA000
|
direct allocation
|
page read and write
|
||
C056000
|
direct allocation
|
page read and write
|
||
C00002C000
|
direct allocation
|
page read and write
|
||
C000180000
|
direct allocation
|
page read and write
|
||
5803000
|
trusted library allocation
|
page read and write
|
||
C050000
|
direct allocation
|
page read and write
|
||
570D000
|
trusted library allocation
|
page read and write
|
||
C000057000
|
direct allocation
|
page read and write
|
||
C000084000
|
direct allocation
|
page read and write
|
||
5BEF000
|
trusted library allocation
|
page read and write
|
||
C000134000
|
direct allocation
|
page read and write
|
||
349B000
|
heap
|
page read and write
|
||
7FF6FD623000
|
unkown
|
page read and write
|
||
575E000
|
trusted library allocation
|
page read and write
|
||
59C3000
|
trusted library allocation
|
page read and write
|
||
C001BA3000
|
direct allocation
|
page read and write
|
||
34FA000
|
heap
|
page read and write
|
||
C003200000
|
direct allocation
|
page read and write
|
||
56F7000
|
trusted library allocation
|
page read and write
|
||
3508000
|
heap
|
page read and write
|
||
C006000
|
direct allocation
|
page read and write
|
||
21A7E7B0000
|
direct allocation
|
page read and write
|
||
7FF6FD630000
|
unkown
|
page write copy
|
||
C13E000
|
direct allocation
|
page read and write
|
||
7FF6FD639000
|
unkown
|
page readonly
|
||
7FF6FD9A5000
|
unkown
|
page readonly
|
||
C00014A000
|
direct allocation
|
page read and write
|
||
C0000D8000
|
direct allocation
|
page read and write
|
||
35E0000
|
remote allocation
|
page execute and read and write
|
||
575E000
|
trusted library allocation
|
page read and write
|
||
353B000
|
heap
|
page read and write
|
||
C000162000
|
direct allocation
|
page read and write
|
||
C000026000
|
direct allocation
|
page read and write
|
||
7FF7F92C7000
|
unkown
|
page write copy
|
||
37A1000
|
direct allocation
|
page read and write
|
||
C000132000
|
direct allocation
|
page read and write
|
||
34F2000
|
heap
|
page read and write
|
||
59CF000
|
trusted library allocation
|
page read and write
|
||
56F9000
|
trusted library allocation
|
page read and write
|
||
56EB000
|
trusted library allocation
|
page read and write
|
||
C0000AC000
|
direct allocation
|
page read and write
|
||
34DA000
|
heap
|
page read and write
|
||
860E7FF000
|
stack
|
page read and write
|
||
C00007A000
|
direct allocation
|
page read and write
|
||
34FD000
|
heap
|
page read and write
|
||
34FD000
|
heap
|
page read and write
|
||
7FF6FD637000
|
unkown
|
page read and write
|
||
5ABC000
|
trusted library allocation
|
page read and write
|
||
C0023BC000
|
direct allocation
|
page read and write
|
||
C00013A000
|
direct allocation
|
page read and write
|
||
7FF6FD98E000
|
unkown
|
page read and write
|
||
349F000
|
heap
|
page read and write
|
||
C0001E0000
|
direct allocation
|
page read and write
|
||
352E000
|
heap
|
page read and write
|
||
C00013E000
|
direct allocation
|
page read and write
|
||
C122000
|
direct allocation
|
page read and write
|
||
C000050000
|
direct allocation
|
page read and write
|
||
C0000C8000
|
direct allocation
|
page read and write
|
||
C001BA5000
|
direct allocation
|
page read and write
|
||
C000570000
|
direct allocation
|
page read and write
|
||
2F20000
|
remote allocation
|
page execute and read and write
|
||
C0000B6000
|
direct allocation
|
page read and write
|
||
57CC000
|
trusted library allocation
|
page read and write
|
||
C000168000
|
direct allocation
|
page read and write
|
||
7FF7F92D7000
|
unkown
|
page readonly
|
||
C00055F000
|
direct allocation
|
page read and write
|
||
C000000000
|
direct allocation
|
page read and write
|
||
A4E000
|
stack
|
page read and write
|
||
2EA0000
|
remote allocation
|
page execute and read and write
|
||
C000196000
|
direct allocation
|
page read and write
|
||
34FF000
|
heap
|
page read and write
|
||
3533000
|
heap
|
page read and write
|
||
C0001EE000
|
direct allocation
|
page read and write
|
||
C00013E000
|
direct allocation
|
page read and write
|
||
C02C000
|
direct allocation
|
page read and write
|
||
860DBFF000
|
stack
|
page read and write
|
||
56D9000
|
trusted library allocation
|
page read and write
|
||
3533000
|
heap
|
page read and write
|
||
3533000
|
heap
|
page read and write
|
||
58A3000
|
trusted library allocation
|
page read and write
|
||
59CA000
|
trusted library allocation
|
page read and write
|
||
C00013C000
|
direct allocation
|
page read and write
|
||
C000057000
|
direct allocation
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
C004A00000
|
direct allocation
|
page read and write
|
||
27B46D59000
|
direct allocation
|
page read and write
|
||
C00051E000
|
direct allocation
|
page read and write
|
||
C000002000
|
direct allocation
|
page read and write
|
||
C000026000
|
direct allocation
|
page read and write
|
||
56F9000
|
trusted library allocation
|
page read and write
|
||
E40000
|
heap
|
page read and write
|
||
C0001E2000
|
direct allocation
|
page read and write
|
||
C000180000
|
direct allocation
|
page read and write
|
||
56D9000
|
trusted library allocation
|
page read and write
|
||
C00046A000
|
direct allocation
|
page read and write
|
||
34EF000
|
heap
|
page read and write
|
||
56C8000
|
trusted library allocation
|
page read and write
|
||
C000054000
|
direct allocation
|
page read and write
|
||
1F9F4DE0000
|
direct allocation
|
page read and write
|
||
C000002000
|
direct allocation
|
page read and write
|
||
56C1000
|
trusted library allocation
|
page read and write
|
||
7FF623658000
|
unkown
|
page readonly
|
||
3533000
|
heap
|
page read and write
|
||
7FF6FD997000
|
unkown
|
page write copy
|
||
7FF7F92C3000
|
unkown
|
page write copy
|
||
7FF7F8CE7000
|
unkown
|
page readonly
|
||
C01A000
|
direct allocation
|
page read and write
|
||
C00011C000
|
direct allocation
|
page read and write
|
||
C00001E000
|
direct allocation
|
page read and write
|
||
BC9F000
|
stack
|
page read and write
|
||
C000124000
|
direct allocation
|
page read and write
|
||
3509000
|
heap
|
page read and write
|
||
C0000DC000
|
direct allocation
|
page read and write
|
||
57EB000
|
trusted library allocation
|
page read and write
|
||
C0004F0000
|
direct allocation
|
page read and write
|
||
C0023AE000
|
direct allocation
|
page read and write
|
||
C0001A4000
|
direct allocation
|
page read and write
|
||
27B6C350000
|
direct allocation
|
page read and write
|
||
7FF6226D5000
|
unkown
|
page write copy
|
||
56F9000
|
trusted library allocation
|
page read and write
|
||
57C1000
|
trusted library allocation
|
page read and write
|
||
C00013C000
|
direct allocation
|
page read and write
|
||
5A6F000
|
trusted library allocation
|
page read and write
|
||
C000000000
|
direct allocation
|
page read and write
|
||
6DC0000
|
trusted library allocation
|
page read and write
|
||
C01E000
|
direct allocation
|
page read and write
|
||
56C8000
|
trusted library allocation
|
page read and write
|
||
C001400000
|
direct allocation
|
page read and write
|
||
DD0000
|
direct allocation
|
page read and write
|
||
C00005B000
|
direct allocation
|
page read and write
|
||
3484000
|
heap
|
page read and write
|
||
C00004B000
|
direct allocation
|
page read and write
|
||
3538000
|
heap
|
page read and write
|
||
C02E000
|
direct allocation
|
page read and write
|
||
34F6000
|
heap
|
page read and write
|
||
6585FF000
|
stack
|
page read and write
|
||
C0023AA000
|
direct allocation
|
page read and write
|
||
34FD000
|
heap
|
page read and write
|
||
35E0000
|
remote allocation
|
page execute and read and write
|
||
3538000
|
heap
|
page read and write
|
||
6579FE000
|
stack
|
page read and write
|
||
353A000
|
heap
|
page read and write
|
||
C00015C000
|
direct allocation
|
page read and write
|
||
3504000
|
heap
|
page read and write
|
||
3533000
|
heap
|
page read and write
|
||
C000006000
|
direct allocation
|
page read and write
|
||
C0000AE000
|
direct allocation
|
page read and write
|
||
C004CF0000
|
direct allocation
|
page read and write
|
||
C00016F000
|
direct allocation
|
page read and write
|
||
C000116000
|
direct allocation
|
page read and write
|
||
C0000DC000
|
direct allocation
|
page read and write
|
||
7FF623727000
|
unkown
|
page readonly
|
||
5B36000
|
trusted library allocation
|
page read and write
|
||
3533000
|
heap
|
page read and write
|
||
34DA000
|
heap
|
page read and write
|
||
3503000
|
heap
|
page read and write
|
||
3506000
|
heap
|
page read and write
|
||
C000116000
|
direct allocation
|
page read and write
|
||
C026000
|
direct allocation
|
page read and write
|
||
C00016E000
|
direct allocation
|
page read and write
|
||
C0000BA000
|
direct allocation
|
page read and write
|
||
7FF623717000
|
unkown
|
page write copy
|
||
C000178000
|
direct allocation
|
page read and write
|
||
349F000
|
heap
|
page read and write
|
||
C0001E2000
|
direct allocation
|
page read and write
|
||
C012000
|
direct allocation
|
page read and write
|
||
C000012000
|
direct allocation
|
page read and write
|
||
5AE4000
|
trusted library allocation
|
page read and write
|
||
C000079000
|
direct allocation
|
page read and write
|
||
56C8000
|
trusted library allocation
|
page read and write
|
||
C0001A2000
|
direct allocation
|
page read and write
|
||
C00013E000
|
direct allocation
|
page read and write
|
||
C000136000
|
direct allocation
|
page read and write
|
||
7FF7F82E7000
|
unkown
|
page readonly
|
||
C000372000
|
direct allocation
|
page read and write
|
||
657FFF000
|
stack
|
page read and write
|
||
C004D00000
|
direct allocation
|
page read and write
|
||
C0000C8000
|
direct allocation
|
page read and write
|
||
34FF000
|
heap
|
page read and write
|
||
3508000
|
heap
|
page read and write
|
||
C00000C000
|
direct allocation
|
page read and write
|
||
34DA000
|
heap
|
page read and write
|
||
C0056F0000
|
direct allocation
|
page read and write
|
||
353C000
|
heap
|
page read and write
|
||
56F4000
|
trusted library allocation
|
page read and write
|
||
34EF000
|
heap
|
page read and write
|
||
C020000
|
direct allocation
|
page read and write
|
||
59C3000
|
trusted library allocation
|
page read and write
|
||
5AA9000
|
trusted library allocation
|
page read and write
|
||
C000006000
|
direct allocation
|
page read and write
|
||
59C0000
|
trusted library allocation
|
page read and write
|
||
59C0000
|
trusted library allocation
|
page read and write
|
||
C000074000
|
direct allocation
|
page read and write
|
||
3535000
|
heap
|
page read and write
|
||
C00013A000
|
direct allocation
|
page read and write
|
||
C004000000
|
direct allocation
|
page read and write
|
||
C002000
|
direct allocation
|
page read and write
|
||
27B46DB0000
|
heap
|
page read and write
|
||
34F6000
|
heap
|
page read and write
|
||
2EA0000
|
remote allocation
|
page execute and read and write
|
||
56C1000
|
trusted library allocation
|
page read and write
|
||
56F9000
|
trusted library allocation
|
page read and write
|
||
C0000F4000
|
direct allocation
|
page read and write
|
||
C000024000
|
direct allocation
|
page read and write
|
||
BDFF000
|
stack
|
page read and write
|
||
3508000
|
heap
|
page read and write
|
||
3533000
|
heap
|
page read and write
|
||
C3B000
|
heap
|
page read and write
|
||
C00017C000
|
direct allocation
|
page read and write
|
||
C001BA8000
|
direct allocation
|
page read and write
|
||
C001BA9000
|
direct allocation
|
page read and write
|
||
3327000
|
heap
|
page read and write
|
||
34DA000
|
heap
|
page read and write
|
||
C00003D000
|
direct allocation
|
page read and write
|
||
C0001DA000
|
direct allocation
|
page read and write
|
||
C000057000
|
direct allocation
|
page read and write
|
||
C00018E000
|
direct allocation
|
page read and write
|
||
D9F000
|
stack
|
page read and write
|
||
C0000C6000
|
direct allocation
|
page read and write
|
||
27B46D50000
|
direct allocation
|
page read and write
|
||
5873000
|
trusted library allocation
|
page read and write
|
||
C0000B8000
|
direct allocation
|
page read and write
|
||
3641000
|
direct allocation
|
page read and write
|
||
7FF6FD5E6000
|
unkown
|
page write copy
|
||
5A81000
|
trusted library allocation
|
page read and write
|
||
C0000AC000
|
direct allocation
|
page read and write
|
||
5BD6000
|
trusted library allocation
|
page read and write
|
||
3508000
|
heap
|
page read and write
|
||
3535000
|
heap
|
page read and write
|
||
C0000D8000
|
direct allocation
|
page read and write
|
||
C0001E0000
|
direct allocation
|
page read and write
|
||
C00000C000
|
direct allocation
|
page read and write
|
||
C000176000
|
direct allocation
|
page read and write
|
||
C10C000
|
direct allocation
|
page read and write
|
||
7FF622241000
|
unkown
|
page execute read
|
||
C000156000
|
direct allocation
|
page read and write
|
||
59CE000
|
trusted library allocation
|
page read and write
|
||
BEDF000
|
stack
|
page read and write
|
||
5AF9000
|
trusted library allocation
|
page read and write
|
||
C03A000
|
direct allocation
|
page read and write
|
||
C000122000
|
direct allocation
|
page read and write
|
||
5708000
|
trusted library allocation
|
page read and write
|
||
35B7000
|
remote allocation
|
page execute and read and write
|
||
C000052000
|
direct allocation
|
page read and write
|
||
6583FD000
|
stack
|
page read and write
|
||
56FF000
|
trusted library allocation
|
page read and write
|
||
C00005D000
|
direct allocation
|
page read and write
|
||
A60000
|
heap
|
page readonly
|
||
FE421FF000
|
stack
|
page read and write
|
||
5700000
|
trusted library allocation
|
page read and write
|
||
C0001E4000
|
direct allocation
|
page read and write
|
||
3536000
|
heap
|
page read and write
|
||
C0001D8000
|
direct allocation
|
page read and write
|
||
C00013A000
|
direct allocation
|
page read and write
|
||
3780000
|
direct allocation
|
page read and write
|
||
59CD000
|
trusted library allocation
|
page read and write
|
||
C000038000
|
direct allocation
|
page read and write
|
||
FE423FC000
|
stack
|
page read and write
|
||
3770000
|
heap
|
page read and write
|
||
36DE000
|
stack
|
page read and write
|
||
C000046000
|
direct allocation
|
page read and write
|
||
C0004E0000
|
direct allocation
|
page read and write
|
||
3509000
|
heap
|
page read and write
|
||
5A54000
|
trusted library allocation
|
page read and write
|
||
7FF6FD635000
|
unkown
|
page write copy
|
||
C0011BA000
|
direct allocation
|
page read and write
|
||
353A000
|
heap
|
page read and write
|
||
C00004B000
|
direct allocation
|
page read and write
|
||
C00045E000
|
direct allocation
|
page read and write
|
||
3508000
|
heap
|
page read and write
|
||
C00017E000
|
direct allocation
|
page read and write
|
||
59C0000
|
trusted library allocation
|
page read and write
|
||
C0001AA000
|
direct allocation
|
page read and write
|
||
C000080000
|
direct allocation
|
page read and write
|
||
C000132000
|
direct allocation
|
page read and write
|
||
C080000
|
direct allocation
|
page read and write
|
||
7FF6226D5000
|
unkown
|
page write copy
|
||
C000080000
|
direct allocation
|
page read and write
|
||
C0001F3000
|
direct allocation
|
page read and write
|
||
C004CF0000
|
direct allocation
|
page read and write
|
||
7FF6FD5E8000
|
unkown
|
page read and write
|
||
C004C68000
|
direct allocation
|
page read and write
|
||
C000006000
|
direct allocation
|
page read and write
|
||
4E90000
|
remote allocation
|
page read and write
|
||
3533000
|
heap
|
page read and write
|
||
5C3C000
|
trusted library allocation
|
page read and write
|
||
C00005B000
|
direct allocation
|
page read and write
|
||
C188000
|
direct allocation
|
page read and write
|
||
C0000D8000
|
direct allocation
|
page read and write
|
||
860E3FF000
|
stack
|
page read and write
|
||
C0000AC000
|
direct allocation
|
page read and write
|
||
C000045000
|
direct allocation
|
page read and write
|
||
C0001C8000
|
direct allocation
|
page read and write
|
||
C00012C000
|
direct allocation
|
page read and write
|
||
56C8000
|
trusted library allocation
|
page read and write
|
||
C0001AA000
|
direct allocation
|
page read and write
|
||
5D34000
|
trusted library allocation
|
page read and write
|
||
C000456000
|
direct allocation
|
page read and write
|
||
C000560000
|
direct allocation
|
page read and write
|
||
C00003F000
|
direct allocation
|
page read and write
|
||
59C1000
|
trusted library allocation
|
page read and write
|
||
56C1000
|
trusted library allocation
|
page read and write
|
||
C000464000
|
direct allocation
|
page read and write
|
||
C004000
|
direct allocation
|
page read and write
|
||
C000196000
|
direct allocation
|
page read and write
|
||
5C1F000
|
trusted library allocation
|
page read and write
|
||
C01A000
|
direct allocation
|
page read and write
|
||
C0001DA000
|
direct allocation
|
page read and write
|
||
C00008D000
|
direct allocation
|
page read and write
|
||
C000000
|
direct allocation
|
page read and write
|
||
5700000
|
trusted library allocation
|
page read and write
|
||
C00015E000
|
direct allocation
|
page read and write
|
||
C000176000
|
direct allocation
|
page read and write
|
||
C0011EA000
|
direct allocation
|
page read and write
|
||
353A000
|
heap
|
page read and write
|
||
C0011F4000
|
direct allocation
|
page read and write
|
||
34DA000
|
heap
|
page read and write
|
||
34EF000
|
heap
|
page read and write
|
||
5711000
|
trusted library allocation
|
page read and write
|
||
59CE000
|
trusted library allocation
|
page read and write
|
||
C04A000
|
direct allocation
|
page read and write
|
||
C150000
|
direct allocation
|
page read and write
|
||
BFE0000
|
heap
|
page read and write
|
||
3535000
|
heap
|
page read and write
|
||
C12A000
|
direct allocation
|
page read and write
|
||
34DA000
|
heap
|
page read and write
|
||
59CB000
|
trusted library allocation
|
page read and write
|
||
BD5E000
|
stack
|
page read and write
|
||
3624000
|
direct allocation
|
page read and write
|
||
C0011EC000
|
direct allocation
|
page read and write
|
||
C000161000
|
direct allocation
|
page read and write
|
||
C000000000
|
direct allocation
|
page read and write
|
||
5B8D000
|
trusted library allocation
|
page read and write
|
||
7FF6FD371000
|
unkown
|
page execute read
|
||
5C0C000
|
trusted library allocation
|
page read and write
|
||
C000041000
|
direct allocation
|
page read and write
|
||
353C000
|
heap
|
page read and write
|
||
C13C000
|
direct allocation
|
page read and write
|
||
7FF6FD993000
|
unkown
|
page read and write
|
||
C0000E4000
|
direct allocation
|
page read and write
|
||
C0001BE000
|
direct allocation
|
page read and write
|
||
56C8000
|
trusted library allocation
|
page read and write
|
||
5B44000
|
trusted library allocation
|
page read and write
|
||
330F000
|
remote allocation
|
page execute and read and write
|
||
C00003B000
|
direct allocation
|
page read and write
|
||
BF5F000
|
stack
|
page read and write
|
||
3500000
|
heap
|
page read and write
|
||
C001125000
|
direct allocation
|
page read and write
|
||
C0023FF000
|
direct allocation
|
page read and write
|
||
27B46DB8000
|
heap
|
page read and write
|
||
3508000
|
heap
|
page read and write
|
||
AB0000
|
heap
|
page read and write
|
||
C000035000
|
direct allocation
|
page read and write
|
||
C0001E6000
|
direct allocation
|
page read and write
|
||
C0001E8000
|
direct allocation
|
page read and write
|
||
C0056F0000
|
direct allocation
|
page read and write
|
||
C000E00000
|
direct allocation
|
page read and write
|
||
3508000
|
heap
|
page read and write
|
||
353D000
|
heap
|
page read and write
|
||
C0000E2000
|
direct allocation
|
page read and write
|
||
C001BA3000
|
direct allocation
|
page read and write
|
||
756E7FF000
|
stack
|
page read and write
|
||
756E5FE000
|
stack
|
page read and write
|
||
C001BAC000
|
direct allocation
|
page read and write
|
||
C00013E000
|
direct allocation
|
page read and write
|
||
34FD000
|
heap
|
page read and write
|
||
C0000AE000
|
direct allocation
|
page read and write
|
||
353A000
|
heap
|
page read and write
|
||
5791000
|
trusted library allocation
|
page read and write
|
||
27B6C131000
|
direct allocation
|
page read and write
|
||
C184000
|
direct allocation
|
page read and write
|
||
5AE3000
|
trusted library allocation
|
page read and write
|
||
3533000
|
heap
|
page read and write
|
||
3533000
|
heap
|
page read and write
|
||
5A72000
|
trusted library allocation
|
page read and write
|
||
5739000
|
trusted library allocation
|
page read and write
|
||
27B47025000
|
heap
|
page read and write
|
||
C000026000
|
direct allocation
|
page read and write
|
||
C000020000
|
direct allocation
|
page read and write
|
||
56F7000
|
trusted library allocation
|
page read and write
|
||
34EF000
|
heap
|
page read and write
|
||
C0001DE000
|
direct allocation
|
page read and write
|
||
3535000
|
heap
|
page read and write
|
||
56C6000
|
trusted library allocation
|
page read and write
|
||
C000072000
|
direct allocation
|
page read and write
|
||
C000500000
|
direct allocation
|
page read and write
|
||
349F000
|
heap
|
page read and write
|
||
C000078000
|
direct allocation
|
page read and write
|
||
C020000
|
direct allocation
|
page read and write
|
||
27B6C1B3000
|
direct allocation
|
page read and write
|
||
34EF000
|
heap
|
page read and write
|
||
C00016D000
|
direct allocation
|
page read and write
|
||
5B4E000
|
trusted library allocation
|
page read and write
|
||
34DA000
|
heap
|
page read and write
|
||
349F000
|
heap
|
page read and write
|
||
59CC000
|
trusted library allocation
|
page read and write
|
||
5710000
|
trusted library allocation
|
page read and write
|
||
C000146000
|
direct allocation
|
page read and write
|
||
C004000000
|
direct allocation
|
page read and write
|
||
C000028000
|
direct allocation
|
page read and write
|
||
59C2000
|
trusted library allocation
|
page read and write
|
||
27B6C133000
|
direct allocation
|
page read and write
|
||
C0001A2000
|
direct allocation
|
page read and write
|
||
5AA1000
|
trusted library allocation
|
page read and write
|
||
C0001C8000
|
direct allocation
|
page read and write
|
||
C000116000
|
direct allocation
|
page read and write
|
||
C000031000
|
direct allocation
|
page read and write
|
||
C000036000
|
direct allocation
|
page read and write
|
||
C0001DC000
|
direct allocation
|
page read and write
|
||
C004CF0000
|
direct allocation
|
page read and write
|
||
C000022000
|
direct allocation
|
page read and write
|
||
C00003F000
|
direct allocation
|
page read and write
|
||
C028000
|
direct allocation
|
page read and write
|
||
3508000
|
heap
|
page read and write
|
||
C00017E000
|
direct allocation
|
page read and write
|
||
586D000
|
trusted library allocation
|
page read and write
|
||
C000006000
|
direct allocation
|
page read and write
|
||
C00001E000
|
direct allocation
|
page read and write
|
||
C0001CA000
|
direct allocation
|
page read and write
|
||
BE80000
|
direct allocation
|
page read and write
|
||
657DFF000
|
stack
|
page read and write
|
||
56C8000
|
trusted library allocation
|
page read and write
|
||
349F000
|
heap
|
page read and write
|
||
C0000AA000
|
direct allocation
|
page read and write
|
||
5A50000
|
trusted library allocation
|
page read and write
|
||
353B000
|
heap
|
page read and write
|
||
C01C000
|
direct allocation
|
page read and write
|
||
C001BBA000
|
direct allocation
|
page read and write
|
||
C000144000
|
direct allocation
|
page read and write
|
||
C000305000
|
direct allocation
|
page read and write
|
||
3536000
|
heap
|
page read and write
|
||
C00011C000
|
direct allocation
|
page read and write
|
||
5B7D000
|
trusted library allocation
|
page read and write
|
||
5796000
|
trusted library allocation
|
page read and write
|
||
C000102000
|
direct allocation
|
page read and write
|
||
C0001D8000
|
direct allocation
|
page read and write
|
||
C000138000
|
direct allocation
|
page read and write
|
||
7FF623727000
|
unkown
|
page readonly
|
||
C00006A000
|
direct allocation
|
page read and write
|
||
C0000C8000
|
direct allocation
|
page read and write
|
||
A75000
|
heap
|
page read and write
|
||
A3D000
|
stack
|
page read and write
|
||
C000084000
|
direct allocation
|
page read and write
|
||
59C8000
|
trusted library allocation
|
page read and write
|
||
3535000
|
heap
|
page read and write
|
||
59C7000
|
trusted library allocation
|
page read and write
|
||
27B46FC0000
|
direct allocation
|
page read and write
|
||
56C5000
|
trusted library allocation
|
page read and write
|
||
C00110E000
|
direct allocation
|
page read and write
|
||
C0001E6000
|
direct allocation
|
page read and write
|
||
27B46C20000
|
heap
|
page read and write
|
||
C000132000
|
direct allocation
|
page read and write
|
||
3516000
|
heap
|
page read and write
|
||
56C7000
|
trusted library allocation
|
page read and write
|
||
C00C000
|
direct allocation
|
page read and write
|
||
7FF6FD993000
|
unkown
|
page write copy
|
||
A80000
|
heap
|
page read and write
|
||
7CC000
|
stack
|
page read and write
|
||
59CC000
|
trusted library allocation
|
page read and write
|
||
21A7FA9F000
|
direct allocation
|
page read and write
|
||
34FD000
|
heap
|
page read and write
|
||
C001118000
|
direct allocation
|
page read and write
|
||
3508000
|
heap
|
page read and write
|
||
7FF623658000
|
unkown
|
page readonly
|
||
56C7000
|
trusted library allocation
|
page read and write
|
||
C00003C000
|
direct allocation
|
page read and write
|
||
C0000DC000
|
direct allocation
|
page read and write
|
||
59CA000
|
trusted library allocation
|
page read and write
|
||
59CA000
|
trusted library allocation
|
page read and write
|
||
C000080000
|
direct allocation
|
page read and write
|
||
C00005D000
|
direct allocation
|
page read and write
|
||
3508000
|
heap
|
page read and write
|
||
C000172000
|
direct allocation
|
page read and write
|
||
3536000
|
heap
|
page read and write
|
||
7FF6FD9A5000
|
unkown
|
page readonly
|
||
35D7000
|
remote allocation
|
page execute and read and write
|
||
C0056F0000
|
direct allocation
|
page read and write
|
||
3504000
|
heap
|
page read and write
|
||
56D9000
|
trusted library allocation
|
page read and write
|
||
C13A000
|
direct allocation
|
page read and write
|
||
3536000
|
heap
|
page read and write
|
||
C000167000
|
direct allocation
|
page read and write
|
||
59C5000
|
trusted library allocation
|
page read and write
|
||
3508000
|
heap
|
page read and write
|
||
7FF6FD5E0000
|
unkown
|
page write copy
|
||
C20000
|
direct allocation
|
page read and write
|
||
860E9FE000
|
stack
|
page read and write
|
||
27B6C350000
|
direct allocation
|
page read and write
|
||
3535000
|
heap
|
page read and write
|
||
353C000
|
heap
|
page read and write
|
||
C18E000
|
direct allocation
|
page read and write
|
||
59C7000
|
trusted library allocation
|
page read and write
|
||
C000266000
|
direct allocation
|
page read and write
|
||
C0000BA000
|
direct allocation
|
page read and write
|
||
BEE0000
|
direct allocation
|
page read and write
|
||
34A8000
|
heap
|
page read and write
|
||
C0035AE000
|
direct allocation
|
page read and write
|
||
A78000
|
direct allocation
|
page read and write
|
||
C000038000
|
direct allocation
|
page read and write
|
||
C000206000
|
direct allocation
|
page read and write
|
||
C000178000
|
direct allocation
|
page read and write
|
||
34DD000
|
heap
|
page read and write
|
||
C004000
|
direct allocation
|
page read and write
|
||
5AE7000
|
trusted library allocation
|
page read and write
|
||
C000016000
|
direct allocation
|
page read and write
|
||
3535000
|
heap
|
page read and write
|
||
C000162000
|
direct allocation
|
page read and write
|
||
34FD000
|
heap
|
page read and write
|
||
C00012C000
|
direct allocation
|
page read and write
|
||
34EF000
|
heap
|
page read and write
|
||
C0000AA000
|
direct allocation
|
page read and write
|
||
C0000E4000
|
direct allocation
|
page read and write
|
||
C000046000
|
direct allocation
|
page read and write
|
||
C000031000
|
direct allocation
|
page read and write
|
||
C000030000
|
direct allocation
|
page read and write
|
||
C00004D000
|
direct allocation
|
page read and write
|
||
C008000
|
direct allocation
|
page read and write
|
||
C000074000
|
direct allocation
|
page read and write
|
||
56C8000
|
trusted library allocation
|
page read and write
|
||
1F9F60CF000
|
direct allocation
|
page read and write
|
||
A00000
|
heap
|
page read and write
|
||
C001BA1000
|
direct allocation
|
page read and write
|
||
C001BA7000
|
direct allocation
|
page read and write
|
||
353C000
|
heap
|
page read and write
|
||
3533000
|
heap
|
page read and write
|
||
C132000
|
direct allocation
|
page read and write
|
||
C000027000
|
direct allocation
|
page read and write
|
||
C00011A000
|
direct allocation
|
page read and write
|
||
352E000
|
heap
|
page read and write
|
||
C058000
|
direct allocation
|
page read and write
|
||
C000070000
|
direct allocation
|
page read and write
|
||
5AFB000
|
trusted library allocation
|
page read and write
|
||
59C6000
|
trusted library allocation
|
page read and write
|
||
7FF623713000
|
unkown
|
page write copy
|
||
7FF7F7DF0000
|
unkown
|
page readonly
|
||
27B46FB0000
|
direct allocation
|
page read and write
|
||
BC8000
|
direct allocation
|
page read and write
|
||
C0004D0000
|
direct allocation
|
page read and write
|
||
56D9000
|
trusted library allocation
|
page read and write
|
||
C001BA5000
|
direct allocation
|
page read and write
|
||
C000050000
|
direct allocation
|
page read and write
|
||
27B6C390000
|
direct allocation
|
page read and write
|
||
C0001E8000
|
direct allocation
|
page read and write
|
||
C000022000
|
direct allocation
|
page read and write
|
||
C06C000
|
direct allocation
|
page read and write
|
||
575E000
|
trusted library allocation
|
page read and write
|
||
C0001A0000
|
direct allocation
|
page read and write
|
||
5B76000
|
trusted library allocation
|
page read and write
|
||
C001BA1000
|
direct allocation
|
page read and write
|
||
C001BA3000
|
direct allocation
|
page read and write
|
||
6577FF000
|
stack
|
page read and write
|
||
34F9000
|
heap
|
page read and write
|
||
353A000
|
heap
|
page read and write
|
||
C0001EC000
|
direct allocation
|
page read and write
|
||
C001BC4000
|
direct allocation
|
page read and write
|
||
C000014000
|
direct allocation
|
page read and write
|
||
1F9F4E20000
|
direct allocation
|
page read and write
|
||
C000037000
|
direct allocation
|
page read and write
|
||
C016000
|
direct allocation
|
page read and write
|
||
3760000
|
heap
|
page read and write
|
||
C00001A000
|
direct allocation
|
page read and write
|
||
C000066000
|
direct allocation
|
page read and write
|
||
C004D00000
|
direct allocation
|
page read and write
|
||
C000122000
|
direct allocation
|
page read and write
|
||
C000028000
|
direct allocation
|
page read and write
|
||
C00004E000
|
direct allocation
|
page read and write
|
||
58AB000
|
trusted library allocation
|
page read and write
|
||
C000120000
|
direct allocation
|
page read and write
|
||
5C5B000
|
trusted library allocation
|
page read and write
|
||
56F9000
|
trusted library allocation
|
page read and write
|
||
C000043000
|
direct allocation
|
page read and write
|
||
59C6000
|
trusted library allocation
|
page read and write
|
||
C000473000
|
direct allocation
|
page read and write
|
||
C07A000
|
direct allocation
|
page read and write
|
||
C00044A000
|
direct allocation
|
page read and write
|
||
59C3000
|
trusted library allocation
|
page read and write
|
||
27B46D00000
|
heap
|
page read and write
|
||
C000458000
|
direct allocation
|
page read and write
|
||
34F6000
|
heap
|
page read and write
|
||
34F7000
|
heap
|
page read and write
|
||
34FF000
|
heap
|
page read and write
|
||
C0000B4000
|
direct allocation
|
page read and write
|
||
C000031000
|
direct allocation
|
page read and write
|
||
3508000
|
heap
|
page read and write
|
||
C000124000
|
direct allocation
|
page read and write
|
||
C000138000
|
direct allocation
|
page read and write
|
||
5B0D000
|
trusted library allocation
|
page read and write
|
||
575E000
|
trusted library allocation
|
page read and write
|
||
C000004000
|
direct allocation
|
page read and write
|
||
FE41DFF000
|
stack
|
page read and write
|
||
34DA000
|
heap
|
page read and write
|
||
C0001A4000
|
direct allocation
|
page read and write
|
||
C124000
|
direct allocation
|
page read and write
|
||
5C2B000
|
trusted library allocation
|
page read and write
|
||
5790000
|
trusted library allocation
|
page read and write
|
||
34FD000
|
heap
|
page read and write
|
||
6625000
|
trusted library allocation
|
page read and write
|
||
C00010C000
|
direct allocation
|
page read and write
|
||
5745000
|
trusted library allocation
|
page read and write
|
||
C0001BA000
|
direct allocation
|
page read and write
|
||
3503000
|
heap
|
page read and write
|
||
C0001BA000
|
direct allocation
|
page read and write
|
||
59C5000
|
trusted library allocation
|
page read and write
|
||
C00001E000
|
direct allocation
|
page read and write
|
||
56F9000
|
trusted library allocation
|
page read and write
|
||
3533000
|
heap
|
page read and write
|
||
860E1FF000
|
stack
|
page read and write
|
||
C000180000
|
direct allocation
|
page read and write
|
||
59C1000
|
heap
|
page read and write
|
||
C0000B4000
|
direct allocation
|
page read and write
|
||
C0011B0000
|
direct allocation
|
page read and write
|
||
C000122000
|
direct allocation
|
page read and write
|
||
C002800000
|
direct allocation
|
page read and write
|
||
C000008000
|
direct allocation
|
page read and write
|
||
C000002000
|
direct allocation
|
page read and write
|
||
5A80000
|
trusted library allocation
|
page read and write
|
||
56D9000
|
trusted library allocation
|
page read and write
|
||
E2E000
|
stack
|
page read and write
|
||
C028000
|
direct allocation
|
page read and write
|
||
5745000
|
trusted library allocation
|
page read and write
|
||
BE87000
|
direct allocation
|
page read and write
|
||
350B000
|
heap
|
page read and write
|
||
C000476000
|
direct allocation
|
page read and write
|
||
56CD000
|
trusted library allocation
|
page read and write
|
||
C000178000
|
direct allocation
|
page read and write
|
||
59C1000
|
trusted library allocation
|
page read and write
|
||
2F18000
|
stack
|
page read and write
|
||
C000172000
|
direct allocation
|
page read and write
|
||
3508000
|
heap
|
page read and write
|
||
5B00000
|
trusted library allocation
|
page read and write
|
||
56F7000
|
trusted library allocation
|
page read and write
|
||
BFDF000
|
stack
|
page read and write
|
||
C00010C000
|
direct allocation
|
page read and write
|
||
BE3E000
|
stack
|
page read and write
|
||
C00018E000
|
direct allocation
|
page read and write
|
||
34FD000
|
heap
|
page read and write
|
||
21A7F630000
|
direct allocation
|
page read and write
|
||
5AE9000
|
trusted library allocation
|
page read and write
|
||
34FF000
|
heap
|
page read and write
|
||
27B47010000
|
direct allocation
|
page read and write
|
||
C000070000
|
direct allocation
|
page read and write
|
||
BD1F000
|
stack
|
page read and write
|
||
59C2000
|
trusted library allocation
|
page read and write
|
||
C026000
|
direct allocation
|
page read and write
|
||
C0001C4000
|
direct allocation
|
page read and write
|
||
C000156000
|
direct allocation
|
page read and write
|
||
C00000C000
|
direct allocation
|
page read and write
|
||
C0000AE000
|
direct allocation
|
page read and write
|
||
3503000
|
heap
|
page read and write
|
||
FE41BFD000
|
stack
|
page read and write
|
||
34FD000
|
heap
|
page read and write
|
||
C0001DC000
|
direct allocation
|
page read and write
|
||
5ABB000
|
trusted library allocation
|
page read and write
|
||
3508000
|
heap
|
page read and write
|
||
1F9F5C60000
|
direct allocation
|
page read and write
|
||
349F000
|
heap
|
page read and write
|
||
C000004000
|
direct allocation
|
page read and write
|
||
34E8000
|
heap
|
page read and write
|
||
C000198000
|
direct allocation
|
page read and write
|
||
C00001A000
|
direct allocation
|
page read and write
|
||
C00004D000
|
direct allocation
|
page read and write
|
||
C0000B2000
|
direct allocation
|
page read and write
|
||
3500000
|
heap
|
page read and write
|
||
3526000
|
heap
|
page read and write
|
||
59C3000
|
trusted library allocation
|
page read and write
|
||
C001BBC000
|
direct allocation
|
page read and write
|
||
C00011A000
|
direct allocation
|
page read and write
|
||
C000165000
|
direct allocation
|
page read and write
|
||
C00000A000
|
direct allocation
|
page read and write
|
||
C000064000
|
direct allocation
|
page read and write
|
||
C00000A000
|
direct allocation
|
page read and write
|
||
C00004A000
|
direct allocation
|
page read and write
|
||
C000162000
|
direct allocation
|
page read and write
|
||
353A000
|
heap
|
page read and write
|
||
34F6000
|
heap
|
page read and write
|
||
59CD000
|
trusted library allocation
|
page read and write
|
||
59C0000
|
trusted library allocation
|
page read and write
|
||
3508000
|
heap
|
page read and write
|
||
7FF622241000
|
unkown
|
page execute read
|
||
C010000
|
direct allocation
|
page read and write
|
||
A70000
|
direct allocation
|
page read and write
|
||
C136000
|
direct allocation
|
page read and write
|
||
34DA000
|
heap
|
page read and write
|
||
349D000
|
heap
|
page read and write
|
||
7FF6FD370000
|
unkown
|
page readonly
|
||
C00016E000
|
direct allocation
|
page read and write
|
||
3508000
|
heap
|
page read and write
|
||
34FF000
|
heap
|
page read and write
|
||
756EFFE000
|
stack
|
page read and write
|
||
56C8000
|
trusted library allocation
|
page read and write
|
||
C000088000
|
direct allocation
|
page read and write
|
||
27B6C170000
|
direct allocation
|
page read and write
|
||
1A960700000
|
direct allocation
|
page read and write
|
||
7FF622240000
|
unkown
|
page readonly
|
||
7FF6FD5E5000
|
unkown
|
page read and write
|
||
5B12000
|
trusted library allocation
|
page read and write
|
||
C000206000
|
direct allocation
|
page read and write
|
||
34F2000
|
heap
|
page read and write
|
||
7FF622737000
|
unkown
|
page readonly
|
||
3533000
|
heap
|
page read and write
|
||
C064000
|
direct allocation
|
page read and write
|
||
C182000
|
direct allocation
|
page read and write
|
||
C00047A000
|
direct allocation
|
page read and write
|
||
C0000F4000
|
direct allocation
|
page read and write
|
||
3535000
|
heap
|
page read and write
|
||
34EF000
|
heap
|
page read and write
|
||
C000E68000
|
direct allocation
|
page read and write
|
||
C040000
|
direct allocation
|
page read and write
|
||
59C2000
|
trusted library allocation
|
page read and write
|
||
C000078000
|
direct allocation
|
page read and write
|
||
5A94000
|
trusted library allocation
|
page read and write
|
||
56C1000
|
trusted library allocation
|
page read and write
|
||
34EF000
|
heap
|
page read and write
|
||
7FF6FD5E0000
|
unkown
|
page read and write
|
||
570E000
|
trusted library allocation
|
page read and write
|
||
5AB5000
|
trusted library allocation
|
page read and write
|
||
5A5D000
|
trusted library allocation
|
page read and write
|
||
C000128000
|
direct allocation
|
page read and write
|
||
34FD000
|
heap
|
page read and write
|
||
7FF6FD5E9000
|
unkown
|
page write copy
|
||
BD9F000
|
stack
|
page read and write
|
||
56C2000
|
trusted library allocation
|
page read and write
|
||
657BFE000
|
stack
|
page read and write
|
||
C00012C000
|
direct allocation
|
page read and write
|
||
C00004D000
|
direct allocation
|
page read and write
|
||
5A83000
|
trusted library allocation
|
page read and write
|
||
756F1FE000
|
stack
|
page read and write
|
||
3536000
|
heap
|
page read and write
|
||
C001123000
|
direct allocation
|
page read and write
|
||
34EF000
|
heap
|
page read and write
|
||
C000134000
|
direct allocation
|
page read and write
|
||
34F2000
|
heap
|
page read and write
|
||
C000066000
|
direct allocation
|
page read and write
|
||
C002800000
|
direct allocation
|
page read and write
|
||
3533000
|
heap
|
page read and write
|
||
589B000
|
trusted library allocation
|
page read and write
|
||
7FF622240000
|
unkown
|
page readonly
|
||
C00017C000
|
direct allocation
|
page read and write
|
||
C000124000
|
direct allocation
|
page read and write
|
||
C00003F000
|
direct allocation
|
page read and write
|
||
27B46FF1000
|
direct allocation
|
page read and write
|
||
C00001A000
|
direct allocation
|
page read and write
|
||
C0001E6000
|
direct allocation
|
page read and write
|
||
C0001A4000
|
direct allocation
|
page read and write
|
||
3533000
|
heap
|
page read and write
|
||
C000018000
|
direct allocation
|
page read and write
|
||
5BD3000
|
trusted library allocation
|
page read and write
|
||
353D000
|
heap
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
C014000
|
direct allocation
|
page read and write
|
||
4E90000
|
remote allocation
|
page read and write
|
||
C0000B6000
|
direct allocation
|
page read and write
|
||
3508000
|
heap
|
page read and write
|
||
7FF6FD370000
|
unkown
|
page readonly
|
||
56EB000
|
trusted library allocation
|
page read and write
|
||
FE41FFF000
|
stack
|
page read and write
|
||
C000138000
|
direct allocation
|
page read and write
|
||
C000068000
|
direct allocation
|
page read and write
|
||
C000052000
|
direct allocation
|
page read and write
|
||
C00001C000
|
direct allocation
|
page read and write
|
||
C000140000
|
direct allocation
|
page read and write
|
||
353A000
|
heap
|
page read and write
|
||
756EBFE000
|
stack
|
page read and write
|
||
C000198000
|
direct allocation
|
page read and write
|
||
3532000
|
heap
|
page read and write
|
||
C0037FC000
|
direct allocation
|
page read and write
|
||
353B000
|
heap
|
page read and write
|
||
56CA000
|
trusted library allocation
|
page read and write
|
||
34FD000
|
heap
|
page read and write
|
||
3532000
|
heap
|
page read and write
|
||
C00004C000
|
direct allocation
|
page read and write
|
||
C0000C6000
|
direct allocation
|
page read and write
|
||
C004CB2000
|
direct allocation
|
page read and write
|
||
5A78000
|
trusted library allocation
|
page read and write
|
||
59C3000
|
trusted library allocation
|
page read and write
|
||
C000010000
|
direct allocation
|
page read and write
|
||
3508000
|
heap
|
page read and write
|
||
5AD8000
|
trusted library allocation
|
page read and write
|
||
C0001F6000
|
direct allocation
|
page read and write
|
||
56E9000
|
trusted library allocation
|
page read and write
|
||
3539000
|
heap
|
page read and write
|
||
6E00000
|
trusted library allocation
|
page read and write
|
||
C0000F4000
|
direct allocation
|
page read and write
|
||
C000136000
|
direct allocation
|
page read and write
|
||
34EF000
|
heap
|
page read and write
|
||
59C5000
|
trusted library allocation
|
page read and write
|
||
349D000
|
heap
|
page read and write
|
||
C002000000
|
direct allocation
|
page read and write
|
||
756E3FC000
|
stack
|
page read and write
|
||
BB0000
|
heap
|
page readonly
|
||
593B000
|
trusted library allocation
|
page read and write
|
||
5BAE000
|
trusted library allocation
|
page read and write
|
||
C0000E4000
|
direct allocation
|
page read and write
|
||
371F000
|
stack
|
page read and write
|
||
349D000
|
heap
|
page read and write
|
||
27B46D54000
|
direct allocation
|
page read and write
|
||
7FF7F7DF1000
|
unkown
|
page execute read
|
||
34EF000
|
heap
|
page read and write
|
||
5AC4000
|
trusted library allocation
|
page read and write
|
||
C00006B000
|
direct allocation
|
page read and write
|
||
56D8000
|
trusted library allocation
|
page read and write
|
||
5AA3000
|
trusted library allocation
|
page read and write
|
||
7FF6FD989000
|
unkown
|
page read and write
|
||
C142000
|
direct allocation
|
page read and write
|
||
35D7000
|
remote allocation
|
page execute and read and write
|
||
860DDFF000
|
stack
|
page read and write
|
||
C000134000
|
direct allocation
|
page read and write
|
||
B9E000
|
stack
|
page read and write
|
||
56F4000
|
trusted library allocation
|
page read and write
|
||
C0023BA000
|
direct allocation
|
page read and write
|
||
C0001C4000
|
direct allocation
|
page read and write
|
||
C000168000
|
direct allocation
|
page read and write
|
||
E2E000
|
stack
|
page read and write
|
||
C001BB5000
|
direct allocation
|
page read and write
|
||
C000038000
|
direct allocation
|
page read and write
|
||
7FF6FD934000
|
unkown
|
page read and write
|
||
C00044E000
|
direct allocation
|
page read and write
|
||
C00011C000
|
direct allocation
|
page read and write
|
||
5C4F000
|
trusted library allocation
|
page read and write
|
||
860D9FF000
|
stack
|
page read and write
|
||
35BB000
|
remote allocation
|
page execute and read and write
|
||
59C3000
|
trusted library allocation
|
page read and write
|
||
860E5FC000
|
stack
|
page read and write
|
||
C000E00000
|
direct allocation
|
page read and write
|
||
C000022000
|
direct allocation
|
page read and write
|
||
756F3FF000
|
stack
|
page read and write
|
||
C0001B8000
|
direct allocation
|
page read and write
|
||
21A7FD76000
|
direct allocation
|
page read and write
|
||
1A960E46000
|
direct allocation
|
page read and write
|
||
5B08000
|
trusted library allocation
|
page read and write
|
||
C000022000
|
direct allocation
|
page read and write
|
There are 1168 hidden memdumps, click here to show them.