Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Document_a51_19i793302-14b09981a5569-3684u8.js
|
ASCII text, with very long lines (533), with CRLF line terminators
|
initial sample
|
||
:wtfbbq (copy)
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\sharepoint\360total.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Custom_update\Update_cd47bedf.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI181.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI54.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIA3.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIC4.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIFFD6.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Config.Msi\4e00e0.rbs
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
|
Microsoft Cabinet archive data, Windows 2000/XP setup, 69993 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks,
0x1 compression
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C5C8CC0A7FE31816B4641D0465402560
|
Certificate, Version=3
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C5C8CC0A7FE31816B4641D0465402560
|
data
|
dropped
|
||
C:\Windows\Installer\MSI103.tmp
|
data
|
dropped
|
||
C:\Windows\Installer\MSI846B.tmp
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Last Printed: Fri Dec 11 11:47:44
2009, Create Time/Date: Fri Dec 11 11:47:44 2009, Last Saved Time/Date: Fri Sep 18 15:06:51 2020, Security: 0, Code page:
1252, Revision Number: {6C81CEE0-3161-4D91-A688-254B67D7D838}, Number of Words: 10, Subject: 360 Total, Author: HuMaster LLC,
Name of Creating Application: 360 Total, Template: ;1033, Comments: This installer database contains the logic and data required
to install 360 Total., Title: Installation Database, Keywords: Installer, MSI, Database, Number of Pages: 200
|
dropped
|
||
C:\Windows\Installer\inprogressinstallinfo.ipi
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF0673ED736785A4D1.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF1472FD4508764B7C.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF2962571C7317E3C5.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF2C17C88212509880.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF41638D872A10A065.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF42BDB990109EC114.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF61773DAED613FFB9.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DFA3E2CC6CAB1B816A.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DFA850122BA55067CF.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DFC79B60F342C6D33F.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFF122760D5CC42A2E.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
There are 18 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\wscript.exe
|
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Document_a51_19i793302-14b09981a5569-3684u8.js"
|
||
C:\Windows\System32\msiexec.exe
|
C:\Windows\system32\msiexec.exe /V
|
||
C:\Windows\Installer\MSI181.tmp
|
"C:\Windows\Installer\MSI181.tmp" C:/Windows/System32/rundll32.exe C:\Users\user\AppData\Local\sharepoint\360total.dll, homq
|
||
C:\Windows\SysWOW64\rundll32.exe
|
"C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Local\sharepoint\360total.dll, homq
|
||
C:\Windows\System32\rundll32.exe
|
"C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Local\sharepoint\360total.dll, homq
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\AppData\Roaming\Custom_update\Update_cd47bedf.dll", homq
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\AppData\Roaming\Custom_update\Update_cd47bedf.dll", homq
|
||
C:\Windows\System32\cmd.exe
|
/c ipconfig /all
|
||
C:\Windows\System32\ipconfig.exe
|
ipconfig /all
|
||
C:\Windows\System32\cmd.exe
|
/c systeminfo
|
||
C:\Windows\System32\systeminfo.exe
|
systeminfo
|
||
C:\Windows\System32\cmd.exe
|
/c nltest /domain_trusts
|
||
C:\Windows\System32\cmd.exe
|
/c nltest /domain_trusts /all_trusts
|
||
C:\Windows\System32\cmd.exe
|
/c net view /all /domain
|
||
C:\Windows\System32\net.exe
|
net view /all /domain
|
||
C:\Windows\System32\cmd.exe
|
/c net view /all
|
||
C:\Windows\System32\net.exe
|
net view /all
|
||
C:\Windows\System32\cmd.exe
|
/c net group "Domain Admins" /domain
|
||
C:\Windows\System32\net.exe
|
net group "Domain Admins" /domain
|
||
C:\Windows\System32\cmd.exe
|
/c net config workstation
|
||
C:\Windows\System32\net.exe
|
net config workstation
|
||
C:\Windows\System32\cmd.exe
|
/c wmic.exe /node:localhost /namespace:\\root\SecurityCenter2 path AntiVirusProduct Get DisplayName | findstr /V /B /C:displayName
|| echo No Antivirus installed
|
||
C:\Windows\System32\cmd.exe
|
/c whoami /groups
|
||
C:\Windows\SysWOW64\msiexec.exe
|
C:\Windows\syswow64\MsiExec.exe -Embedding B0AF98778AC35F634802E620BDCA3C21
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http:///
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://473750571567004317064230583514468350804565684324378075159610742091604698238217701484029465762430135913242023857750034401559054060945654540273638867228794983640833862748912121851334807031249099092790952130035074227943842970399582505875/
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2056 --field-trial-handle=1996,i,12555166688129216027,17064817212319626723,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2040 --field-trial-handle=1952,i,10714614445797353568,16368385931931740060,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\wbem\WmiPrvSE.exe
|
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\nltest.exe
|
nltest /domain_trusts
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\nltest.exe
|
nltest /domain_trusts /all_trusts
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\net1.exe
|
C:\Windows\system32\net1 group "Domain Admins" /domain
|
||
C:\Windows\System32\wbem\WMIC.exe
|
/Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get * /Format:List
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\net1.exe
|
C:\Windows\system32\net1 config workstation
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\wbem\WMIC.exe
|
wmic.exe /node:localhost /namespace:\\root\SecurityCenter2 path AntiVirusProduct Get DisplayName
|
||
C:\Windows\System32\findstr.exe
|
findstr /V /B /C:displayName
|
There are 36 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://startmast.shop/live/
|
|||
https://jarinamaers.shop/files/stkm.bin
|
104.21.46.75
|
||
https://pewwhranet.com/live/
|
172.67.197.34
|
||
https://grizmotras.com/live/
|
172.67.219.28
|
||
https://jarinamaers.shop/live/
|
104.21.46.75
|
||
https://jarinamaers.shop/
|
unknown
|
||
http://146.19.106.236/neo.msi
|
146.19.106.236
|
||
https://pewwhranet.com/
|
unknown
|
||
https://jarinamaers.shop/live/dll
|
unknown
|
||
https://grizmotras.com/live/S
|
unknown
|
||
http://pconf.f.360.cn/safe_update.php
|
unknown
|
||
https://grizmotras.com/E0#W
|
unknown
|
||
https://grizmotras.com/live/ras.com/live/
|
unknown
|
||
https://jarinamaers.shop/?
|
unknown
|
||
https://grizmotras.com/live/URLS1https://pewwhranet.com/live/
|
unknown
|
||
https://jarinamaers.shop/live/(y
|
unknown
|
||
https://pewwhranet.com/live/My
|
unknown
|
||
https://pewwhranet.com/4g9V
|
unknown
|
||
https://pewwhranet.com/Pb
|
unknown
|
||
https://pewwhranet.com/=0
|
unknown
|
||
http://dr.f.360.cn/scanlist
|
unknown
|
||
https://pewwhranet.com/d
|
unknown
|
||
https://grizmotras.com/Li
|
unknown
|
||
https://grizmotras.com/live/l
|
unknown
|
||
https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
|
142.250.217.228
|
||
https://jarinamaers.shop/live/J$=W
|
unknown
|
||
http://secure.globalsign
|
unknown
|
||
https://grizmotras.cH
|
unknown
|
||
http://cacerts.di
|
unknown
|
||
https://jarinamaers.shop/live/s6
|
unknown
|
||
http://146.19.106.236/neo.msi-995103104311030230
|
unknown
|
||
https://grizmotras.com/live/hy
|
unknown
|
||
https://jarinamaers.shop/live/l
|
unknown
|
||
ftp://ftp%2desktop.ini
|
unknown
|
||
https://grizmotras.com/
|
unknown
|
||
https://www.google.com/async/newtab_promos
|
142.250.217.228
|
||
http://146.19.106.236/neo.msi0
|
unknown
|
||
https://pewwhranet.com/live/ll
|
unknown
|
||
https://grizmotras.com/es
|
unknown
|
||
https://grizmotras.com/w
|
unknown
|
||
https://jarinamaers.shop/live/P
|
unknown
|
||
https://www.google.com/async/ddljson?async=ntp:2
|
142.250.217.228
|
||
http://pscan.f.360.cn/safe_update.php
|
unknown
|
||
http://secure.globalsign)
|
unknown
|
||
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
|
142.250.217.228
|
||
https://www.thawte.com/cps0/
|
unknown
|
||
http://pscan.f.360.cn/safe_update.phphttp://pconf.f.360.cn/safe_update.phphttp://sconf.f.360.cn/clie
|
unknown
|
||
https://jarinamaers.shop/live/OIDV6SW/
|
unknown
|
||
https://www.thawte.com/repository0W
|
unknown
|
||
https://www.google.com/sorry/index?continue=https://www.google.com/async/newtab_promos&q=EgRmgZjcGLizsLEGIjAYi0E5THM4aIj8FUOrJpdUpPAhU1RG5ebUtVLBNvumYZ4qVuqJu7WbwqMCr0qqjPIyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
|
142.250.217.228
|
||
https://grizmotras.com/H
|
unknown
|
||
http://sconf.f.360.cn/client_security_conf
|
unknown
|
||
http://crl3.digic
|
unknown
|
||
http://dr.f.360.cn/scan
|
unknown
|
||
https://www.advancedinstaller.com
|
unknown
|
||
https://www.google.com/sorry/index?continue=https://www.google.com/async/newtab_ogb%3Fhl%3Den-US%26async%3Dfixed:0&hl=en-US&q=EgRmgZjcGLizsLEGIjBzxD8y3zpVM4rvYXOzD0wZHGfxDV2C93K9X3HWoqlaBUqfM3Uck6U5jewh4t8bDhoyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
|
142.250.217.228
|
||
https://pewwhranet.c
|
unknown
|
||
https://pewwhranet.com/(h)W$
|
unknown
|
||
https://grizmotras.com/live/rW
|
unknown
|
There are 49 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
jarinamaers.shop
|
104.21.46.75
|
||
pewwhranet.com
|
172.67.197.34
|
||
grizmotras.com
|
172.67.219.28
|
||
www.google.com
|
142.250.217.228
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.21.46.75
|
jarinamaers.shop
|
United States
|
||
172.67.197.34
|
pewwhranet.com
|
United States
|
||
172.67.219.28
|
grizmotras.com
|
United States
|
||
142.250.217.228
|
www.google.com
|
United States
|
||
192.168.2.4
|
unknown
|
unknown
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
192.168.2.13
|
unknown
|
unknown
|
||
192.168.2.23
|
unknown
|
unknown
|
||
192.168.2.15
|
unknown
|
unknown
|
||
192.168.2.14
|
unknown
|
unknown
|
||
146.19.106.236
|
unknown
|
France
|
There are 1 hidden IPs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\wscript.exe
|
JScriptSetScriptStateStarted
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Config.Msi\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
C:\Config.Msi\4e00e0.rbs
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
C:\Config.Msi\4e00e0.rbsLow
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Users\user\AppData\Roaming\Microsoft\Installer\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Components\C72CC84B32896524285338B4DFD2D0BB
|
E927531B47501D447B1AE64455F005B6
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Components\F5D323A437D662C4E893EB9882AD31BE
|
E927531B47501D447B1AE64455F005B6
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Components\895F9FDA48B79C541BAC8E90865A83AB
|
E927531B47501D447B1AE64455F005B6
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Users\user\AppData\Roaming\HuMaster LLC\360 Total\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Users\user\AppData\Roaming\HuMaster LLC\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Users\user\AppData\Local\sharepoint\
|
||
HKEY_CURRENT_USER\SOFTWARE\HuMaster LLC\360 Total
|
Version
|
||
HKEY_CURRENT_USER\SOFTWARE\HuMaster LLC\360 Total
|
Path
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
|
@%SystemRoot%\system32\mlang.dll,-4387
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
|
@%SystemRoot%\system32\mlang.dll,-4407
|
There are 8 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1800FE30000
|
direct allocation
|
page execute and read and write
|
||
1800FA60000
|
direct allocation
|
page execute and read and write
|
||
1800FE30000
|
direct allocation
|
page execute and read and write
|
||
1800FE30000
|
direct allocation
|
page execute and read and write
|
||
1800FE30000
|
direct allocation
|
page execute and read and write
|
||
235B4340000
|
direct allocation
|
page read and write
|
||
235B5CE0000
|
direct allocation
|
page execute and read and write
|
||
1800FE30000
|
direct allocation
|
page execute and read and write
|
||
1EF532A0000
|
direct allocation
|
page read and write
|
||
18010010000
|
direct allocation
|
page execute and read and write
|
||
1EF532B0000
|
direct allocation
|
page execute and read and write
|
||
1800FA60000
|
direct allocation
|
page execute and read and write
|
||
1800FA60000
|
direct allocation
|
page execute and read and write
|
||
26334480000
|
heap
|
page read and write
|
||
1BA315AD000
|
heap
|
page read and write
|
||
1BA30DB7000
|
heap
|
page read and write
|
||
1800FF1B000
|
heap
|
page read and write
|
||
180100F0000
|
direct allocation
|
page execute and read and write
|
||
1800FF2E000
|
heap
|
page read and write
|
||
23F97D8E000
|
heap
|
page read and write
|
||
1800FF56000
|
heap
|
page read and write
|
||
1EF53140000
|
heap
|
page read and write
|
||
2E80000
|
heap
|
page read and write
|
||
1800FF2E000
|
heap
|
page read and write
|
||
2C733683000
|
heap
|
page read and write
|
||
24E2BB05000
|
heap
|
page read and write
|
||
1BA30FC0000
|
trusted library allocation
|
page read and write
|
||
1800FF56000
|
heap
|
page read and write
|
||
1800FF3F000
|
heap
|
page read and write
|
||
1800FF2E000
|
heap
|
page read and write
|
||
BDC000
|
stack
|
page read and write
|
||
B538FFB000
|
stack
|
page read and write
|
||
1800FF4C000
|
heap
|
page read and write
|
||
1BA30DFC000
|
heap
|
page read and write
|
||
1800FF46000
|
heap
|
page read and write
|
||
23F97C18000
|
heap
|
page read and write
|
||
1800FF56000
|
heap
|
page read and write
|
||
1800FF2C000
|
heap
|
page read and write
|
||
23F99BD4000
|
heap
|
page read and write
|
||
1BA315AD000
|
heap
|
page read and write
|
||
2C7335C0000
|
heap
|
page read and write
|
||
1434AC74000
|
heap
|
page read and write
|
||
1800FF2E000
|
heap
|
page read and write
|
||
707EFF000
|
stack
|
page read and write
|
||
1800FF35000
|
heap
|
page read and write
|
||
18010160000
|
direct allocation
|
page execute and read and write
|
||
1FBDD475000
|
heap
|
page read and write
|
||
788A36F000
|
stack
|
page read and write
|
||
2C733689000
|
heap
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
1800FF1C000
|
heap
|
page read and write
|
||
228C50C000
|
stack
|
page read and write
|
||
1BA31440000
|
heap
|
page read and write
|
||
23BEC0DC000
|
heap
|
page read and write
|
||
1800FF2A000
|
heap
|
page read and write
|
||
1434AE00000
|
heap
|
page read and write
|
||
23BEC4D8000
|
heap
|
page read and write
|
||
23F97C1D000
|
heap
|
page read and write
|
||
23F97C82000
|
heap
|
page read and write
|
||
1BA30DD3000
|
heap
|
page read and write
|
||
23F97C6C000
|
heap
|
page read and write
|
||
1800FF56000
|
heap
|
page read and write
|
||
1800FF2C000
|
heap
|
page read and write
|
||
23F97C53000
|
heap
|
page read and write
|
||
180100E0000
|
direct allocation
|
page execute and read and write
|
||
23BE9EB0000
|
heap
|
page read and write
|
||
27757770000
|
heap
|
page read and write
|
||
1BA30DD8000
|
heap
|
page read and write
|
||
1BA30FE0000
|
heap
|
page read and write
|
||
8797EFE000
|
stack
|
page read and write
|
||
23BE9EE5000
|
heap
|
page read and write
|
||
788A36B000
|
stack
|
page read and write
|
||
1D440260000
|
heap
|
page read and write
|
||
1FBDD100000
|
heap
|
page read and write
|
||
1800F9B0000
|
trusted library allocation
|
page read and write
|
||
20C5C900000
|
heap
|
page read and write
|
||
2A61B018000
|
heap
|
page read and write
|
||
18010010000
|
direct allocation
|
page execute and read and write
|
||
221F3BF0000
|
heap
|
page read and write
|
||
23F9834D000
|
heap
|
page read and write
|
||
B5389FE000
|
stack
|
page read and write
|
||
2785CC4B000
|
heap
|
page read and write
|
||
1800FF51000
|
heap
|
page read and write
|
||
1FBDD0E8000
|
heap
|
page read and write
|
||
1800FF56000
|
heap
|
page read and write
|
||
1BA30DF5000
|
heap
|
page read and write
|
||
1800FF56000
|
heap
|
page read and write
|
||
180100E0000
|
direct allocation
|
page execute and read and write
|
||
180001000
|
unkown
|
page execute read
|
||
23BEA150000
|
remote allocation
|
page read and write
|
||
1800FF56000
|
heap
|
page read and write
|
||
20C5C9B0000
|
heap
|
page read and write
|
||
1800FF56000
|
heap
|
page read and write
|
||
1800FF29000
|
heap
|
page read and write
|
||
1800FF29000
|
heap
|
page read and write
|
||
1BA30DF5000
|
heap
|
page read and write
|
||
2C733693000
|
heap
|
page read and write
|
||
26334690000
|
heap
|
page read and write
|
||
23F97C5D000
|
heap
|
page read and write
|
||
1BA30DE5000
|
heap
|
page read and write
|
||
23BEC4B5000
|
heap
|
page read and write
|
||
235B5F30000
|
direct allocation
|
page execute and read and write
|
||
180100F0000
|
direct allocation
|
page execute and read and write
|
||
2C7336BD000
|
heap
|
page read and write
|
||
1800FF2A000
|
heap
|
page read and write
|
||
8797E7E000
|
stack
|
page read and write
|
||
C85E5FE000
|
stack
|
page read and write
|
||
180100F0000
|
direct allocation
|
page execute and read and write
|
||
1800DFFF000
|
heap
|
page read and write
|
||
1EF53240000
|
heap
|
page read and write
|
||
23BEC468000
|
heap
|
page read and write
|
||
1800C6000
|
unkown
|
page write copy
|
||
23BEC4BB000
|
heap
|
page read and write
|
||
707CFC000
|
stack
|
page read and write
|
||
1800FF56000
|
heap
|
page read and write
|
||
1800FF10000
|
heap
|
page read and write
|
||
1800FF56000
|
heap
|
page read and write
|
||
23F97C7D000
|
heap
|
page read and write
|
||
1800FF47000
|
heap
|
page read and write
|
||
23BE9F3C000
|
heap
|
page read and write
|
||
23F97C1D000
|
heap
|
page read and write
|
||
23BEC4DB000
|
heap
|
page read and write
|
||
1800FF2C000
|
heap
|
page read and write
|
||
235B46C0000
|
heap
|
page read and write
|
||
23BEC4CF000
|
heap
|
page read and write
|
||
8A88D4C000
|
stack
|
page read and write
|
||
23F98338000
|
heap
|
page read and write
|
||
180100E0000
|
direct allocation
|
page execute and read and write
|
||
1800F9B0000
|
trusted library allocation
|
page read and write
|
||
1800FF2E000
|
heap
|
page read and write
|
||
1800FF2E000
|
heap
|
page read and write
|
||
235B42B0000
|
heap
|
page read and write
|
||
18010110000
|
direct allocation
|
page execute and read and write
|
||
235B4350000
|
heap
|
page read and write
|
||
1D440280000
|
heap
|
page read and write
|
||
B5391FD000
|
stack
|
page read and write
|
||
221F3FF0000
|
heap
|
page read and write
|
||
1800FF56000
|
heap
|
page read and write
|
||
FCFA0AB000
|
stack
|
page read and write
|
||
23F9833C000
|
heap
|
page read and write
|
||
20C5C804000
|
heap
|
page read and write
|
||
1800FF51000
|
heap
|
page read and write
|
||
20C5C8E0000
|
heap
|
page read and write
|
||
23BEC4DB000
|
heap
|
page read and write
|
||
2A42FB40000
|
heap
|
page read and write
|
||
263343A0000
|
heap
|
page read and write
|
||
1D80CC90000
|
heap
|
page read and write
|
||
1800F9B0000
|
trusted library allocation
|
page read and write
|
||
23F97C56000
|
heap
|
page read and write
|
||
FCFA1AE000
|
stack
|
page read and write
|
||
B5388FE000
|
stack
|
page read and write
|
||
1800FF3F000
|
heap
|
page read and write
|
||
23F9833E000
|
heap
|
page read and write
|
||
DBB000
|
heap
|
page read and write
|
||
1BA30DD8000
|
heap
|
page read and write
|
||
2C733695000
|
heap
|
page read and write
|
||
1BA315A7000
|
heap
|
page read and write
|
||
20C5C9A0000
|
heap
|
page read and write
|
||
B538557000
|
stack
|
page read and write
|
||
23F97D85000
|
heap
|
page read and write
|
||
1800DFFF000
|
heap
|
page read and write
|
||
23F99BD3000
|
heap
|
page read and write
|
||
334F000
|
stack
|
page read and write
|
||
180100F0000
|
direct allocation
|
page execute and read and write
|
||
1800FF3E000
|
heap
|
page read and write
|
||
1800FF4E000
|
heap
|
page read and write
|
||
2E4387C000
|
stack
|
page read and write
|
||
1800DFC9000
|
heap
|
page read and write
|
||
23BEC4C4000
|
heap
|
page read and write
|
||
23BEC495000
|
heap
|
page read and write
|
||
FC262FF000
|
unkown
|
page read and write
|
||
2C733693000
|
heap
|
page read and write
|
||
23BEC4DB000
|
heap
|
page read and write
|
||
235B5EF0000
|
direct allocation
|
page execute and read and write
|
||
2A42FEB0000
|
heap
|
page read and write
|
||
580000
|
unkown
|
page readonly
|
||
23BEC4BA000
|
heap
|
page read and write
|
||
1800FF56000
|
heap
|
page read and write
|
||
1BA315A2000
|
heap
|
page read and write
|
||
DA8000
|
heap
|
page read and write
|
||
1A2254C0000
|
heap
|
page read and write
|
||
1BA315A3000
|
heap
|
page read and write
|
||
23F98330000
|
heap
|
page read and write
|
||
1FBDD090000
|
heap
|
page read and write
|
||
1800FF29000
|
heap
|
page read and write
|
||
18010070000
|
direct allocation
|
page execute and read and write
|
||
18010310000
|
direct allocation
|
page execute and read and write
|
||
277577A0000
|
heap
|
page read and write
|
||
1D80CB9B000
|
heap
|
page read and write
|
||
10AD000
|
stack
|
page read and write
|
||
1800FA90000
|
direct allocation
|
page execute and read and write
|
||
1800FAC0000
|
direct allocation
|
page execute and read and write
|
||
1800FF2C000
|
heap
|
page read and write
|
||
2C7336A7000
|
heap
|
page read and write
|
||
23F97C64000
|
heap
|
page read and write
|
||
1800FF3F000
|
heap
|
page read and write
|
||
1D4402D5000
|
heap
|
page read and write
|
||
2DA81420000
|
heap
|
page read and write
|
||
2A61AF00000
|
heap
|
page read and write
|
||
23F97D40000
|
trusted library allocation
|
page read and write
|
||
1800FF35000
|
heap
|
page read and write
|
||
23F97C6E000
|
heap
|
page read and write
|
||
23E66A40000
|
heap
|
page read and write
|
||
23BEBE71000
|
heap
|
page read and write
|
||
1800FF56000
|
heap
|
page read and write
|
||
1BA30FEA000
|
heap
|
page read and write
|
||
1800FF35000
|
heap
|
page read and write
|
||
23F97C77000
|
heap
|
page read and write
|
||
1D440090000
|
heap
|
page read and write
|
||
23F98361000
|
heap
|
page read and write
|
||
23BEC4C9000
|
heap
|
page read and write
|
||
23BEC4C9000
|
heap
|
page read and write
|
||
1BA315BA000
|
heap
|
page read and write
|
||
23F97C75000
|
heap
|
page read and write
|
||
1800FF3E000
|
heap
|
page read and write
|
||
1800FE30000
|
direct allocation
|
page execute and read and write
|
||
1BA315C1000
|
heap
|
page read and write
|
||
1800FF28000
|
heap
|
page read and write
|
||
23BE9EE6000
|
heap
|
page read and write
|
||
1800FF56000
|
heap
|
page read and write
|
||
1FBDD101000
|
heap
|
page read and write
|
||
235B5F50000
|
direct allocation
|
page execute and read and write
|
||
23BEC4D8000
|
heap
|
page read and write
|
||
1800FF2C000
|
heap
|
page read and write
|
||
23F9835E000
|
heap
|
page read and write
|
||
1800FF00000
|
remote allocation
|
page read and write
|
||
1800FF56000
|
heap
|
page read and write
|
||
23BEC4C9000
|
heap
|
page read and write
|
||
2C7336A7000
|
heap
|
page read and write
|
||
20C5C7E0000
|
heap
|
page read and write
|
||
1BA315A3000
|
heap
|
page read and write
|
||
24E2B830000
|
heap
|
page read and write
|
||
180100E0000
|
direct allocation
|
page execute and read and write
|
||
5E0000
|
unkown
|
page readonly
|
||
1800FF4B000
|
heap
|
page read and write
|
||
23E66A60000
|
heap
|
page read and write
|
||
1800FF47000
|
heap
|
page read and write
|
||
1800FF35000
|
heap
|
page read and write
|
||
23BEBD73000
|
heap
|
page read and write
|
||
221F3C40000
|
heap
|
page read and write
|
||
1800FF35000
|
heap
|
page read and write
|
||
1800FF2E000
|
heap
|
page read and write
|
||
1BA30E06000
|
heap
|
page read and write
|
||
23F98358000
|
heap
|
page read and write
|
||
305AAFF000
|
stack
|
page read and write
|
||
1800DFC7000
|
heap
|
page read and write
|
||
1800E004000
|
heap
|
page read and write
|
||
1800DFC9000
|
heap
|
page read and write
|
||
20882CAF000
|
heap
|
page read and write
|
||
1800FF3E000
|
heap
|
page read and write
|
||
23BEBD71000
|
heap
|
page read and write
|
||
F8B0D8D000
|
stack
|
page read and write
|
||
23BEC48A000
|
heap
|
page read and write
|
||
B5390FF000
|
stack
|
page read and write
|
||
180100E0000
|
direct allocation
|
page execute and read and write
|
||
1800FF56000
|
heap
|
page read and write
|
||
1800FF54000
|
heap
|
page read and write
|
||
1800F9B0000
|
trusted library allocation
|
page read and write
|
||
1BA31340000
|
heap
|
page read and write
|
||
180100C0000
|
direct allocation
|
page execute and read and write
|
||
1800FF2A000
|
heap
|
page read and write
|
||
1BA30DA0000
|
heap
|
page read and write
|
||
277577B0000
|
heap
|
page read and write
|
||
1BA3144E000
|
heap
|
page read and write
|
||
1BA315A5000
|
heap
|
page read and write
|
||
23BEC4D8000
|
heap
|
page read and write
|
||
1800FF4B000
|
heap
|
page read and write
|
||
1800FF3F000
|
heap
|
page read and write
|
||
1BA31590000
|
heap
|
page read and write
|
||
23BEC4D8000
|
heap
|
page read and write
|
||
23F9833C000
|
heap
|
page read and write
|
||
1D80CE20000
|
heap
|
page read and write
|
||
1800FF3E000
|
heap
|
page read and write
|
||
180103B5000
|
direct allocation
|
page execute and read and write
|
||
27757820000
|
heap
|
page read and write
|
||
1800FF35000
|
heap
|
page read and write
|
||
263344DB000
|
heap
|
page read and write
|
||
1800FF2A000
|
heap
|
page read and write
|
||
1800FF56000
|
heap
|
page read and write
|
||
1800FF2E000
|
heap
|
page read and write
|
||
1BA315BA000
|
heap
|
page read and write
|
||
23F97C39000
|
heap
|
page read and write
|
||
1800FF56000
|
heap
|
page read and write
|
||
235B5EC0000
|
direct allocation
|
page execute and read and write
|
||
1800FF47000
|
heap
|
page read and write
|
||
23BEC4D8000
|
heap
|
page read and write
|
||
826BD8C000
|
stack
|
page read and write
|
||
1800FF2A000
|
heap
|
page read and write
|
||
20882F15000
|
heap
|
page read and write
|
||
1800FF2E000
|
heap
|
page read and write
|
||
E16C2FB000
|
stack
|
page read and write
|
||
23BE9ED1000
|
heap
|
page read and write
|
||
1800FF35000
|
heap
|
page read and write
|
||
20882B60000
|
heap
|
page read and write
|
||
1800DFB4000
|
heap
|
page read and write
|
||
1800FF00000
|
remote allocation
|
page read and write
|
||
B538EFC000
|
stack
|
page read and write
|
||
2C0F2370000
|
heap
|
page read and write
|
||
1BA3159E000
|
heap
|
page read and write
|
||
1800FF35000
|
heap
|
page read and write
|
||
23F97D80000
|
heap
|
page read and write
|
||
461487E000
|
stack
|
page read and write
|
||
23BEC499000
|
heap
|
page read and write
|
||
235B5E10000
|
trusted library allocation
|
page read and write
|
||
23F9834D000
|
heap
|
page read and write
|
||
23F97C71000
|
heap
|
page read and write
|
||
1EF53351000
|
heap
|
page read and write
|
||
23F98358000
|
heap
|
page read and write
|
||
1800FF56000
|
heap
|
page read and write
|
||
1800FF2E000
|
heap
|
page read and write
|
||
1800FF3F000
|
heap
|
page read and write
|
||
23F97D8A000
|
heap
|
page read and write
|
||
1D80CD70000
|
heap
|
page read and write
|
||
23BE9EF3000
|
heap
|
page read and write
|
||
23BEBE71000
|
heap
|
page read and write
|
||
23F97C66000
|
heap
|
page read and write
|
||
870F68D000
|
stack
|
page read and write
|
||
99A33AD000
|
stack
|
page read and write
|
||
1800FF3E000
|
heap
|
page read and write
|
||
23F97C7B000
|
heap
|
page read and write
|
||
2C733668000
|
heap
|
page read and write
|
||
B538BFF000
|
stack
|
page read and write
|
||
BC8A17D000
|
stack
|
page read and write
|
||
23F99DC0000
|
heap
|
page read and write
|
||
23BEC4D6000
|
heap
|
page read and write
|
||
1800FF35000
|
heap
|
page read and write
|
||
2785CAD0000
|
heap
|
page read and write
|
||
235B5E40000
|
trusted library allocation
|
page read and write
|
||
18010010000
|
direct allocation
|
page execute and read and write
|
||
11AE000
|
stack
|
page read and write
|
||
1800FF45000
|
heap
|
page read and write
|
||
23BEA150000
|
remote allocation
|
page read and write
|
||
23F98346000
|
heap
|
page read and write
|
||
1FBDD0EC000
|
heap
|
page read and write
|
||
FC25FEB000
|
stack
|
page read and write
|
||
23E66E95000
|
heap
|
page read and write
|
||
23BE9DC0000
|
heap
|
page read and write
|
||
1800FF35000
|
heap
|
page read and write
|
||
870F78E000
|
stack
|
page read and write
|
||
1800FF56000
|
heap
|
page read and write
|
||
23BEBF5B000
|
heap
|
page read and write
|
||
23BE9E30000
|
heap
|
page read and write
|
||
1BA30FF0000
|
trusted library allocation
|
page read and write
|
||
23BEC100000
|
heap
|
page read and write
|
||
D3C79BC000
|
stack
|
page read and write
|
||
18010020000
|
direct allocation
|
page execute and read and write
|
||
23BEC4D8000
|
heap
|
page read and write
|
||
23BEC4D6000
|
heap
|
page read and write
|
||
1BA315CD000
|
heap
|
page read and write
|
||
C85E14B000
|
stack
|
page read and write
|
||
23F97C77000
|
heap
|
page read and write
|
||
2DA81290000
|
heap
|
page read and write
|
||
1800FF35000
|
heap
|
page read and write
|
||
23F97C00000
|
heap
|
page read and write
|
||
1434AC50000
|
heap
|
page read and write
|
||
23F97D83000
|
heap
|
page read and write
|
||
23BEBD71000
|
heap
|
page read and write
|
||
21045B47000
|
heap
|
page read and write
|
||
1800FF2C000
|
heap
|
page read and write
|
||
2785CBD0000
|
heap
|
page read and write
|
||
2A61B165000
|
heap
|
page read and write
|
||
2E4397F000
|
stack
|
page read and write
|
||
4614537000
|
stack
|
page read and write
|
||
1800FF56000
|
heap
|
page read and write
|
||
1800C5000
|
unkown
|
page read and write
|
||
235B42C0000
|
heap
|
page read and write
|
||
F8B107E000
|
stack
|
page read and write
|
||
23BEC4C3000
|
heap
|
page read and write
|
||
1D440097000
|
heap
|
page read and write
|
||
1800FF44000
|
heap
|
page read and write
|
||
BC8A1FE000
|
stack
|
page read and write
|
||
235B5E30000
|
heap
|
page read and write
|
||
23BEC100000
|
heap
|
page read and write
|
||
23BEC085000
|
heap
|
page read and write
|
||
5C7000
|
unkown
|
page readonly
|
||
23F97C18000
|
heap
|
page read and write
|
||
1EF54D00000
|
trusted library allocation
|
page read and write
|
||
4614AFE000
|
stack
|
page read and write
|
||
1800DFFF000
|
heap
|
page read and write
|
||
23F98341000
|
heap
|
page read and write
|
||
20882C40000
|
heap
|
page read and write
|
||
1FBDD0F0000
|
heap
|
page read and write
|
||
1800FF29000
|
heap
|
page read and write
|
||
46145BE000
|
stack
|
page read and write
|
||
18010210000
|
direct allocation
|
page execute and read and write
|
||
23F99BDD000
|
heap
|
page read and write
|
||
1800FF47000
|
heap
|
page read and write
|
||
23BEC085000
|
heap
|
page read and write
|
||
23BEC4D6000
|
heap
|
page read and write
|
||
1800FF2A000
|
heap
|
page read and write
|
||
1BA315A8000
|
heap
|
page read and write
|
||
1800FF51000
|
heap
|
page read and write
|
||
2C7339F0000
|
heap
|
page read and write
|
||
221F3C4B000
|
heap
|
page read and write
|
||
1BA315A9000
|
heap
|
page read and write
|
||
1800FF56000
|
heap
|
page read and write
|
||
23F9834D000
|
heap
|
page read and write
|
||
228C58F000
|
stack
|
page read and write
|
||
23F97EA5000
|
heap
|
page read and write
|
||
1800FF10000
|
heap
|
page read and write
|
||
180106A1000
|
heap
|
page read and write
|
||
23BEC4BA000
|
heap
|
page read and write
|
||
23F97C53000
|
heap
|
page read and write
|
||
1D80CD90000
|
heap
|
page read and write
|
||
1800FF2A000
|
heap
|
page read and write
|
||
1800FF35000
|
heap
|
page read and write
|
||
263344D0000
|
heap
|
page read and write
|
||
1800FF00000
|
remote allocation
|
page read and write
|
||
1BA3144A000
|
heap
|
page read and write
|
||
23F97D8A000
|
heap
|
page read and write
|
||
23F97D00000
|
heap
|
page read and write
|
||
23F97C38000
|
heap
|
page read and write
|
||
180000000
|
unkown
|
page readonly
|
||
23BE9ECC000
|
heap
|
page read and write
|
||
DD6000
|
heap
|
page read and write
|
||
23BE9FA4000
|
heap
|
page read and write
|
||
23F98340000
|
heap
|
page read and write
|
||
1800FF3E000
|
heap
|
page read and write
|
||
180100E0000
|
direct allocation
|
page execute and read and write
|
||
1BA30EA0000
|
heap
|
page read and write
|
||
1BA31400000
|
heap
|
page read and write
|
||
8A891FF000
|
stack
|
page read and write
|
||
1800FF2C000
|
heap
|
page read and write
|
||
1800FF35000
|
heap
|
page read and write
|
||
180100F0000
|
trusted library allocation
|
page read and write
|
||
180101B0000
|
direct allocation
|
page execute and read and write
|
||
1800FF2C000
|
heap
|
page read and write
|
||
221F3C66000
|
heap
|
page read and write
|
||
1800E004000
|
heap
|
page read and write
|
||
1800FF4A000
|
heap
|
page read and write
|
||
180101A0000
|
direct allocation
|
page execute and read and write
|
||
1800FF56000
|
heap
|
page read and write
|
||
23F9833F000
|
heap
|
page read and write
|
||
1800FF56000
|
heap
|
page read and write
|
||
FCFA57F000
|
stack
|
page read and write
|
||
2E5E000
|
stack
|
page read and write
|
||
1800FF2A000
|
heap
|
page read and write
|
||
1800FF56000
|
heap
|
page read and write
|
||
1800E002000
|
heap
|
page read and write
|
||
1EF53328000
|
heap
|
page read and write
|
||
461497E000
|
stack
|
page read and write
|
||
1BA30FE5000
|
heap
|
page read and write
|
||
263344F6000
|
heap
|
page read and write
|
||
1434AC5B000
|
heap
|
page read and write
|
||
1BA315BA000
|
heap
|
page read and write
|
||
1BA30DF5000
|
heap
|
page read and write
|
||
5DC000
|
unkown
|
page read and write
|
||
8797F7E000
|
stack
|
page read and write
|
||
A2A857E000
|
stack
|
page read and write
|
||
9844EFF000
|
stack
|
page read and write
|
||
23BEC466000
|
heap
|
page read and write
|
||
1800FF1B000
|
heap
|
page read and write
|
||
18010220000
|
direct allocation
|
page execute and read and write
|
||
1EF53220000
|
heap
|
page read and write
|
||
23BEC4A9000
|
heap
|
page read and write
|
||
23BEC27A000
|
heap
|
page read and write
|
||
23F97C70000
|
heap
|
page read and write
|
||
23F98346000
|
heap
|
page read and write
|
||
F8B10FE000
|
stack
|
page read and write
|
||
2A42FEB5000
|
heap
|
page read and write
|
||
23E66AD0000
|
heap
|
page read and write
|
||
1BA315AD000
|
heap
|
page read and write
|
||
180100E0000
|
direct allocation
|
page execute and read and write
|
||
23F97EA0000
|
heap
|
page read and write
|
||
180100F0000
|
direct allocation
|
page execute and read and write
|
||
305A8FC000
|
stack
|
page read and write
|
||
1A2255A0000
|
heap
|
page read and write
|
||
1800FF3E000
|
heap
|
page read and write
|
||
30CE000
|
stack
|
page read and write
|
||
1BA315AD000
|
heap
|
page read and write
|
||
1800FE40000
|
direct allocation
|
page execute and read and write
|
||
1800FF3E000
|
heap
|
page read and write
|
||
106E000
|
stack
|
page read and write
|
||
1434AB10000
|
heap
|
page read and write
|
||
18010150000
|
direct allocation
|
page execute and read and write
|
||
2C7336A7000
|
heap
|
page read and write
|
||
1BA315CD000
|
heap
|
page read and write
|
||
1800FF56000
|
heap
|
page read and write
|
||
23F98340000
|
heap
|
page read and write
|
||
23BEC274000
|
heap
|
page read and write
|
||
235B5EE0000
|
direct allocation
|
page execute and read and write
|
||
20C5C805000
|
heap
|
page read and write
|
||
21045B2B000
|
heap
|
page read and write
|
||
180101A0000
|
direct allocation
|
page execute and read and write
|
||
1800FF2A000
|
heap
|
page read and write
|
||
18010310000
|
direct allocation
|
page execute and read and write
|
||
1800FF4C000
|
heap
|
page read and write
|
||
235B5E40000
|
direct allocation
|
page execute and read and write
|
||
1D80CBB5000
|
heap
|
page read and write
|
||
1BA30DA9000
|
heap
|
page read and write
|
||
20882F10000
|
heap
|
page read and write
|
||
1800FF56000
|
heap
|
page read and write
|
||
23BEC442000
|
heap
|
page read and write
|
||
221F3BC0000
|
heap
|
page read and write
|
||
1800FF2C000
|
heap
|
page read and write
|
||
1800FF2C000
|
heap
|
page read and write
|
||
2C0F237B000
|
heap
|
page read and write
|
||
1800FF47000
|
heap
|
page read and write
|
||
23BEC513000
|
heap
|
page read and write
|
||
18010060000
|
direct allocation
|
page execute and read and write
|
||
1800FF2A000
|
heap
|
page read and write
|
||
1800FF56000
|
heap
|
page read and write
|
||
1BA315AD000
|
heap
|
page read and write
|
||
23F97C77000
|
heap
|
page read and write
|
||
D3C7DFF000
|
stack
|
page read and write
|
||
23BEC4CF000
|
heap
|
page read and write
|
||
1BA30F80000
|
heap
|
page read and write
|
||
235B5E10000
|
trusted library allocation
|
page read and write
|
||
1800FF56000
|
heap
|
page read and write
|
||
23F98369000
|
heap
|
page read and write
|
||
23BEBD70000
|
heap
|
page read and write
|
||
2C0F2550000
|
heap
|
page read and write
|
||
23F97C1D000
|
heap
|
page read and write
|
||
2A42FB60000
|
heap
|
page read and write
|
||
1800FF2E000
|
heap
|
page read and write
|
||
300E000
|
stack
|
page read and write
|
||
2DA81425000
|
heap
|
page read and write
|
||
1800FF2C000
|
heap
|
page read and write
|
||
23F98362000
|
heap
|
page read and write
|
||
23F97C53000
|
heap
|
page read and write
|
||
1800DFBD000
|
heap
|
page read and write
|
||
180103B5000
|
direct allocation
|
page execute and read and write
|
||
1A225695000
|
heap
|
page read and write
|
||
2FCE000
|
stack
|
page read and write
|
||
A2A84FD000
|
stack
|
page read and write
|
||
1BA315BA000
|
heap
|
page read and write
|
||
1800FF35000
|
heap
|
page read and write
|
||
23BEC515000
|
heap
|
page read and write
|
||
2DA81197000
|
heap
|
page read and write
|
||
1800E004000
|
heap
|
page read and write
|
||
1800FF56000
|
heap
|
page read and write
|
||
23F97D90000
|
heap
|
page read and write
|
||
23BE9F79000
|
heap
|
page read and write
|
||
2A61B010000
|
heap
|
page read and write
|
||
F25E7FF000
|
unkown
|
page read and write
|
||
1800FF2E000
|
heap
|
page read and write
|
||
2C7336A7000
|
heap
|
page read and write
|
||
1FBDD0C0000
|
heap
|
page read and write
|
||
2C7336AE000
|
heap
|
page read and write
|
||
1800FF56000
|
heap
|
page read and write
|
||
2C0F2560000
|
heap
|
page read and write
|
||
23BE9EF3000
|
heap
|
page read and write
|
||
2C7336AF000
|
heap
|
page read and write
|
||
1800FF2A000
|
heap
|
page read and write
|
||
1800FF6D000
|
heap
|
page read and write
|
||
1800FF56000
|
heap
|
page read and write
|
||
23BE9F4C000
|
heap
|
page read and write
|
||
1800FF56000
|
heap
|
page read and write
|
||
581000
|
unkown
|
page execute read
|
||
D3C7CFF000
|
unkown
|
page read and write
|
||
23F98337000
|
heap
|
page read and write
|
||
1800FF56000
|
heap
|
page read and write
|
||
1BA30DF5000
|
heap
|
page read and write
|
||
1EF53555000
|
heap
|
page read and write
|
||
235B42E0000
|
heap
|
page read and write
|
||
1EF54EB0000
|
heap
|
page read and write
|
||
1800FF54000
|
heap
|
page read and write
|
||
99A367E000
|
stack
|
page read and write
|
||
23BEC4DB000
|
heap
|
page read and write
|
||
1800FF35000
|
heap
|
page read and write
|
||
23F98358000
|
heap
|
page read and write
|
||
A2A847C000
|
stack
|
page read and write
|
||
1800FF2E000
|
heap
|
page read and write
|
||
F25E8FF000
|
stack
|
page read and write
|
||
1BA3144A000
|
heap
|
page read and write
|
||
235B5EC0000
|
direct allocation
|
page execute and read and write
|
||
23BEC50B000
|
heap
|
page read and write
|
||
1800FF56000
|
heap
|
page read and write
|
||
1800FE20000
|
direct allocation
|
page execute and read and write
|
||
2A61AFE0000
|
heap
|
page read and write
|
||
235B5F90000
|
direct allocation
|
page execute and read and write
|
||
1800FF35000
|
heap
|
page read and write
|
||
8797FFF000
|
stack
|
page read and write
|
||
23BEC4C9000
|
heap
|
page read and write
|
||
1800FF56000
|
heap
|
page read and write
|
||
23BEC4BB000
|
heap
|
page read and write
|
||
180100C0000
|
direct allocation
|
page execute and read and write
|
||
324E000
|
stack
|
page read and write
|
||
23BEBE71000
|
heap
|
page read and write
|
||
1800DFD0000
|
heap
|
page read and write
|
||
A4EA5FE000
|
stack
|
page read and write
|
||
235B5E10000
|
direct allocation
|
page execute and read and write
|
||
23F97D40000
|
trusted library allocation
|
page read and write
|
||
2EA0000
|
heap
|
page read and write
|
||
8A890FE000
|
unkown
|
page read and write
|
||
309E000
|
heap
|
page read and write
|
||
1BA315BA000
|
heap
|
page read and write
|
||
23F9834D000
|
heap
|
page read and write
|
||
2A42FBD0000
|
heap
|
page read and write
|
||
180100F0000
|
direct allocation
|
page execute and read and write
|
||
18010010000
|
direct allocation
|
page execute and read and write
|
||
1800DFFF000
|
heap
|
page read and write
|
||
1BA31599000
|
heap
|
page read and write
|
||
221F3C64000
|
heap
|
page read and write
|
||
1800E002000
|
heap
|
page read and write
|
||
1800FF44000
|
heap
|
page read and write
|
||
1BA3144B000
|
heap
|
page read and write
|
||
1800FA60000
|
direct allocation
|
page execute and read and write
|
||
2DA812B0000
|
heap
|
page read and write
|
||
1800FF2A000
|
heap
|
page read and write
|
||
1800FF2C000
|
heap
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
1800E003000
|
heap
|
page read and write
|
||
23BEBEE5000
|
heap
|
page read and write
|
||
18010190000
|
direct allocation
|
page execute and read and write
|
||
1800FF56000
|
heap
|
page read and write
|
||
9844BDD000
|
stack
|
page read and write
|
||
1800DFD0000
|
heap
|
page read and write
|
||
180100D0000
|
direct allocation
|
page execute and read and write
|
||
1800DFFF000
|
heap
|
page read and write
|
||
1800FF3E000
|
heap
|
page read and write
|
||
18010150000
|
direct allocation
|
page execute and read and write
|
||
1800FF4B000
|
heap
|
page read and write
|
||
1A225770000
|
heap
|
page read and write
|
||
27757760000
|
heap
|
page read and write
|
||
FCFA4FF000
|
stack
|
page read and write
|
||
23BEC499000
|
heap
|
page read and write
|
||
1A22567B000
|
heap
|
page read and write
|
||
1BA315BF000
|
heap
|
page read and write
|
||
23BEC4B8000
|
heap
|
page read and write
|
||
2C7335D0000
|
heap
|
page read and write
|
||
1BA30E04000
|
heap
|
page read and write
|
||
1800FF51000
|
heap
|
page read and write
|
||
1800FA60000
|
direct allocation
|
page execute and read and write
|
||
3080000
|
heap
|
page read and write
|
||
23F99BD0000
|
heap
|
page read and write
|
||
1800FF47000
|
heap
|
page read and write
|
||
1800E004000
|
heap
|
page read and write
|
||
1D440070000
|
heap
|
page read and write
|
||
23E66A30000
|
heap
|
page read and write
|
||
23F97D40000
|
trusted library allocation
|
page read and write
|
||
23F98361000
|
heap
|
page read and write
|
||
23BEC4CF000
|
heap
|
page read and write
|
||
23BE9EF3000
|
heap
|
page read and write
|
||
2C733660000
|
heap
|
page read and write
|
||
1800DFFF000
|
heap
|
page read and write
|
||
1800FF3E000
|
heap
|
page read and write
|
||
1BA31597000
|
heap
|
page read and write
|
||
23F97C6C000
|
heap
|
page read and write
|
||
228C87F000
|
stack
|
page read and write
|
||
23BEC4C9000
|
heap
|
page read and write
|
||
46149FF000
|
stack
|
page read and write
|
||
A4EA57E000
|
stack
|
page read and write
|
||
1800E002000
|
heap
|
page read and write
|
||
2A61B110000
|
heap
|
page read and write
|
||
2785CC40000
|
heap
|
page read and write
|
||
1800FF55000
|
heap
|
page read and write
|
||
1800FF27000
|
heap
|
page read and write
|
||
1800FF51000
|
heap
|
page read and write
|
||
263344F4000
|
heap
|
page read and write
|
||
23BEC4CF000
|
heap
|
page read and write
|
||
D7D000
|
stack
|
page read and write
|
||
5DC000
|
unkown
|
page write copy
|
||
1D80CE10000
|
heap
|
page read and write
|
||
23BEBD74000
|
heap
|
page read and write
|
||
23F9835B000
|
heap
|
page read and write
|
||
1800FE40000
|
direct allocation
|
page execute and read and write
|
||
1800FF11000
|
heap
|
page read and write
|
||
1D4402D0000
|
heap
|
page read and write
|
||
1BA31447000
|
heap
|
page read and write
|
||
826C0FE000
|
unkown
|
page read and write
|
||
180101B0000
|
direct allocation
|
page execute and read and write
|
||
23BEC4D6000
|
heap
|
page read and write
|
||
1BA315BA000
|
heap
|
page read and write
|
||
23BEC4D6000
|
heap
|
page read and write
|
||
1BA3144E000
|
heap
|
page read and write
|
||
1800FF3E000
|
heap
|
page read and write
|
||
23BEC4B5000
|
heap
|
page read and write
|
||
1800FF35000
|
heap
|
page read and write
|
||
23BEBC71000
|
heap
|
page read and write
|
||
23BEC4E2000
|
heap
|
page read and write
|
||
23F97B20000
|
heap
|
page read and write
|
||
1800FAC0000
|
direct allocation
|
page execute and read and write
|
||
23BEC440000
|
heap
|
page read and write
|
||
1800FF51000
|
heap
|
page read and write
|
||
2990000
|
heap
|
page read and write
|
||
23BEC4E2000
|
heap
|
page read and write
|
||
23F97D87000
|
heap
|
page read and write
|
||
21045A20000
|
heap
|
page read and write
|
||
1800FF46000
|
heap
|
page read and write
|
||
23BEBFCE000
|
heap
|
page read and write
|
||
2DA81190000
|
heap
|
page read and write
|
||
1BA315A9000
|
heap
|
page read and write
|
||
1800FF60000
|
heap
|
page read and write
|
||
1800FF2E000
|
heap
|
page read and write
|
||
308A000
|
heap
|
page read and write
|
||
23F9834D000
|
heap
|
page read and write
|
||
1800FF47000
|
heap
|
page read and write
|
||
D10000
|
heap
|
page read and write
|
||
21045CB0000
|
heap
|
page read and write
|
||
23BEA1A5000
|
heap
|
page read and write
|
||
23F9835C000
|
heap
|
page read and write
|
||
1BA30DF9000
|
heap
|
page read and write
|
||
1800FF56000
|
heap
|
page read and write
|
||
E16C3FF000
|
unkown
|
page read and write
|
||
1800FF2E000
|
heap
|
page read and write
|
||
1A22567D000
|
heap
|
page read and write
|
||
23BEC4CF000
|
heap
|
page read and write
|
||
23F97C0F000
|
heap
|
page read and write
|
||
23F98359000
|
heap
|
page read and write
|
||
BC8A47F000
|
stack
|
page read and write
|
||
23BEA1A0000
|
heap
|
page read and write
|
||
1800FF35000
|
heap
|
page read and write
|
||
1800FF2A000
|
heap
|
page read and write
|
||
1A2255C0000
|
heap
|
page read and write
|
||
1800FF35000
|
heap
|
page read and write
|
||
304F000
|
stack
|
page read and write
|
||
23BEBD7B000
|
heap
|
page read and write
|
||
23F98358000
|
heap
|
page read and write
|
||
1BA32E30000
|
heap
|
page read and write
|
||
23F98361000
|
heap
|
page read and write
|
||
23BEC4CF000
|
heap
|
page read and write
|
||
23BEC4D6000
|
heap
|
page read and write
|
||
581000
|
unkown
|
page execute read
|
||
23BEBE71000
|
heap
|
page read and write
|
||
1BA30E02000
|
heap
|
page read and write
|
||
23F99BD1000
|
heap
|
page read and write
|
||
1BA31444000
|
heap
|
page read and write
|
||
180100E0000
|
direct allocation
|
page execute and read and write
|
||
707DFF000
|
unkown
|
page read and write
|
||
1800FF56000
|
heap
|
page read and write
|
||
1800FF2E000
|
heap
|
page read and write
|
||
870F70F000
|
stack
|
page read and write
|
||
1800FF3E000
|
heap
|
page read and write
|
||
23F97D82000
|
heap
|
page read and write
|
||
3280000
|
heap
|
page read and write
|
||
1BA315C5000
|
heap
|
page read and write
|
||
23BEC4D8000
|
heap
|
page read and write
|
||
1FBDD0C7000
|
heap
|
page read and write
|
||
180101C0000
|
direct allocation
|
page execute and read and write
|
||
18010699000
|
heap
|
page read and write
|
||
1800FF56000
|
heap
|
page read and write
|
||
23BEC070000
|
heap
|
page read and write
|
||
1800FAC0000
|
direct allocation
|
page execute and read and write
|
||
1FBDD290000
|
heap
|
page read and write
|
||
23F9834D000
|
heap
|
page read and write
|
||
2C0F2330000
|
heap
|
page read and write
|
||
F25E6FC000
|
stack
|
page read and write
|
||
1800FAD0000
|
direct allocation
|
page execute and read and write
|
||
1BA315A4000
|
heap
|
page read and write
|
||
235B46C5000
|
heap
|
page read and write
|
||
23BE9FA5000
|
heap
|
page read and write
|
||
263344A0000
|
heap
|
page read and write
|
||
2A61B160000
|
heap
|
page read and write
|
||
1EF53320000
|
heap
|
page read and write
|
||
1800FF56000
|
heap
|
page read and write
|
||
1800FF48000
|
heap
|
page read and write
|
||
23F97EAA000
|
heap
|
page read and write
|
||
180086000
|
unkown
|
page readonly
|
||
1800FF56000
|
heap
|
page read and write
|
||
23F98363000
|
heap
|
page read and write
|
||
1EF54D00000
|
trusted library allocation
|
page read and write
|
||
1BA315BA000
|
heap
|
page read and write
|
||
1800FE20000
|
direct allocation
|
page execute and read and write
|
||
1800FF29000
|
heap
|
page read and write
|
||
1800FF2E000
|
heap
|
page read and write
|
||
23BE9F9C000
|
heap
|
page read and write
|
||
99A36FF000
|
stack
|
page read and write
|
||
1BA31443000
|
heap
|
page read and write
|
||
1800FF51000
|
heap
|
page read and write
|
||
1BA31447000
|
heap
|
page read and write
|
||
2E438FE000
|
stack
|
page read and write
|
||
1BA315BD000
|
heap
|
page read and write
|
||
2C733685000
|
heap
|
page read and write
|
||
2785CC65000
|
heap
|
page read and write
|
||
1800FE40000
|
direct allocation
|
page execute and read and write
|
||
24E2BB00000
|
heap
|
page read and write
|
||
1800FAD0000
|
direct allocation
|
page execute and read and write
|
||
1800FF28000
|
heap
|
page read and write
|
||
2DA810A0000
|
heap
|
page read and write
|
||
1BA3159F000
|
heap
|
page read and write
|
||
23BEC4CF000
|
heap
|
page read and write
|
||
23BE9F4C000
|
heap
|
page read and write
|
||
1BA30FF0000
|
trusted library allocation
|
page read and write
|
||
1800FF3E000
|
heap
|
page read and write
|
||
1800FF35000
|
heap
|
page read and write
|
||
2C0F2230000
|
heap
|
page read and write
|
||
7AC7FF000
|
unkown
|
page read and write
|
||
1BA315CD000
|
heap
|
page read and write
|
||
1800FF2E000
|
heap
|
page read and write
|
||
1800FF4A000
|
heap
|
page read and write
|
||
1800FF35000
|
heap
|
page read and write
|
||
1800FF40000
|
heap
|
page read and write
|
||
235B5F10000
|
direct allocation
|
page execute and read and write
|
||
31BE000
|
stack
|
page read and write
|
||
788A67E000
|
stack
|
page read and write
|
||
235B5FA0000
|
direct allocation
|
page execute and read and write
|
||
FCFA47E000
|
stack
|
page read and write
|
||
23BEC4DB000
|
heap
|
page read and write
|
||
23BE9DE0000
|
heap
|
page read and write
|
||
23F99BDE000
|
heap
|
page read and write
|
||
235B5E40000
|
trusted library allocation
|
page read and write
|
||
23F98341000
|
heap
|
page read and write
|
||
23F98358000
|
heap
|
page read and write
|
||
8797BBD000
|
stack
|
page read and write
|
||
277577A5000
|
heap
|
page read and write
|
||
1800FE40000
|
direct allocation
|
page execute and read and write
|
||
1800FF2E000
|
heap
|
page read and write
|
||
1BA315AD000
|
heap
|
page read and write
|
||
1800FF2E000
|
heap
|
page read and write
|
||
23BE9CE0000
|
heap
|
page read and write
|
||
1800DFBA000
|
heap
|
page read and write
|
||
580000
|
unkown
|
page readonly
|
||
180103B5000
|
direct allocation
|
page execute and read and write
|
||
24E2B820000
|
heap
|
page read and write
|
||
1800FF18000
|
heap
|
page read and write
|
||
E16C4FF000
|
stack
|
page read and write
|
||
180101D0000
|
direct allocation
|
page execute and read and write
|
||
1BA3159C000
|
heap
|
page read and write
|
||
D30000
|
heap
|
page read and write
|
||
1800FF56000
|
heap
|
page read and write
|
||
1800FF55000
|
heap
|
page read and write
|
||
1434ABF0000
|
heap
|
page read and write
|
||
23F98358000
|
heap
|
page read and write
|
||
1FBDD070000
|
heap
|
page read and write
|
||
23BE9ED9000
|
heap
|
page read and write
|
||
23F98369000
|
heap
|
page read and write
|
||
2C7335F0000
|
heap
|
page read and write
|
||
2C7336A7000
|
heap
|
page read and write
|
||
1800FF56000
|
heap
|
page read and write
|
||
180103B5000
|
direct allocation
|
page execute and read and write
|
||
23F97C53000
|
heap
|
page read and write
|
||
23F97C55000
|
heap
|
page read and write
|
||
23BEA150000
|
remote allocation
|
page read and write
|
||
2C0F2310000
|
heap
|
page read and write
|
||
1BA30DBB000
|
heap
|
page read and write
|
||
1800F9D0000
|
direct allocation
|
page execute and read and write
|
||
180100E0000
|
direct allocation
|
page execute and read and write
|
||
23BEC4DB000
|
heap
|
page read and write
|
||
23BEC4DB000
|
heap
|
page read and write
|
||
1EF53550000
|
heap
|
page read and write
|
||
23BEC4DB000
|
heap
|
page read and write
|
||
2C7339F5000
|
heap
|
page read and write
|
||
1800DFFF000
|
heap
|
page read and write
|
||
23BEC4C9000
|
heap
|
page read and write
|
||
1A225696000
|
heap
|
page read and write
|
||
24E2B850000
|
heap
|
page read and write
|
||
2785CC20000
|
heap
|
page read and write
|
||
23F97D87000
|
heap
|
page read and write
|
||
1800FF51000
|
heap
|
page read and write
|
||
23BE9ED8000
|
heap
|
page read and write
|
||
23BEBD59000
|
heap
|
page read and write
|
||
180100D0000
|
direct allocation
|
page execute and read and write
|
||
1800FF35000
|
heap
|
page read and write
|
||
9BC000
|
stack
|
page read and write
|
||
788A3EE000
|
stack
|
page read and write
|
||
1BA30FA0000
|
heap
|
page read and write
|
||
23F99BDE000
|
heap
|
page read and write
|
||
1D80CB90000
|
heap
|
page read and write
|
||
1800FF2A000
|
heap
|
page read and write
|
||
338B000
|
stack
|
page read and write
|
||
2785CD40000
|
heap
|
page read and write
|
||
23F99BE4000
|
heap
|
page read and write
|
||
21045C20000
|
heap
|
page read and write
|
||
1800E003000
|
heap
|
page read and write
|
||
23BEC071000
|
heap
|
page read and write
|
||
23F98343000
|
heap
|
page read and write
|
||
1800DFCD000
|
heap
|
page read and write
|
||
C85E4FF000
|
unkown
|
page read and write
|
||
18010310000
|
direct allocation
|
page execute and read and write
|
||
1BA30E00000
|
heap
|
page read and write
|
||
23F97C07000
|
heap
|
page read and write
|
||
23BEBD73000
|
heap
|
page read and write
|
||
221F3BD0000
|
heap
|
page read and write
|
||
2785CBB0000
|
heap
|
page read and write
|
||
1800FF2E000
|
heap
|
page read and write
|
||
24E2B8B8000
|
heap
|
page read and write
|
||
348C000
|
stack
|
page read and write
|
||
23F97D8E000
|
heap
|
page read and write
|
||
21045B20000
|
heap
|
page read and write
|
||
23BEC085000
|
heap
|
page read and write
|
||
1800E004000
|
heap
|
page read and write
|
||
180100E0000
|
direct allocation
|
page execute and read and write
|
||
1800FF3F000
|
heap
|
page read and write
|
||
180100F0000
|
direct allocation
|
page execute and read and write
|
||
1800FF27000
|
heap
|
page read and write
|
||
18010020000
|
direct allocation
|
page execute and read and write
|
||
23F97C5E000
|
heap
|
page read and write
|
||
31FF000
|
stack
|
page read and write
|
||
23F98358000
|
heap
|
page read and write
|
||
2EE0000
|
heap
|
page read and write
|
||
1800FF4B000
|
heap
|
page read and write
|
||
1BA30DE4000
|
heap
|
page read and write
|
||
1FBDD0D8000
|
heap
|
page read and write
|
||
FCFA12E000
|
stack
|
page read and write
|
||
1FBDD470000
|
heap
|
page read and write
|
||
23BE9F4C000
|
heap
|
page read and write
|
||
5E0000
|
unkown
|
page readonly
|
||
1D80CBB4000
|
heap
|
page read and write
|
||
1BA31445000
|
heap
|
page read and write
|
||
1800FF56000
|
heap
|
page read and write
|
||
1800E002000
|
heap
|
page read and write
|
||
46148FE000
|
stack
|
page read and write
|
||
23BE9F4C000
|
heap
|
page read and write
|
||
23F97C7C000
|
heap
|
page read and write
|
||
A4EA4FC000
|
stack
|
page read and write
|
||
1800DFC9000
|
heap
|
page read and write
|
||
23E66E90000
|
heap
|
page read and write
|
||
1BA31442000
|
heap
|
page read and write
|
||
1800FF41000
|
heap
|
page read and write
|
||
1800FF35000
|
heap
|
page read and write
|
||
1800FF47000
|
heap
|
page read and write
|
||
1800FF3E000
|
heap
|
page read and write
|
||
27757828000
|
heap
|
page read and write
|
||
23F9834D000
|
heap
|
page read and write
|
||
1800E002000
|
heap
|
page read and write
|
||
1800FF41000
|
heap
|
page read and write
|
||
2C0F237D000
|
heap
|
page read and write
|
||
21045B45000
|
heap
|
page read and write
|
||
23BEC516000
|
heap
|
page read and write
|
||
1EF53300000
|
trusted library allocation
|
page read and write
|
||
1800FF45000
|
heap
|
page read and write
|
||
20C5C7ED000
|
heap
|
page read and write
|
||
1800FF47000
|
heap
|
page read and write
|
||
1434AC10000
|
heap
|
page read and write
|
||
23F97C63000
|
heap
|
page read and write
|
||
20882CA0000
|
heap
|
page read and write
|
||
23F97D40000
|
trusted library allocation
|
page read and write
|
||
1BA30DD2000
|
heap
|
page read and write
|
||
1800FF2E000
|
heap
|
page read and write
|
||
7AC8FF000
|
stack
|
page read and write
|
||
23BEC4BB000
|
heap
|
page read and write
|
||
1800FF56000
|
heap
|
page read and write
|
||
23F97C70000
|
heap
|
page read and write
|
||
1800FF2E000
|
heap
|
page read and write
|
||
1800FF2A000
|
heap
|
page read and write
|
||
18010220000
|
direct allocation
|
page execute and read and write
|
||
1FBDD060000
|
heap
|
page read and write
|
||
2A42FB30000
|
heap
|
page read and write
|
||
1800FF2A000
|
heap
|
page read and write
|
||
1800FF1E000
|
heap
|
page read and write
|
||
23F97C13000
|
heap
|
page read and write
|
||
21045B00000
|
heap
|
page read and write
|
||
18010060000
|
direct allocation
|
page execute and read and write
|
||
1800FF2C000
|
heap
|
page read and write
|
||
20882C60000
|
heap
|
page read and write
|
||
1434AE10000
|
heap
|
page read and write
|
||
1BA3144A000
|
heap
|
page read and write
|
||
826C1FF000
|
stack
|
page read and write
|
||
1800FF3F000
|
heap
|
page read and write
|
||
23F97C5E000
|
heap
|
page read and write
|
||
1BA315A8000
|
heap
|
page read and write
|
||
23BEC4CF000
|
heap
|
page read and write
|
||
235B4358000
|
heap
|
page read and write
|
||
1800FF56000
|
heap
|
page read and write
|
||
1800FF55000
|
heap
|
page read and write
|
||
23E66AD8000
|
heap
|
page read and write
|
||
18010220000
|
direct allocation
|
page execute and read and write
|
||
23F97D20000
|
heap
|
page read and write
|
||
18010310000
|
direct allocation
|
page execute and read and write
|
||
1BA3159C000
|
heap
|
page read and write
|
||
23BEBE70000
|
heap
|
page read and write
|
||
1800DF8F000
|
heap
|
page read and write
|
||
7AC6FB000
|
stack
|
page read and write
|
||
FC263FF000
|
stack
|
page read and write
|
||
2C733683000
|
heap
|
page read and write
|
||
1BA315AD000
|
heap
|
page read and write
|
||
8797B37000
|
stack
|
page read and write
|
||
23F97D8A000
|
heap
|
page read and write
|
||
23F97D8B000
|
heap
|
page read and write
|
||
1800FF2D000
|
heap
|
page read and write
|
||
23BEC0B1000
|
heap
|
page read and write
|
||
23F97D84000
|
heap
|
page read and write
|
||
879807E000
|
stack
|
page read and write
|
||
23BEC0B1000
|
heap
|
page read and write
|
||
2EB0000
|
heap
|
page read and write
|
||
23F99BDE000
|
heap
|
page read and write
|
||
1BA30DDA000
|
heap
|
page read and write
|
||
1A225670000
|
heap
|
page read and write
|
||
1800FF35000
|
heap
|
page read and write
|
||
1800DFD5000
|
heap
|
page read and write
|
||
23BEBEE5000
|
heap
|
page read and write
|
||
1800FF35000
|
heap
|
page read and write
|
||
21045CA0000
|
heap
|
page read and write
|
||
221F3E10000
|
heap
|
page read and write
|
||
1BA30DB2000
|
heap
|
page read and write
|
||
B538CFF000
|
stack
|
page read and write
|
||
B538DFF000
|
stack
|
page read and write
|
||
1800E002000
|
heap
|
page read and write
|
||
2785CC67000
|
heap
|
page read and write
|
||
23F97C5E000
|
heap
|
page read and write
|
||
1EF53300000
|
trusted library allocation
|
page read and write
|
||
23F99BE4000
|
heap
|
page read and write
|
||
1800DF8D000
|
heap
|
page read and write
|
||
23BEC4C9000
|
heap
|
page read and write
|
||
18010220000
|
direct allocation
|
page execute and read and write
|
||
1BA30FC0000
|
trusted library allocation
|
page read and write
|
||
263346A0000
|
heap
|
page read and write
|
||
1800FF29000
|
heap
|
page read and write
|
||
5C7000
|
unkown
|
page readonly
|
||
23F97C82000
|
heap
|
page read and write
|
||
1BA315C0000
|
heap
|
page read and write
|
||
1800FF28000
|
heap
|
page read and write
|
||
DEC000
|
heap
|
page read and write
|
||
23BE9F14000
|
heap
|
page read and write
|
||
1800FF35000
|
heap
|
page read and write
|
||
180101B0000
|
direct allocation
|
page execute and read and write
|
||
23F99BD2000
|
heap
|
page read and write
|
||
180101C0000
|
trusted library allocation
|
page read and write
|
||
23BEBC70000
|
heap
|
page read and write
|
||
1BA315A8000
|
heap
|
page read and write
|
||
1A225610000
|
heap
|
page read and write
|
||
1800FF56000
|
heap
|
page read and write
|
||
1800FF35000
|
heap
|
page read and write
|
||
1800FF2A000
|
heap
|
page read and write
|
||
2E8C000
|
stack
|
page read and write
|
||
1800FF2E000
|
heap
|
page read and write
|
||
305A9FF000
|
unkown
|
page read and write
|
||
23BEC072000
|
heap
|
page read and write
|
||
180100C0000
|
direct allocation
|
page execute and read and write
|
||
235B5F70000
|
direct allocation
|
page execute and read and write
|
||
9844E7F000
|
stack
|
page read and write
|
||
1800FF4E000
|
heap
|
page read and write
|
||
1800FF27000
|
heap
|
page read and write
|
||
2C0F2395000
|
heap
|
page read and write
|
||
20C5C7EB000
|
heap
|
page read and write
|
||
1BA315CA000
|
heap
|
page read and write
|
||
20882CA7000
|
heap
|
page read and write
|
||
1800E002000
|
heap
|
page read and write
|
||
23BEC4C9000
|
heap
|
page read and write
|
||
180101B0000
|
direct allocation
|
page execute and read and write
|
||
23F98344000
|
heap
|
page read and write
|
||
20C5C700000
|
heap
|
page read and write
|
||
2C7336B6000
|
heap
|
page read and write
|
||
18010150000
|
direct allocation
|
page execute and read and write
|
||
2F8E000
|
stack
|
page read and write
|
||
24E2B8B0000
|
heap
|
page read and write
|
||
1434AC75000
|
heap
|
page read and write
|
||
18016C000
|
unkown
|
page readonly
|
||
1D4400AB000
|
heap
|
page read and write
|
||
2A42FBD8000
|
heap
|
page read and write
|
||
1EF53300000
|
direct allocation
|
page execute and read and write
|
||
23BEC4D8000
|
heap
|
page read and write
|
||
23BEC071000
|
heap
|
page read and write
|
||
CFC000
|
stack
|
page read and write
|
There are 1025 hidden memdumps, click here to show them.