Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
MejqsB9tx9.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\cred64[1].dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\clip64[1].dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\246122658369_Desktop.zip
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\AppData\Roaming\a091ec0a6e2227\clip64.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\a091ec0a6e2227\cred64.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\_Files_\MXPXCVPDVN.docx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_Files_\NEBFQQYWPS.xlsx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_Files_\SFPUSAFIOL.docx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_Files_\SFPUSAFIOL.xlsx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_Files_\SQRKHNBNYN.docx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_Files_\UOOJJOZIRH.docx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_Files_\UOOJJOZIRH.xlsx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_Files_\ZQIXMVQGAH.xlsx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cwiqnadl.y2l.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_m2mbhj4h.wtu.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nyif2m4o.hcl.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rt3ns3e0.oef.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\Tasks\explorha.job
|
data
|
dropped
|
There are 12 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\MejqsB9tx9.exe
|
"C:\Users\user\Desktop\MejqsB9tx9.exe"
|
||
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
|
"C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe"
|
||
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
|
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
|
||
C:\Windows\SysWOW64\rundll32.exe
|
"C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
|
||
C:\Windows\System32\rundll32.exe
|
"C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
|
||
C:\Windows\System32\netsh.exe
|
netsh wlan show profiles
|
||
C:\Windows\SysWOW64\rundll32.exe
|
"C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell -Command Compress-Archive -Path 'C:\Users\user\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\user\AppData\Local\Temp\246122658369_Desktop.zip'
-CompressionLevel Optimal
|
||
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
|
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
|
||
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
|
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
|
||
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
|
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
|
||
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
|
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
|
||
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
|
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
|
||
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
|
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
|
||
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
|
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
|
||
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
|
|||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http:///
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2204 --field-trial-handle=2000,i,12118425566247776453,12709347483506542613,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 10 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://193.233.132.56/Pneh2sXQk0/index.php
|
193.233.132.56
|
||
http://193.233.132.56/Pneh2sXQk0/index.php?wal=1
|
193.233.132.56
|
||
http://193.233.132.56/Pneh2sXQk0/Plugins/clip64.dll
|
193.233.132.56
|
||
http://193.233.132.56/Pneh2sXQk0/Plugins/cred64.dll
|
193.233.132.56
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
https://aka.ms/winsvr-2022-pshelp
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
http://193.233.132.56/Pneh2sXQk0/index.php?wal=1ws
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://aka.ms/winsvr-2022-pshelpX
|
unknown
|
||
https://www.google.com/async/newtab_promos
|
142.251.40.132
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://193.233.132.56/3
|
unknown
|
||
http://193.233.132.56/Pneh2sXQk0/index.php?wal=1E
|
unknown
|
||
https://www.google.com/async/ddljson?async=ntp:2
|
142.251.40.132
|
||
http://crl.m
|
unknown
|
||
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
|
142.251.40.132
|
||
http://193.233.132.56/Pneh2sXQk0/index.php?wal=17
|
unknown
|
||
https://www.google.com/sorry/index?continue=https://www.google.com/async/newtab_ogb%3Fhl%3Den-US%26async%3Dfixed:0&hl=en-US&q=EgS_YJbhGNfnzbEGIjD1WaW_kQpX5UuTH3k6sLaT2sgha20jAZtNUmX4owd2e1RNY717lgQsRK3T9_HrP4AyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
|
142.251.40.132
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
http://193.233.132.56/Pneh2sXQk0/index.php?wal=1s
|
unknown
|
||
https://www.google.com/sorry/index?continue=https://www.google.com/async/newtab_promos&q=EgS_YJbhGNjnzbEGIjCy5MxkR43JXxLUWmJrXennO5Nx-D2Gy-xkAQ-34AfzKqBYUVHfWo10HJp47EMi6woyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
|
142.251.40.132
|
||
http://193.233.132.56/neh2sXQk0/index.php?wal=1a
|
unknown
|
||
https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
|
142.251.40.132
|
||
https://aka.ms/pscore68
|
unknown
|
||
http://193.233.132.56/Pneh2sXQk0/index.php?wal=1k
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
There are 22 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
www.google.com
|
142.251.40.132
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
193.233.132.56
|
unknown
|
Russian Federation
|
||
192.168.2.6
|
unknown
|
unknown
|
||
142.251.40.132
|
www.google.com
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
192.168.2.4
|
unknown
|
unknown
|
||
192.168.2.5
|
unknown
|
unknown
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
4CF0000
|
direct allocation
|
page read and write
|
||
201000
|
unkown
|
page execute and read and write
|
||
4E10000
|
direct allocation
|
page read and write
|
||
201000
|
unkown
|
page execute and read and write
|
||
52D0000
|
direct allocation
|
page read and write
|
||
201000
|
unkown
|
page execute and read and write
|
||
C81000
|
unkown
|
page execute and read and write
|
||
49F0000
|
direct allocation
|
page read and write
|
||
201000
|
unkown
|
page execute and read and write
|
||
201000
|
unkown
|
page execute and read and write
|
||
49F0000
|
direct allocation
|
page read and write
|
||
5100000
|
direct allocation
|
page read and write
|
||
4E90000
|
direct allocation
|
page read and write
|
||
52E0000
|
direct allocation
|
page read and write
|
||
201000
|
unkown
|
page execute and read and write
|
||
4F40000
|
direct allocation
|
page read and write
|
||
201000
|
unkown
|
page execute and read and write
|
||
49F0000
|
direct allocation
|
page read and write
|
||
4B00000
|
direct allocation
|
page read and write
|
||
201000
|
unkown
|
page execute and read and write
|
||
201000
|
unkown
|
page execute and read and write
|
||
4561000
|
heap
|
page read and write
|
||
31A0000
|
direct allocation
|
page read and write
|
||
4BB0000
|
direct allocation
|
page execute and read and write
|
||
438E000
|
stack
|
page read and write
|
||
118A000
|
heap
|
page read and write
|
||
49E0000
|
direct allocation
|
page read and write
|
||
CD0000
|
direct allocation
|
page read and write
|
||
4F70000
|
direct allocation
|
page execute and read and write
|
||
F34000
|
heap
|
page read and write
|
||
31A0000
|
direct allocation
|
page read and write
|
||
FCB000
|
heap
|
page read and write
|
||
2D40000
|
direct allocation
|
page read and write
|
||
13C0000
|
heap
|
page read and write
|
||
3AEF000
|
stack
|
page read and write
|
||
4FA3000
|
direct allocation
|
page read and write
|
||
38CF000
|
stack
|
page read and write
|
||
CF4000
|
heap
|
page read and write
|
||
7FFD2463F000
|
trusted library allocation
|
page read and write
|
||
2E5A000
|
heap
|
page read and write
|
||
B8DA27E000
|
stack
|
page read and write
|
||
4E20000
|
direct allocation
|
page read and write
|
||
320E000
|
stack
|
page read and write
|
||
4E40000
|
direct allocation
|
page execute and read and write
|
||
319E000
|
stack
|
page read and write
|
||
CEE000
|
stack
|
page read and write
|
||
3CFE000
|
stack
|
page read and write
|
||
3DBF000
|
stack
|
page read and write
|
||
1E190001000
|
trusted library allocation
|
page read and write
|
||
FA0000
|
direct allocation
|
page read and write
|
||
5440000
|
direct allocation
|
page execute and read and write
|
||
507000
|
unkown
|
page execute and read and write
|
||
511B000
|
stack
|
page read and write
|
||
5020000
|
direct allocation
|
page execute and read and write
|
||
2E9E000
|
stack
|
page read and write
|
||
4CB0000
|
trusted library allocation
|
page read and write
|
||
BA0000
|
direct allocation
|
page read and write
|
||
264000
|
unkown
|
page execute and read and write
|
||
4871000
|
heap
|
page read and write
|
||
4D1E000
|
stack
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
1314000
|
heap
|
page read and write
|
||
483E000
|
stack
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
5090000
|
direct allocation
|
page execute and read and write
|
||
43DE000
|
stack
|
page read and write
|
||
1E1F2F5D000
|
heap
|
page read and write
|
||
4551000
|
heap
|
page read and write
|
||
298F000
|
stack
|
page read and write
|
||
CD0000
|
direct allocation
|
page read and write
|
||
41BF000
|
stack
|
page read and write
|
||
28FC000
|
stack
|
page read and write
|
||
7FFD24610000
|
trusted library allocation
|
page read and write
|
||
5280000
|
direct allocation
|
page execute and read and write
|
||
7FFD24560000
|
trusted library allocation
|
page read and write
|
||
7FFD2429D000
|
trusted library allocation
|
page execute and read and write
|
||
448F000
|
stack
|
page read and write
|
||
B07CAFE000
|
stack
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
43AE000
|
stack
|
page read and write
|
||
135D000
|
stack
|
page read and write
|
||
42FF000
|
stack
|
page read and write
|
||
52F0000
|
direct allocation
|
page execute and read and write
|
||
523F000
|
stack
|
page read and write
|
||
4C00000
|
direct allocation
|
page execute and read and write
|
||
B7E000
|
heap
|
page read and write
|
||
4F60000
|
direct allocation
|
page execute and read and write
|
||
417F000
|
stack
|
page read and write
|
||
5343000
|
direct allocation
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
ECF000
|
stack
|
page read and write
|
||
4AA0000
|
trusted library allocation
|
page read and write
|
||
35AF000
|
stack
|
page read and write
|
||
4650000
|
direct allocation
|
page read and write
|
||
CE9000
|
unkown
|
page write copy
|
||
466E000
|
stack
|
page read and write
|
||
396E000
|
stack
|
page read and write
|
||
488E000
|
stack
|
page read and write
|
||
4650000
|
direct allocation
|
page read and write
|
||
7FFD246B0000
|
trusted library allocation
|
page execute and read and write
|
||
130E000
|
stack
|
page read and write
|
||
1E180228000
|
trusted library allocation
|
page read and write
|
||
46FE000
|
stack
|
page read and write
|
||
135E000
|
stack
|
page read and write
|
||
361E000
|
stack
|
page read and write
|
||
54A0000
|
direct allocation
|
page execute and read and write
|
||
3B2E000
|
stack
|
page read and write
|
||
13A0000
|
direct allocation
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
4E20000
|
direct allocation
|
page read and write
|
||
362E000
|
stack
|
page read and write
|
||
1E1F2C9F000
|
heap
|
page read and write
|
||
3A0E000
|
stack
|
page read and write
|
||
FB4000
|
heap
|
page read and write
|
||
49E0000
|
direct allocation
|
page read and write
|
||
34DE000
|
stack
|
page read and write
|
||
1E1F2F6D000
|
heap
|
page read and write
|
||
1020000
|
heap
|
page read and write
|
||
4EC0000
|
direct allocation
|
page execute and read and write
|
||
201000
|
unkown
|
page execute and write copy
|
||
28A6D62B000
|
heap
|
page read and write
|
||
4ECE000
|
stack
|
page read and write
|
||
D94000
|
heap
|
page read and write
|
||
447E000
|
stack
|
page read and write
|
||
20C08AA8000
|
heap
|
page read and write
|
||
329F000
|
stack
|
page read and write
|
||
1E180753000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
51E000
|
unkown
|
page execute and write copy
|
||
34AE000
|
stack
|
page read and write
|
||
200000
|
unkown
|
page readonly
|
||
38DF000
|
stack
|
page read and write
|
||
54C0000
|
direct allocation
|
page execute and read and write
|
||
4871000
|
heap
|
page read and write
|
||
9F974F4000
|
stack
|
page read and write
|
||
28A6D590000
|
heap
|
page read and write
|
||
BA0000
|
direct allocation
|
page read and write
|
||
40EF000
|
stack
|
page read and write
|
||
B8DA4FF000
|
stack
|
page read and write
|
||
2E0F000
|
stack
|
page read and write
|
||
3FC000
|
unkown
|
page execute and read and write
|
||
13D4000
|
heap
|
page read and write
|
||
464F000
|
stack
|
page read and write
|
||
13A0000
|
direct allocation
|
page read and write
|
||
28A6D598000
|
heap
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
378E000
|
stack
|
page read and write
|
||
2FDE000
|
stack
|
page read and write
|
||
200000
|
unkown
|
page read and write
|
||
2C30000
|
direct allocation
|
page read and write
|
||
D94000
|
heap
|
page read and write
|
||
7FFD24472000
|
trusted library allocation
|
page read and write
|
||
4540000
|
direct allocation
|
page read and write
|
||
269000
|
unkown
|
page write copy
|
||
2ECE000
|
stack
|
page read and write
|
||
5130000
|
direct allocation
|
page execute and read and write
|
||
1E1902F6000
|
trusted library allocation
|
page read and write
|
||
2F1E000
|
stack
|
page read and write
|
||
1E1814F2000
|
trusted library allocation
|
page read and write
|
||
BF7000
|
heap
|
page read and write
|
||
C64000
|
heap
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
3B9D000
|
stack
|
page read and write
|
||
3B7F000
|
stack
|
page read and write
|
||
4BFE000
|
stack
|
page read and write
|
||
136F000
|
stack
|
page read and write
|
||
1144000
|
unkown
|
page execute and read and write
|
||
2EDF000
|
stack
|
page read and write
|
||
51D000
|
unkown
|
page execute and write copy
|
||
382F000
|
stack
|
page read and write
|
||
BB4000
|
heap
|
page read and write
|
||
CAC000
|
stack
|
page read and write
|
||
28A6D6A0000
|
trusted library allocation
|
page read and write
|
||
B3A000
|
heap
|
page read and write
|
||
6804000
|
heap
|
page read and write
|
||
54F0000
|
direct allocation
|
page execute and read and write
|
||
B8DA57E000
|
stack
|
page read and write
|
||
BE1000
|
heap
|
page read and write
|
||
4BDE000
|
stack
|
page read and write
|
||
2C30000
|
direct allocation
|
page read and write
|
||
1314000
|
heap
|
page read and write
|
||
CE9000
|
unkown
|
page read and write
|
||
3A0F000
|
stack
|
page read and write
|
||
4541000
|
heap
|
page read and write
|
||
7FFD24520000
|
trusted library allocation
|
page read and write
|
||
510000
|
unkown
|
page execute and read and write
|
||
1490000
|
heap
|
page read and write
|
||
8FA000
|
stack
|
page read and write
|
||
457F000
|
stack
|
page read and write
|
||
3CBE000
|
stack
|
page read and write
|
||
861B000
|
heap
|
page read and write
|
||
CEB000
|
unkown
|
page execute and read and write
|
||
4871000
|
heap
|
page read and write
|
||
49E0000
|
direct allocation
|
page read and write
|
||
37BF000
|
stack
|
page read and write
|
||
4C71000
|
heap
|
page read and write
|
||
FB4000
|
heap
|
page read and write
|
||
5080000
|
direct allocation
|
page execute and read and write
|
||
37BE000
|
stack
|
page read and write
|
||
476F000
|
stack
|
page read and write
|
||
407E000
|
stack
|
page read and write
|
||
5460000
|
direct allocation
|
page execute and read and write
|
||
7FFD24620000
|
trusted library allocation
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
75C000
|
stack
|
page read and write
|
||
4B63000
|
direct allocation
|
page read and write
|
||
DF4000
|
heap
|
page read and write
|
||
D94000
|
heap
|
page read and write
|
||
1310000
|
heap
|
page read and write
|
||
4E20000
|
direct allocation
|
page read and write
|
||
16BE000
|
stack
|
page read and write
|
||
4C10000
|
direct allocation
|
page execute and read and write
|
||
28A6D59F000
|
heap
|
page read and write
|
||
7FFD24680000
|
trusted library allocation
|
page read and write
|
||
FB4000
|
heap
|
page read and write
|
||
2EBF000
|
stack
|
page read and write
|
||
3E8E000
|
stack
|
page read and write
|
||
13D4000
|
heap
|
page read and write
|
||
2D40000
|
direct allocation
|
page read and write
|
||
C6E000
|
stack
|
page read and write
|
||
39FF000
|
stack
|
page read and write
|
||
4ABE000
|
stack
|
page read and write
|
||
5280000
|
direct allocation
|
page execute and read and write
|
||
54E0000
|
direct allocation
|
page execute and read and write
|
||
7FFD245B0000
|
trusted library allocation
|
page read and write
|
||
201000
|
unkown
|
page execute and write copy
|
||
391E000
|
stack
|
page read and write
|
||
F34000
|
heap
|
page read and write
|
||
2D40000
|
direct allocation
|
page read and write
|
||
31EF000
|
stack
|
page read and write
|
||
7FFD24441000
|
trusted library allocation
|
page read and write
|
||
3ADF000
|
stack
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
200000
|
unkown
|
page readonly
|
||
DF4000
|
heap
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
332E000
|
stack
|
page read and write
|
||
200000
|
unkown
|
page readonly
|
||
1160000
|
direct allocation
|
page execute and read and write
|
||
28A6D3F0000
|
heap
|
page read and write
|
||
B93000
|
heap
|
page read and write
|
||
4E80000
|
direct allocation
|
page read and write
|
||
13A0000
|
direct allocation
|
page read and write
|
||
B4C000
|
stack
|
page read and write
|
||
26B000
|
unkown
|
page execute and read and write
|
||
31A0000
|
direct allocation
|
page read and write
|
||
3F3F000
|
stack
|
page read and write
|
||
BB4000
|
heap
|
page read and write
|
||
4661000
|
heap
|
page read and write
|
||
30DF000
|
stack
|
page read and write
|
||
6C4000
|
unkown
|
page execute and read and write
|
||
40BE000
|
stack
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
EE0000
|
heap
|
page read and write
|
||
1314000
|
heap
|
page read and write
|
||
F34000
|
heap
|
page read and write
|
||
13CB000
|
heap
|
page read and write
|
||
372F000
|
stack
|
page read and write
|
||
2C30000
|
direct allocation
|
page read and write
|
||
C64000
|
heap
|
page read and write
|
||
54D0000
|
direct allocation
|
page execute and read and write
|
||
4B3E000
|
stack
|
page read and write
|
||
52D0000
|
direct allocation
|
page read and write
|
||
4B60000
|
direct allocation
|
page execute and read and write
|
||
493F000
|
stack
|
page read and write
|
||
5310000
|
direct allocation
|
page execute and read and write
|
||
FA0000
|
direct allocation
|
page read and write
|
||
2C30000
|
direct allocation
|
page read and write
|
||
434F000
|
stack
|
page read and write
|
||
BF9000
|
heap
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
4A7F000
|
stack
|
page read and write
|
||
F34000
|
heap
|
page read and write
|
||
28A6D6A0000
|
trusted library allocation
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
1E1F0C6E000
|
heap
|
page read and write
|
||
7FFD246A0000
|
trusted library allocation
|
page read and write
|
||
28A6D64E000
|
heap
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
4E20000
|
direct allocation
|
page read and write
|
||
1E1F2CC0000
|
heap
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
422F000
|
stack
|
page read and write
|
||
4E4E000
|
stack
|
page read and write
|
||
4E70000
|
direct allocation
|
page execute and read and write
|
||
4D2E000
|
stack
|
page read and write
|
||
1E181887000
|
trusted library allocation
|
page read and write
|
||
1140000
|
heap
|
page read and write
|
||
1314000
|
heap
|
page read and write
|
||
4DD0000
|
trusted library allocation
|
page read and write
|
||
52C0000
|
direct allocation
|
page execute and read and write
|
||
1E1F2795000
|
heap
|
page read and write
|
||
CF4000
|
heap
|
page read and write
|
||
AFD000
|
stack
|
page read and write
|
||
379F000
|
stack
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
440E000
|
stack
|
page read and write
|
||
D3E000
|
stack
|
page read and write
|
||
75C000
|
stack
|
page read and write
|
||
CF7000
|
heap
|
page read and write
|
||
FB4000
|
heap
|
page read and write
|
||
63FE000
|
stack
|
page read and write
|
||
FA0000
|
direct allocation
|
page read and write
|
||
13D9000
|
heap
|
page read and write
|
||
1414000
|
heap
|
page read and write
|
||
3C1F000
|
stack
|
page read and write
|
||
4C80000
|
direct allocation
|
page execute and read and write
|
||
2D40000
|
direct allocation
|
page read and write
|
||
3020000
|
heap
|
page read and write
|
||
4BA0000
|
direct allocation
|
page execute and read and write
|
||
4540000
|
direct allocation
|
page read and write
|
||
4660000
|
heap
|
page read and write
|
||
1E1815A3000
|
trusted library allocation
|
page read and write
|
||
C64000
|
heap
|
page read and write
|
||
2D40000
|
direct allocation
|
page read and write
|
||
4E80000
|
direct allocation
|
page execute and read and write
|
||
4BD0000
|
direct allocation
|
page execute and read and write
|
||
2E8F000
|
stack
|
page read and write
|
||
28A6D4D0000
|
heap
|
page read and write
|
||
4870000
|
heap
|
page read and write
|
||
4FE0000
|
direct allocation
|
page execute and read and write
|
||
4540000
|
direct allocation
|
page read and write
|
||
36EF000
|
stack
|
page read and write
|
||
200000
|
unkown
|
page readonly
|
||
51E000
|
unkown
|
page execute and write copy
|
||
4541000
|
heap
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
2C30000
|
direct allocation
|
page read and write
|
||
338F000
|
stack
|
page read and write
|
||
4650000
|
direct allocation
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
4540000
|
direct allocation
|
page read and write
|
||
4D20000
|
direct allocation
|
page execute and read and write
|
||
5000000
|
direct allocation
|
page execute and read and write
|
||
54C0000
|
direct allocation
|
page execute and read and write
|
||
D4B000
|
heap
|
page read and write
|
||
4F4F000
|
stack
|
page read and write
|
||
264000
|
unkown
|
page execute and read and write
|
||
B90000
|
heap
|
page read and write
|
||
66CE000
|
heap
|
page read and write
|
||
322F000
|
stack
|
page read and write
|
||
20C08A98000
|
heap
|
page read and write
|
||
334E000
|
stack
|
page read and write
|
||
7FFD24510000
|
trusted library allocation
|
page read and write
|
||
B07CA7E000
|
stack
|
page read and write
|
||
51D000
|
unkown
|
page execute and write copy
|
||
2C9E000
|
stack
|
page read and write
|
||
FB4000
|
heap
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
4E20000
|
direct allocation
|
page read and write
|
||
4E20000
|
direct allocation
|
page read and write
|
||
CF4000
|
heap
|
page read and write
|
||
3C8F000
|
stack
|
page read and write
|
||
49E0000
|
direct allocation
|
page read and write
|
||
1414000
|
heap
|
page read and write
|
||
4C70000
|
heap
|
page read and write
|
||
31A0000
|
direct allocation
|
page read and write
|
||
143B000
|
heap
|
page read and write
|
||
2D60000
|
heap
|
page read and write
|
||
49DF000
|
stack
|
page read and write
|
||
CD0000
|
direct allocation
|
page read and write
|
||
4BC0000
|
direct allocation
|
page execute and read and write
|
||
200000
|
unkown
|
page read and write
|
||
66D0000
|
heap
|
page read and write
|
||
7FFD244A0000
|
trusted library allocation
|
page read and write
|
||
4540000
|
direct allocation
|
page read and write
|
||
1414000
|
heap
|
page read and write
|
||
3FC000
|
unkown
|
page execute and read and write
|
||
37EF000
|
stack
|
page read and write
|
||
B8DA37F000
|
stack
|
page read and write
|
||
4A53000
|
direct allocation
|
page read and write
|
||
BB5000
|
heap
|
page read and write
|
||
BB4000
|
heap
|
page read and write
|
||
4BBF000
|
stack
|
page read and write
|
||
1414000
|
heap
|
page read and write
|
||
20C08C15000
|
heap
|
page read and write
|
||
4BA0000
|
direct allocation
|
page execute and read and write
|
||
4F80000
|
direct allocation
|
page execute and read and write
|
||
954000
|
heap
|
page read and write
|
||
7FFD24720000
|
trusted library allocation
|
page execute and read and write
|
||
51D000
|
unkown
|
page execute and read and write
|
||
BCB000
|
heap
|
page read and write
|
||
404F000
|
stack
|
page read and write
|
||
264000
|
unkown
|
page execute and read and write
|
||
4541000
|
heap
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
4650000
|
direct allocation
|
page read and write
|
||
1414000
|
heap
|
page read and write
|
||
4DA000
|
unkown
|
page execute and read and write
|
||
4871000
|
heap
|
page read and write
|
||
4A2E000
|
stack
|
page read and write
|
||
51D000
|
unkown
|
page execute and read and write
|
||
47DF000
|
stack
|
page read and write
|
||
49E0000
|
direct allocation
|
page read and write
|
||
1E1F2BFC000
|
heap
|
page read and write
|
||
110E000
|
stack
|
page read and write
|
||
1E1818DC000
|
trusted library allocation
|
page read and write
|
||
7FFD24710000
|
trusted library allocation
|
page read and write
|
||
4AF0000
|
direct allocation
|
page read and write
|
||
F87000
|
unkown
|
page execute and read and write
|
||
3DFF000
|
stack
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
3A8F000
|
stack
|
page read and write
|
||
49E0000
|
direct allocation
|
page read and write
|
||
CE4000
|
unkown
|
page execute and read and write
|
||
369E000
|
stack
|
page read and write
|
||
2C30000
|
direct allocation
|
page read and write
|
||
3FCE000
|
stack
|
page read and write
|
||
5430000
|
direct allocation
|
page execute and read and write
|
||
49F1000
|
heap
|
page read and write
|
||
1497000
|
heap
|
page read and write
|
||
BE1000
|
heap
|
page read and write
|
||
3CCE000
|
stack
|
page read and write
|
||
49E0000
|
direct allocation
|
page read and write
|
||
4991000
|
heap
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
DF4000
|
heap
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
B80000
|
heap
|
page read and write
|
||
2DBE000
|
stack
|
page read and write
|
||
C64000
|
heap
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
54B0000
|
direct allocation
|
page execute and read and write
|
||
200000
|
unkown
|
page readonly
|
||
4F00000
|
direct allocation
|
page execute and read and write
|
||
38FF000
|
stack
|
page read and write
|
||
7FFD242EC000
|
trusted library allocation
|
page execute and read and write
|
||
2F8E000
|
stack
|
page read and write
|
||
402E000
|
stack
|
page read and write
|
||
28A6D750000
|
trusted library allocation
|
page read and write
|
||
36CF000
|
stack
|
page read and write
|
||
3BBE000
|
stack
|
page read and write
|
||
1E1F2F7F000
|
heap
|
page read and write
|
||
324F000
|
stack
|
page read and write
|
||
3DCE000
|
stack
|
page read and write
|
||
1E1F2EF1000
|
heap
|
page read and write
|
||
1120000
|
direct allocation
|
page read and write
|
||
BB4000
|
heap
|
page read and write
|
||
371F000
|
stack
|
page read and write
|
||
443F000
|
stack
|
page read and write
|
||
4B40000
|
direct allocation
|
page execute and read and write
|
||
BB4000
|
heap
|
page read and write
|
||
C00000
|
heap
|
page read and write
|
||
F5A000
|
unkown
|
page execute and read and write
|
||
2D7F000
|
stack
|
page read and write
|
||
1E1F2BF0000
|
heap
|
page read and write
|
||
349F000
|
stack
|
page read and write
|
||
336E000
|
stack
|
page read and write
|
||
140F000
|
stack
|
page read and write
|
||
C64000
|
heap
|
page read and write
|
||
52C0000
|
direct allocation
|
page read and write
|
||
4650000
|
direct allocation
|
page read and write
|
||
4B70000
|
direct allocation
|
page execute and read and write
|
||
507000
|
unkown
|
page execute and read and write
|
||
13A0000
|
direct allocation
|
page read and write
|
||
52D0000
|
direct allocation
|
page read and write
|
||
2C7E000
|
stack
|
page read and write
|
||
66D0000
|
heap
|
page read and write
|
||
4DA000
|
unkown
|
page execute and read and write
|
||
1E1F2610000
|
heap
|
page read and write
|
||
1E180086000
|
trusted library allocation
|
page read and write
|
||
13E0000
|
heap
|
page read and write
|
||
1E1F2EB8000
|
heap
|
page read and write
|
||
52B0000
|
direct allocation
|
page execute and read and write
|
||
B8E000
|
heap
|
page read and write
|
||
1E18105D000
|
trusted library allocation
|
page read and write
|
||
49E0000
|
direct allocation
|
page read and write
|
||
B8D9FDE000
|
stack
|
page read and write
|
||
CBE000
|
stack
|
page read and write
|
||
FB4000
|
heap
|
page read and write
|
||
4C80000
|
direct allocation
|
page execute and read and write
|
||
1E1F0C78000
|
heap
|
page read and write
|
||
7FFD244D0000
|
trusted library allocation
|
page read and write
|
||
33FF000
|
stack
|
page read and write
|
||
142B000
|
heap
|
page read and write
|
||
3F0E000
|
stack
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
4B70000
|
direct allocation
|
page execute and read and write
|
||
1E181536000
|
trusted library allocation
|
page read and write
|
||
1E1F2EA0000
|
heap
|
page read and write
|
||
4B80000
|
direct allocation
|
page execute and read and write
|
||
BA0000
|
direct allocation
|
page read and write
|
||
5450000
|
direct allocation
|
page execute and read and write
|
||
33FE000
|
stack
|
page read and write
|
||
5450000
|
direct allocation
|
page execute and read and write
|
||
4B2F000
|
stack
|
page read and write
|
||
F9D000
|
unkown
|
page execute and write copy
|
||
475F000
|
stack
|
page read and write
|
||
4541000
|
heap
|
page read and write
|
||
B8DA677000
|
stack
|
page read and write
|
||
7FFD24490000
|
trusted library allocation
|
page read and write
|
||
5460000
|
direct allocation
|
page execute and read and write
|
||
1E1F2FC1000
|
heap
|
page read and write
|
||
C70000
|
heap
|
page read and write
|
||
378F000
|
stack
|
page read and write
|
||
348E000
|
stack
|
page read and write
|
||
1E1F0C74000
|
heap
|
page read and write
|
||
454E000
|
stack
|
page read and write
|
||
BB4000
|
heap
|
page read and write
|
||
3C0E000
|
stack
|
page read and write
|
||
4E80000
|
direct allocation
|
page read and write
|
||
357E000
|
stack
|
page read and write
|
||
313F000
|
stack
|
page read and write
|
||
F90000
|
heap
|
page read and write
|
||
1E180DE1000
|
trusted library allocation
|
page read and write
|
||
35AE000
|
stack
|
page read and write
|
||
5300000
|
direct allocation
|
page execute and read and write
|
||
4E20000
|
direct allocation
|
page read and write
|
||
2C67000
|
heap
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
540F000
|
stack
|
page read and write
|
||
CF4000
|
heap
|
page read and write
|
||
6C4000
|
unkown
|
page execute and read and write
|
||
6C4000
|
unkown
|
page execute and read and write
|
||
2B1F000
|
stack
|
page read and write
|
||
4B90000
|
direct allocation
|
page execute and read and write
|
||
350E000
|
stack
|
page read and write
|
||
5010000
|
direct allocation
|
page execute and read and write
|
||
5460000
|
direct allocation
|
page execute and read and write
|
||
4871000
|
heap
|
page read and write
|
||
1E1F0FA0000
|
heap
|
page read and write
|
||
350F000
|
stack
|
page read and write
|
||
2C30000
|
direct allocation
|
page read and write
|
||
44CE000
|
stack
|
page read and write
|
||
E9F000
|
stack
|
page read and write
|
||
B07C97E000
|
stack
|
page read and write
|
||
394F000
|
stack
|
page read and write
|
||
7FFD24580000
|
trusted library allocation
|
page read and write
|
||
510000
|
unkown
|
page execute and read and write
|
||
446F000
|
stack
|
page read and write
|
||
4541000
|
heap
|
page read and write
|
||
4B80000
|
direct allocation
|
page execute and read and write
|
||
9F974ED000
|
stack
|
page read and write
|
||
26B000
|
unkown
|
page execute and read and write
|
||
134F000
|
stack
|
page read and write
|
||
7FFD245F8000
|
trusted library allocation
|
page read and write
|
||
1314000
|
heap
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
472F000
|
stack
|
page read and write
|
||
54F0000
|
direct allocation
|
page execute and read and write
|
||
5000000
|
direct allocation
|
page execute and read and write
|
||
CD0000
|
direct allocation
|
page read and write
|
||
2D0E000
|
stack
|
page read and write
|
||
26B000
|
unkown
|
page execute and read and write
|
||
20C0A670000
|
heap
|
page read and write
|
||
3DFE000
|
stack
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
BB4000
|
heap
|
page read and write
|
||
FA0000
|
direct allocation
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
491F000
|
stack
|
page read and write
|
||
399F000
|
stack
|
page read and write
|
||
7FFD2444A000
|
trusted library allocation
|
page read and write
|
||
201000
|
unkown
|
page execute and write copy
|
||
4871000
|
heap
|
page read and write
|
||
1E1F2C3B000
|
heap
|
page read and write
|
||
2B5E000
|
stack
|
page read and write
|
||
3C2E000
|
stack
|
page read and write
|
||
44EE000
|
stack
|
page read and write
|
||
663F000
|
stack
|
page read and write
|
||
4650000
|
direct allocation
|
page read and write
|
||
3D2E000
|
stack
|
page read and write
|
||
3EAF000
|
stack
|
page read and write
|
||
5060000
|
direct allocation
|
page execute and read and write
|
||
1414000
|
heap
|
page read and write
|
||
50C0000
|
direct allocation
|
page execute and read and write
|
||
7FFD24290000
|
trusted library allocation
|
page read and write
|
||
34FF000
|
stack
|
page read and write
|
||
123C000
|
stack
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
DF4000
|
heap
|
page read and write
|
||
304E000
|
stack
|
page read and write
|
||
6A3E000
|
stack
|
page read and write
|
||
DF4000
|
heap
|
page read and write
|
||
1170000
|
heap
|
page read and write
|
||
172E000
|
stack
|
page read and write
|
||
1E1F2EDC000
|
heap
|
page read and write
|
||
13B0000
|
heap
|
page read and write
|
||
4F60000
|
direct allocation
|
page execute and read and write
|
||
FA0000
|
direct allocation
|
page read and write
|
||
FB4000
|
heap
|
page read and write
|
||
1E181865000
|
trusted library allocation
|
page read and write
|
||
4B70000
|
direct allocation
|
page execute and read and write
|
||
507000
|
unkown
|
page execute and read and write
|
||
4BF0000
|
direct allocation
|
page execute and read and write
|
||
6C4000
|
unkown
|
page execute and read and write
|
||
4871000
|
heap
|
page read and write
|
||
3AEE000
|
stack
|
page read and write
|
||
7FFD24630000
|
trusted library allocation
|
page read and write
|
||
51D000
|
unkown
|
page execute and write copy
|
||
50B0000
|
direct allocation
|
page execute and read and write
|
||
2F6F000
|
stack
|
page read and write
|
||
5480000
|
direct allocation
|
page execute and read and write
|
||
147E000
|
stack
|
page read and write
|
||
CD0000
|
direct allocation
|
page read and write
|
||
7FFD24690000
|
trusted library allocation
|
page read and write
|
||
4541000
|
heap
|
page read and write
|
||
137F000
|
stack
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
384E000
|
stack
|
page read and write
|
||
49E0000
|
direct allocation
|
page read and write
|
||
321F000
|
stack
|
page read and write
|
||
3F1F000
|
stack
|
page read and write
|
||
FA0000
|
direct allocation
|
page read and write
|
||
382E000
|
stack
|
page read and write
|
||
1070000
|
heap
|
page read and write
|
||
125C000
|
stack
|
page read and write
|
||
BB4000
|
heap
|
page read and write
|
||
4541000
|
heap
|
page read and write
|
||
444E000
|
stack
|
page read and write
|
||
269000
|
unkown
|
page write copy
|
||
50F0000
|
direct allocation
|
page read and write
|
||
D94000
|
heap
|
page read and write
|
||
5140000
|
direct allocation
|
page execute and read and write
|
||
43FF000
|
stack
|
page read and write
|
||
2C30000
|
direct allocation
|
page read and write
|
||
1E181C28000
|
trusted library allocation
|
page read and write
|
||
B8DB44E000
|
stack
|
page read and write
|
||
FCF000
|
stack
|
page read and write
|
||
4B9F000
|
stack
|
page read and write
|
||
51D000
|
unkown
|
page execute and read and write
|
||
F34000
|
heap
|
page read and write
|
||
1414000
|
heap
|
page read and write
|
||
2C30000
|
direct allocation
|
page read and write
|
||
351F000
|
stack
|
page read and write
|
||
13A0000
|
direct allocation
|
page read and write
|
||
50F0000
|
direct allocation
|
page read and write
|
||
BFC000
|
heap
|
page read and write
|
||
4C71000
|
heap
|
page read and write
|
||
3190000
|
heap
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
3C8D000
|
stack
|
page read and write
|
||
1E1F2DC0000
|
heap
|
page read and write
|
||
269000
|
unkown
|
page read and write
|
||
4B40000
|
direct allocation
|
page execute and read and write
|
||
15BF000
|
stack
|
page read and write
|
||
4990000
|
trusted library allocation
|
page read and write
|
||
1E1F0C41000
|
heap
|
page read and write
|
||
269000
|
unkown
|
page read and write
|
||
13A0000
|
direct allocation
|
page read and write
|
||
4650000
|
direct allocation
|
page read and write
|
||
51D000
|
unkown
|
page execute and write copy
|
||
9F975FF000
|
unkown
|
page read and write
|
||
3C9E000
|
stack
|
page read and write
|
||
1E1F0C8E000
|
heap
|
page read and write
|
||
3C6E000
|
stack
|
page read and write
|
||
4E20000
|
direct allocation
|
page read and write
|
||
507000
|
unkown
|
page execute and read and write
|
||
29A0000
|
heap
|
page read and write
|
||
CF0000
|
heap
|
page read and write
|
||
49F1000
|
heap
|
page read and write
|
||
186F000
|
stack
|
page read and write
|
||
A6E000
|
stack
|
page read and write
|
||
F34000
|
heap
|
page read and write
|
||
1414000
|
heap
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
2D0F000
|
stack
|
page read and write
|
||
B76000
|
heap
|
page read and write
|
||
293F000
|
stack
|
page read and write
|
||
1E1F0C7A000
|
heap
|
page read and write
|
||
4C80000
|
direct allocation
|
page execute and read and write
|
||
BF7000
|
heap
|
page read and write
|
||
63BF000
|
stack
|
page read and write
|
||
B8DA777000
|
stack
|
page read and write
|
||
F34000
|
heap
|
page read and write
|
||
33AE000
|
stack
|
page read and write
|
||
20C0A850000
|
heap
|
page read and write
|
||
6C6000
|
unkown
|
page execute and write copy
|
||
4541000
|
heap
|
page read and write
|
||
1E181534000
|
trusted library allocation
|
page read and write
|
||
4E80000
|
direct allocation
|
page read and write
|
||
30AE000
|
stack
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
50C0000
|
direct allocation
|
page execute and read and write
|
||
3027000
|
heap
|
page read and write
|
||
4C80000
|
direct allocation
|
page execute and read and write
|
||
4E41000
|
heap
|
page read and write
|
||
BBB000
|
heap
|
page read and write
|
||
D94000
|
heap
|
page read and write
|
||
13D4000
|
heap
|
page read and write
|
||
4E20000
|
direct allocation
|
page read and write
|
||
4650000
|
direct allocation
|
page read and write
|
||
3E6F000
|
stack
|
page read and write
|
||
32CE000
|
stack
|
page read and write
|
||
1050000
|
heap
|
page read and write
|
||
311E000
|
stack
|
page read and write
|
||
355E000
|
stack
|
page read and write
|
||
9F974FE000
|
stack
|
page read and write
|
||
1E18150A000
|
trusted library allocation
|
page read and write
|
||
200000
|
unkown
|
page readonly
|
||
CD0000
|
direct allocation
|
page read and write
|
||
B8E000
|
heap
|
page read and write
|
||
4A2E000
|
stack
|
page read and write
|
||
CF0000
|
heap
|
page read and write
|
||
510000
|
unkown
|
page execute and read and write
|
||
954000
|
heap
|
page read and write
|
||
4E40000
|
heap
|
page read and write
|
||
B2C000
|
stack
|
page read and write
|
||
FA0000
|
direct allocation
|
page read and write
|
||
385F000
|
stack
|
page read and write
|
||
26B000
|
unkown
|
page execute and read and write
|
||
6C6000
|
unkown
|
page execute and write copy
|
||
BA0000
|
direct allocation
|
page read and write
|
||
C64000
|
heap
|
page read and write
|
||
7FFD245FC000
|
trusted library allocation
|
page read and write
|
||
2F6F000
|
stack
|
page read and write
|
||
4551000
|
heap
|
page read and write
|
||
45EE000
|
stack
|
page read and write
|
||
51D000
|
unkown
|
page execute and write copy
|
||
453F000
|
stack
|
page read and write
|
||
507000
|
unkown
|
page execute and read and write
|
||
1E181819000
|
trusted library allocation
|
page read and write
|
||
1E1F2C7A000
|
heap
|
page read and write
|
||
5450000
|
direct allocation
|
page execute and read and write
|
||
468F000
|
stack
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
BA0000
|
direct allocation
|
page read and write
|
||
BE1000
|
heap
|
page read and write
|
||
415E000
|
stack
|
page read and write
|
||
BE7000
|
heap
|
page read and write
|
||
29B0000
|
heap
|
page read and write
|
||
BB4000
|
heap
|
page read and write
|
||
2D5B000
|
stack
|
page read and write
|
||
368E000
|
stack
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
4540000
|
direct allocation
|
page read and write
|
||
C80000
|
unkown
|
page readonly
|
||
41CE000
|
stack
|
page read and write
|
||
7FFD245E9000
|
trusted library allocation
|
page read and write
|
||
13D4000
|
heap
|
page read and write
|
||
3A4E000
|
stack
|
page read and write
|
||
306F000
|
stack
|
page read and write
|
||
20C08ADF000
|
heap
|
page read and write
|
||
BAC000
|
heap
|
page read and write
|
||
DF4000
|
heap
|
page read and write
|
||
200000
|
unkown
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
66C1000
|
heap
|
page read and write
|
||
1E1F0BA0000
|
heap
|
page read and write
|
||
B07CBFC000
|
stack
|
page read and write
|
||
3D6F000
|
stack
|
page read and write
|
||
5470000
|
direct allocation
|
page execute and read and write
|
||
4871000
|
heap
|
page read and write
|
||
479E000
|
stack
|
page read and write
|
||
3F0F000
|
stack
|
page read and write
|
||
4B2F000
|
stack
|
page read and write
|
||
84FB000
|
stack
|
page read and write
|
||
653E000
|
stack
|
page read and write
|
||
B8DA7FE000
|
stack
|
page read and write
|
||
B8DA5F9000
|
stack
|
page read and write
|
||
BE1000
|
heap
|
page read and write
|
||
BCB000
|
heap
|
page read and write
|
||
4C71000
|
heap
|
page read and write
|
||
BAB000
|
heap
|
page read and write
|
||
C64000
|
heap
|
page read and write
|
||
2C60000
|
heap
|
page read and write
|
||
1E1F2760000
|
heap
|
page execute and read and write
|
||
954000
|
heap
|
page read and write
|
||
1314000
|
heap
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
C00000
|
heap
|
page read and write
|
||
B8DA2FF000
|
stack
|
page read and write
|
||
33CF000
|
stack
|
page read and write
|
||
BB1000
|
heap
|
page read and write
|
||
201000
|
unkown
|
page execute and write copy
|
||
7DF46C7B0000
|
trusted library allocation
|
page execute and read and write
|
||
954000
|
heap
|
page read and write
|
||
20C08950000
|
heap
|
page read and write
|
||
CF4000
|
heap
|
page read and write
|
||
33CE000
|
stack
|
page read and write
|
||
1E1F2FAC000
|
heap
|
page read and write
|
||
50F0000
|
direct allocation
|
page execute and read and write
|
||
510000
|
unkown
|
page execute and read and write
|
||
363F000
|
stack
|
page read and write
|
||
293C000
|
stack
|
page read and write
|
||
4540000
|
direct allocation
|
page read and write
|
||
4C6F000
|
stack
|
page read and write
|
||
4E30000
|
heap
|
page read and write
|
||
FA0000
|
direct allocation
|
page read and write
|
||
28A6D68A000
|
heap
|
page read and write
|
||
49E0000
|
direct allocation
|
page read and write
|
||
52A0000
|
direct allocation
|
page execute and read and write
|
||
BCB000
|
heap
|
page read and write
|
||
458E000
|
stack
|
page read and write
|
||
2A3F000
|
stack
|
page read and write
|
||
124F000
|
stack
|
page read and write
|
||
269000
|
unkown
|
page write copy
|
||
4871000
|
heap
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
31A0000
|
direct allocation
|
page read and write
|
||
49A0000
|
trusted library allocation
|
page read and write
|
||
B8D9F13000
|
stack
|
page read and write
|
||
6C4000
|
unkown
|
page execute and read and write
|
||
3A7E000
|
stack
|
page read and write
|
||
108A000
|
heap
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
2D40000
|
direct allocation
|
page read and write
|
||
5490000
|
direct allocation
|
page execute and read and write
|
||
507000
|
unkown
|
page execute and read and write
|
||
386E000
|
stack
|
page read and write
|
||
FA0000
|
direct allocation
|
page read and write
|
||
1414000
|
heap
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
D0E000
|
stack
|
page read and write
|
||
44DF000
|
stack
|
page read and write
|
||
1314000
|
heap
|
page read and write
|
||
408E000
|
stack
|
page read and write
|
||
7FFD246F0000
|
trusted library allocation
|
page read and write
|
||
14AB000
|
heap
|
page read and write
|
||
49E0000
|
direct allocation
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
BA0000
|
direct allocation
|
page read and write
|
||
380F000
|
stack
|
page read and write
|
||
403F000
|
stack
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
2E5F000
|
stack
|
page read and write
|
||
2C50000
|
direct allocation
|
page read and write
|
||
6C6000
|
unkown
|
page execute and write copy
|
||
2C10000
|
heap
|
page read and write
|
||
5040000
|
direct allocation
|
page execute and read and write
|
||
51E000
|
unkown
|
page execute and write copy
|
||
D5B000
|
heap
|
page read and write
|
||
42FE000
|
stack
|
page read and write
|
||
BB4000
|
heap
|
page read and write
|
||
2FCF000
|
stack
|
page read and write
|
||
7FFD246C0000
|
trusted library allocation
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
45AF000
|
stack
|
page read and write
|
||
1E1F2AEE000
|
heap
|
page read and write
|
||
26B000
|
unkown
|
page execute and read and write
|
||
5280000
|
direct allocation
|
page execute and read and write
|
||
4B70000
|
direct allocation
|
page execute and read and write
|
||
510000
|
unkown
|
page execute and read and write
|
||
4871000
|
heap
|
page read and write
|
||
3A3E000
|
stack
|
page read and write
|
||
F70000
|
heap
|
page read and write
|
||
3BAF000
|
stack
|
page read and write
|
||
43AF000
|
stack
|
page read and write
|
||
269000
|
unkown
|
page read and write
|
||
330F000
|
stack
|
page read and write
|
||
305E000
|
stack
|
page read and write
|
||
356F000
|
stack
|
page read and write
|
||
FB4000
|
heap
|
page read and write
|
||
315F000
|
stack
|
page read and write
|
||
1E1902F2000
|
trusted library allocation
|
page read and write
|
||
51D000
|
unkown
|
page execute and write copy
|
||
45CF000
|
stack
|
page read and write
|
||
7FFD242AB000
|
trusted library allocation
|
page read and write
|
||
13D4000
|
heap
|
page read and write
|
||
1E1F2F75000
|
heap
|
page read and write
|
||
48DE000
|
stack
|
page read and write
|
||
3FC000
|
unkown
|
page execute and read and write
|
||
4ED0000
|
direct allocation
|
page execute and read and write
|
||
693D000
|
stack
|
page read and write
|
||
5070000
|
direct allocation
|
page execute and read and write
|
||
C64000
|
heap
|
page read and write
|
||
1147000
|
heap
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
28A6F4F9000
|
heap
|
page read and write
|
||
51D000
|
unkown
|
page execute and read and write
|
||
5270000
|
direct allocation
|
page execute and read and write
|
||
2F9F000
|
stack
|
page read and write
|
||
332F000
|
stack
|
page read and write
|
||
461F000
|
stack
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
400F000
|
stack
|
page read and write
|
||
513E000
|
stack
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
D94000
|
heap
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
28A6D760000
|
heap
|
page read and write
|
||
F34000
|
heap
|
page read and write
|
||
BEB000
|
heap
|
page read and write
|
||
7FFD24430000
|
trusted library allocation
|
page read and write
|
||
49E0000
|
direct allocation
|
page read and write
|
||
5460000
|
direct allocation
|
page execute and read and write
|
||
3CDE000
|
stack
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
1E1F0C00000
|
heap
|
page read and write
|
||
462F000
|
stack
|
page read and write
|
||
33BF000
|
stack
|
page read and write
|
||
52D0000
|
direct allocation
|
page read and write
|
||
4E1F000
|
stack
|
page read and write
|
||
BE3000
|
heap
|
page read and write
|
||
376E000
|
stack
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
CD0000
|
direct allocation
|
page read and write
|
||
28A6D7D0000
|
heap
|
page read and write
|
||
5440000
|
direct allocation
|
page execute and read and write
|
||
42BF000
|
stack
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
BB4000
|
heap
|
page read and write
|
||
2D40000
|
direct allocation
|
page read and write
|
||
49EF000
|
stack
|
page read and write
|
||
1E1F2790000
|
heap
|
page read and write
|
||
346E000
|
stack
|
page read and write
|
||
4DA000
|
unkown
|
page execute and read and write
|
||
5450000
|
direct allocation
|
page execute and read and write
|
||
4FB0000
|
direct allocation
|
page execute and read and write
|
||
420F000
|
stack
|
page read and write
|
||
405F000
|
stack
|
page read and write
|
||
BB4000
|
heap
|
page read and write
|
||
29CB000
|
stack
|
page read and write
|
||
30EE000
|
stack
|
page read and write
|
||
CF4000
|
heap
|
page read and write
|
||
3C7E000
|
stack
|
page read and write
|
||
1E1F2BF7000
|
heap
|
page read and write
|
||
328E000
|
stack
|
page read and write
|
||
CD0000
|
direct allocation
|
page read and write
|
||
4541000
|
heap
|
page read and write
|
||
26B000
|
unkown
|
page execute and read and write
|
||
4871000
|
heap
|
page read and write
|
||
1E1F2650000
|
trusted library allocation
|
page read and write
|
||
5163000
|
direct allocation
|
page read and write
|
||
34CF000
|
stack
|
page read and write
|
||
7FFD245A0000
|
trusted library allocation
|
page read and write
|
||
51D000
|
unkown
|
page execute and write copy
|
||
2BEF000
|
stack
|
page read and write
|
||
32BF000
|
stack
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
7DF46C7D0000
|
trusted library allocation
|
page execute and read and write
|
||
13A0000
|
direct allocation
|
page read and write
|
||
F9E000
|
unkown
|
page execute and write copy
|
||
2ACF000
|
stack
|
page read and write
|
||
436F000
|
stack
|
page read and write
|
||
454F000
|
stack
|
page read and write
|
||
3F8E000
|
stack
|
page read and write
|
||
6C4000
|
unkown
|
page execute and read and write
|
||
BB4000
|
heap
|
page read and write
|
||
1E1F2D10000
|
trusted library allocation
|
page read and write
|
||
FB4000
|
heap
|
page read and write
|
||
2D40000
|
direct allocation
|
page read and write
|
||
3FAE000
|
stack
|
page read and write
|
||
3FC000
|
unkown
|
page execute and read and write
|
||
5290000
|
direct allocation
|
page execute and read and write
|
||
2837000
|
heap
|
page read and write
|
||
7FFD24670000
|
trusted library allocation
|
page read and write
|
||
418F000
|
stack
|
page read and write
|
||
49E0000
|
direct allocation
|
page read and write
|
||
13D4000
|
heap
|
page read and write
|
||
269000
|
unkown
|
page read and write
|
||
7FFD24640000
|
trusted library allocation
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
B8DB3CF000
|
stack
|
page read and write
|
||
7FFD245E0000
|
trusted library allocation
|
page read and write
|
||
465E000
|
stack
|
page read and write
|
||
2C3F000
|
stack
|
page read and write
|
||
CF4000
|
heap
|
page read and write
|
||
2C17000
|
heap
|
page read and write
|
||
51D000
|
unkown
|
page execute and write copy
|
||
7FFD24590000
|
trusted library allocation
|
page read and write
|
||
50E0000
|
direct allocation
|
page execute and read and write
|
||
3AAF000
|
stack
|
page read and write
|
||
5260000
|
direct allocation
|
page execute and read and write
|
||
C0D000
|
heap
|
page read and write
|
||
3F6F000
|
stack
|
page read and write
|
||
1E181561000
|
trusted library allocation
|
page read and write
|
||
2D2E000
|
stack
|
page read and write
|
||
1E1F2F43000
|
heap
|
page read and write
|
||
38BF000
|
stack
|
page read and write
|
||
3B4E000
|
stack
|
page read and write
|
||
3CEF000
|
stack
|
page read and write
|
||
3E1E000
|
stack
|
page read and write
|
||
F3F000
|
stack
|
page read and write
|
||
36EE000
|
stack
|
page read and write
|
||
317E000
|
stack
|
page read and write
|
||
28A6D6A0000
|
trusted library allocation
|
page read and write
|
||
1E1F25E0000
|
trusted library allocation
|
page read and write
|
||
51E000
|
unkown
|
page execute and write copy
|
||
439F000
|
stack
|
page read and write
|
||
1E181506000
|
trusted library allocation
|
page read and write
|
||
4B70000
|
direct allocation
|
page execute and read and write
|
||
301E000
|
stack
|
page read and write
|
||
430E000
|
stack
|
page read and write
|
||
6290000
|
heap
|
page read and write
|
||
1E1F2DD2000
|
heap
|
page read and write
|
||
4650000
|
direct allocation
|
page read and write
|
||
4541000
|
heap
|
page read and write
|
||
201000
|
unkown
|
page execute and write copy
|
||
5010000
|
heap
|
page read and write
|
||
1414000
|
heap
|
page read and write
|
||
32EF000
|
stack
|
page read and write
|
||
58B000
|
stack
|
page read and write
|
||
54E0000
|
direct allocation
|
page execute and read and write
|
||
4871000
|
heap
|
page read and write
|
||
4E40000
|
heap
|
page read and write
|
||
344F000
|
stack
|
page read and write
|
||
28A6D6A0000
|
trusted library allocation
|
page read and write
|
||
2D40000
|
direct allocation
|
page read and write
|
||
3FDF000
|
stack
|
page read and write
|
||
C60000
|
heap
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
6800000
|
heap
|
page read and write
|
||
28A6D4F0000
|
heap
|
page read and write
|
||
CF4000
|
heap
|
page read and write
|
||
4A2E000
|
stack
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
10EF000
|
stack
|
page read and write
|
||
392F000
|
stack
|
page read and write
|
||
32BE000
|
stack
|
page read and write
|
||
474E000
|
stack
|
page read and write
|
||
1390000
|
heap
|
page read and write
|
||
31A0000
|
direct allocation
|
page read and write
|
||
4FD0000
|
direct allocation
|
page execute and read and write
|
||
4F10000
|
direct allocation
|
page execute and read and write
|
||
4650000
|
direct allocation
|
page read and write
|
||
B94000
|
heap
|
page read and write
|
||
B07C9FB000
|
stack
|
page read and write
|
||
F34000
|
heap
|
page read and write
|
||
1420000
|
heap
|
page read and write
|
||
1314000
|
heap
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
28A6D5C9000
|
heap
|
page read and write
|
||
29DF000
|
stack
|
page read and write
|
||
5110000
|
direct allocation
|
page execute and read and write
|
||
3D4E000
|
stack
|
page read and write
|
||
51E000
|
unkown
|
page execute and write copy
|
||
51D000
|
unkown
|
page execute and read and write
|
||
2D9F000
|
stack
|
page read and write
|
||
FA0000
|
heap
|
page read and write
|
||
14BF000
|
stack
|
page read and write
|
||
4C90000
|
direct allocation
|
page execute and read and write
|
||
2D40000
|
direct allocation
|
page read and write
|
||
201000
|
unkown
|
page execute and write copy
|
||
37CE000
|
stack
|
page read and write
|
||
117B000
|
heap
|
page read and write
|
||
433E000
|
stack
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
1414000
|
heap
|
page read and write
|
||
F3E000
|
stack
|
page read and write
|
||
13A0000
|
direct allocation
|
page read and write
|
||
507000
|
unkown
|
page execute and read and write
|
||
51D000
|
unkown
|
page execute and write copy
|
||
E7C000
|
unkown
|
page execute and read and write
|
||
6C4000
|
unkown
|
page execute and read and write
|
||
954000
|
heap
|
page read and write
|
||
304E000
|
stack
|
page read and write
|
||
B07C5E6000
|
stack
|
page read and write
|
||
1E1F2C04000
|
heap
|
page read and write
|
||
CF4000
|
heap
|
page read and write
|
||
1E190300000
|
trusted library allocation
|
page read and write
|
||
B6D000
|
stack
|
page read and write
|
||
BA0000
|
direct allocation
|
page read and write
|
||
4F30000
|
direct allocation
|
page read and write
|
||
4541000
|
heap
|
page read and write
|
||
40AF000
|
stack
|
page read and write
|
||
2C50000
|
direct allocation
|
page read and write
|
||
7FFD246E0000
|
trusted library allocation
|
page read and write
|
||
364F000
|
stack
|
page read and write
|
||
7FFD24293000
|
trusted library allocation
|
page execute and read and write
|
||
341E000
|
stack
|
page read and write
|
||
1E18189E000
|
trusted library allocation
|
page read and write
|
||
5280000
|
direct allocation
|
page execute and read and write
|
||
498F000
|
stack
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
1E1F0BC0000
|
heap
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
EFD000
|
stack
|
page read and write
|
||
1E1F2F09000
|
heap
|
page read and write
|
||
1E190021000
|
trusted library allocation
|
page read and write
|
||
3A6F000
|
stack
|
page read and write
|
||
2EFE000
|
stack
|
page read and write
|
||
7FFD24340000
|
trusted library allocation
|
page read and write
|
||
41BE000
|
stack
|
page read and write
|
||
48EE000
|
stack
|
page read and write
|
||
5030000
|
direct allocation
|
page execute and read and write
|
||
31A0000
|
direct allocation
|
page read and write
|
||
5010000
|
direct allocation
|
page execute and read and write
|
||
1E1F2600000
|
trusted library allocation
|
page read and write
|
||
510000
|
unkown
|
page execute and read and write
|
||
BB4000
|
heap
|
page read and write
|
||
50C0000
|
direct allocation
|
page execute and read and write
|
||
200000
|
unkown
|
page read and write
|
||
3BEE000
|
stack
|
page read and write
|
||
200000
|
unkown
|
page readonly
|
||
28A6D770000
|
trusted library allocation
|
page read and write
|
||
31A0000
|
direct allocation
|
page read and write
|
||
34AF000
|
stack
|
page read and write
|
||
507000
|
unkown
|
page execute and read and write
|
||
36BE000
|
stack
|
page read and write
|
||
2D1F000
|
stack
|
page read and write
|
||
3D8E000
|
stack
|
page read and write
|
||
4661000
|
heap
|
page read and write
|
||
7FFD245E4000
|
trusted library allocation
|
page read and write
|
||
49E0000
|
direct allocation
|
page read and write
|
||
310F000
|
stack
|
page read and write
|
||
4AAF000
|
stack
|
page read and write
|
||
364E000
|
stack
|
page read and write
|
||
51E000
|
unkown
|
page execute and write copy
|
||
B07C8FE000
|
stack
|
page read and write
|
||
BA0000
|
direct allocation
|
page read and write
|
||
2F9F000
|
stack
|
page read and write
|
||
10CE000
|
stack
|
page read and write
|
||
3B3F000
|
stack
|
page read and write
|
||
9F976FF000
|
stack
|
page read and write
|
||
27AB000
|
stack
|
page read and write
|
||
4550000
|
heap
|
page read and write
|
||
20C08AA5000
|
heap
|
page read and write
|
||
54B0000
|
direct allocation
|
page execute and read and write
|
||
5450000
|
direct allocation
|
page execute and read and write
|
||
4B40000
|
direct allocation
|
page execute and read and write
|
||
3A3F000
|
stack
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
50A0000
|
direct allocation
|
page execute and read and write
|
||
13A0000
|
direct allocation
|
page read and write
|
||
3070000
|
heap
|
page read and write
|
||
3D2F000
|
stack
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
51E000
|
unkown
|
page execute and write copy
|
||
4BB0000
|
direct allocation
|
page execute and read and write
|
||
49E0000
|
direct allocation
|
page read and write
|
||
13A0000
|
direct allocation
|
page read and write
|
||
37FE000
|
stack
|
page read and write
|
||
31A0000
|
direct allocation
|
page read and write
|
||
BB4000
|
heap
|
page read and write
|
||
3F4E000
|
stack
|
page read and write
|
||
BB4000
|
heap
|
page read and write
|
||
2FDE000
|
stack
|
page read and write
|
||
2CAE000
|
stack
|
page read and write
|
||
BA0000
|
direct allocation
|
page read and write
|
||
4F59000
|
stack
|
page read and write
|
||
3FEE000
|
stack
|
page read and write
|
||
39AE000
|
stack
|
page read and write
|
||
47AE000
|
stack
|
page read and write
|
||
462E000
|
stack
|
page read and write
|
||
201000
|
unkown
|
page execute and write copy
|
||
FDA000
|
heap
|
page read and write
|
||
4FF0000
|
direct allocation
|
page execute and read and write
|
||
3EAE000
|
stack
|
page read and write
|
||
3FC000
|
unkown
|
page execute and read and write
|
||
3B0F000
|
stack
|
page read and write
|
||
3DDF000
|
stack
|
page read and write
|
||
3B4F000
|
stack
|
page read and write
|
||
13A0000
|
heap
|
page read and write
|
||
4B50000
|
direct allocation
|
page execute and read and write
|
||
40ED000
|
stack
|
page read and write
|
||
436E000
|
stack
|
page read and write
|
||
2E6F000
|
stack
|
page read and write
|
||
2E9E000
|
stack
|
page read and write
|
||
325E000
|
stack
|
page read and write
|
||
841C000
|
stack
|
page read and write
|
||
425F000
|
stack
|
page read and write
|
||
4AB0000
|
heap
|
page read and write
|
||
4B70000
|
direct allocation
|
page execute and read and write
|
||
3ECF000
|
stack
|
page read and write
|
||
200000
|
unkown
|
page readonly
|
||
470F000
|
stack
|
page read and write
|
||
7FFD24660000
|
trusted library allocation
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
4DA000
|
unkown
|
page execute and read and write
|
||
3A5E000
|
stack
|
page read and write
|
||
3BEF000
|
stack
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
3FAF000
|
stack
|
page read and write
|
||
269000
|
unkown
|
page write copy
|
||
452E000
|
stack
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
28A6F4C0000
|
heap
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
541F000
|
stack
|
page read and write
|
||
54D0000
|
direct allocation
|
page execute and read and write
|
||
BA6000
|
heap
|
page read and write
|
||
6C6000
|
unkown
|
page execute and write copy
|
||
314F000
|
stack
|
page read and write
|
||
F34000
|
heap
|
page read and write
|
||
3E3E000
|
stack
|
page read and write
|
||
264000
|
unkown
|
page execute and read and write
|
||
F34000
|
heap
|
page read and write
|
||
367F000
|
stack
|
page read and write
|
||
327F000
|
stack
|
page read and write
|
||
AAE000
|
stack
|
page read and write
|
||
4AB1000
|
heap
|
page read and write
|
||
B8DA6FD000
|
stack
|
page read and write
|
||
28DF000
|
stack
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
4E70000
|
direct allocation
|
page execute and read and write
|
||
D94000
|
heap
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
5250000
|
direct allocation
|
page execute and read and write
|
||
B8DA8FC000
|
stack
|
page read and write
|
||
445E000
|
stack
|
page read and write
|
||
322E000
|
stack
|
page read and write
|
||
4BC0000
|
direct allocation
|
page execute and read and write
|
||
4540000
|
direct allocation
|
page read and write
|
||
6C4000
|
unkown
|
page execute and read and write
|
||
12CF000
|
stack
|
page read and write
|
||
407F000
|
stack
|
page read and write
|
||
4CFF000
|
stack
|
page read and write
|
||
1120000
|
direct allocation
|
page read and write
|
||
4650000
|
direct allocation
|
page read and write
|
||
51E000
|
unkown
|
page execute and write copy
|
||
308F000
|
stack
|
page read and write
|
||
4A5F000
|
stack
|
page read and write
|
||
370E000
|
stack
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
2D8E000
|
stack
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
F34000
|
heap
|
page read and write
|
||
393E000
|
stack
|
page read and write
|
||
EF0000
|
heap
|
page read and write
|
||
39DE000
|
stack
|
page read and write
|
||
201000
|
unkown
|
page execute and write copy
|
||
FB0000
|
heap
|
page read and write
|
||
4540000
|
direct allocation
|
page read and write
|
||
51D000
|
unkown
|
page execute and read and write
|
||
D80000
|
heap
|
page read and write
|
||
1E1F0CBB000
|
heap
|
page read and write
|
||
4FA0000
|
direct allocation
|
page execute and read and write
|
||
954000
|
heap
|
page read and write
|
||
49E0000
|
direct allocation
|
page read and write
|
||
3DAE000
|
stack
|
page read and write
|
||
1420000
|
heap
|
page read and write
|
||
2DDE000
|
stack
|
page read and write
|
||
1E18154A000
|
trusted library allocation
|
page read and write
|
||
2C0F000
|
stack
|
page read and write
|
||
269000
|
unkown
|
page read and write
|
||
4F60000
|
direct allocation
|
page execute and read and write
|
||
5010000
|
direct allocation
|
page execute and read and write
|
||
4871000
|
heap
|
page read and write
|
||
BCB000
|
heap
|
page read and write
|
||
BB4000
|
heap
|
page read and write
|
||
4540000
|
direct allocation
|
page read and write
|
||
13D4000
|
heap
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
3ACE000
|
stack
|
page read and write
|
||
D94000
|
heap
|
page read and write
|
||
507000
|
unkown
|
page execute and read and write
|
||
4871000
|
heap
|
page read and write
|
||
495E000
|
stack
|
page read and write
|
||
4F7E000
|
stack
|
page read and write
|
||
35EF000
|
stack
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
264000
|
unkown
|
page execute and read and write
|
||
312F000
|
stack
|
page read and write
|
||
4CE0000
|
direct allocation
|
page execute and read and write
|
||
7FFD244C0000
|
trusted library allocation
|
page read and write
|
||
3C2F000
|
stack
|
page read and write
|
||
CC0000
|
heap
|
page read and write
|
||
1E1F25C0000
|
trusted library allocation
|
page read and write
|
||
27EE000
|
stack
|
page read and write
|
||
1E18158D000
|
trusted library allocation
|
page read and write
|
||
44AF000
|
stack
|
page read and write
|
||
2D40000
|
direct allocation
|
page read and write
|
||
D87000
|
heap
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
26B000
|
unkown
|
page execute and read and write
|
||
4541000
|
heap
|
page read and write
|
||
4E20000
|
direct allocation
|
page read and write
|
||
31A0000
|
direct allocation
|
page read and write
|
||
342F000
|
stack
|
page read and write
|
||
FA0000
|
direct allocation
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
BEB000
|
heap
|
page read and write
|
||
FB4000
|
heap
|
page read and write
|
||
484F000
|
stack
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
7FFD24450000
|
trusted library allocation
|
page execute and read and write
|
||
3E6E000
|
stack
|
page read and write
|
||
300E000
|
stack
|
page read and write
|
||
269000
|
unkown
|
page read and write
|
||
2E50000
|
heap
|
page read and write
|
||
2B0E000
|
stack
|
page read and write
|
||
4BE0000
|
direct allocation
|
page execute and read and write
|
||
31B7000
|
heap
|
page read and write
|
||
3AAE000
|
stack
|
page read and write
|
||
2A1E000
|
stack
|
page read and write
|
||
2D30000
|
heap
|
page read and write
|
||
30CE000
|
stack
|
page read and write
|
||
C00000
|
heap
|
page read and write
|
||
50C0000
|
direct allocation
|
page execute and read and write
|
||
35DF000
|
stack
|
page read and write
|
||
4541000
|
heap
|
page read and write
|
||
7FFD24600000
|
trusted library allocation
|
page read and write
|
||
34EE000
|
stack
|
page read and write
|
||
52C0000
|
direct allocation
|
page read and write
|
||
2C4E000
|
stack
|
page read and write
|
||
48AF000
|
stack
|
page read and write
|
||
1E1F0D24000
|
heap
|
page read and write
|
||
C0D000
|
heap
|
page read and write
|
||
269000
|
unkown
|
page write copy
|
||
103F000
|
stack
|
page read and write
|
||
5270000
|
trusted library allocation
|
page read and write
|
||
7FFD24292000
|
trusted library allocation
|
page read and write
|
||
CF4000
|
heap
|
page read and write
|
||
4B6E000
|
stack
|
page read and write
|
||
46DE000
|
stack
|
page read and write
|
||
7FFD24530000
|
trusted library allocation
|
page read and write
|
||
1360000
|
heap
|
page read and write
|
||
28A6D7D5000
|
heap
|
page read and write
|
||
9F979FF000
|
stack
|
page read and write
|
||
510000
|
unkown
|
page execute and read and write
|
||
32DE000
|
stack
|
page read and write
|
||
49E0000
|
direct allocation
|
page read and write
|
||
4C50000
|
direct allocation
|
page execute and read and write
|
||
FB4000
|
heap
|
page read and write
|
||
3B7E000
|
stack
|
page read and write
|
||
3B1E000
|
stack
|
page read and write
|
||
4560000
|
heap
|
page read and write
|
||
B30000
|
heap
|
page read and write
|
||
372E000
|
stack
|
page read and write
|
||
F30000
|
heap
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
4E70000
|
direct allocation
|
page execute and read and write
|
||
8600000
|
heap
|
page read and write
|
||
31EE000
|
stack
|
page read and write
|
||
DF4000
|
heap
|
page read and write
|
||
1E1F2D20000
|
heap
|
page execute and read and write
|
||
4CB0000
|
direct allocation
|
page execute and read and write
|
||
49AE000
|
stack
|
page read and write
|
||
C64000
|
heap
|
page read and write
|
||
176F000
|
stack
|
page read and write
|
||
5050000
|
direct allocation
|
page execute and read and write
|
||
F9D000
|
unkown
|
page execute and read and write
|
||
2C30000
|
direct allocation
|
page read and write
|
||
5480000
|
direct allocation
|
page execute and read and write
|
||
269000
|
unkown
|
page read and write
|
||
FB4000
|
heap
|
page read and write
|
||
BB4000
|
heap
|
page read and write
|
||
13D4000
|
heap
|
page read and write
|
||
4990000
|
heap
|
page read and write
|
||
4C70000
|
direct allocation
|
page execute and read and write
|
||
B8DA47E000
|
stack
|
page read and write
|
||
BFC000
|
stack
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
1E1F25F0000
|
heap
|
page readonly
|
||
1E181B5F000
|
trusted library allocation
|
page read and write
|
||
141E000
|
stack
|
page read and write
|
||
3B5F000
|
stack
|
page read and write
|
||
C64000
|
heap
|
page read and write
|
||
431E000
|
stack
|
page read and write
|
||
31B0000
|
heap
|
page read and write
|
||
4DA000
|
unkown
|
page execute and read and write
|
||
D40000
|
heap
|
page read and write
|
||
4E90000
|
direct allocation
|
page execute and read and write
|
||
4EA0000
|
direct allocation
|
page execute and read and write
|
||
4871000
|
heap
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
3D9E000
|
stack
|
page read and write
|
||
4EE0000
|
direct allocation
|
page execute and read and write
|
||
5150000
|
direct allocation
|
page execute and read and write
|
||
6C6000
|
unkown
|
page execute and write copy
|
||
4F30000
|
direct allocation
|
page read and write
|
||
389E000
|
stack
|
page read and write
|
||
4B70000
|
direct allocation
|
page execute and read and write
|
||
1E190079000
|
trusted library allocation
|
page read and write
|
||
28A6D770000
|
trusted library allocation
|
page read and write
|
||
390E000
|
stack
|
page read and write
|
||
4B60000
|
direct allocation
|
page execute and read and write
|
||
BB4000
|
heap
|
page read and write
|
||
1120000
|
direct allocation
|
page read and write
|
||
52C0000
|
direct allocation
|
page read and write
|
||
1E1F3170000
|
heap
|
page read and write
|
||
D94000
|
heap
|
page read and write
|
||
42CE000
|
stack
|
page read and write
|
||
5014000
|
heap
|
page read and write
|
||
CF4000
|
heap
|
page read and write
|
||
4541000
|
heap
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
1E181577000
|
trusted library allocation
|
page read and write
|
||
5280000
|
trusted library allocation
|
page read and write
|
||
1E1F2C39000
|
heap
|
page read and write
|
||
2C30000
|
direct allocation
|
page read and write
|
||
6C6000
|
unkown
|
page execute and write copy
|
||
BCB000
|
heap
|
page read and write
|
||
50C0000
|
direct allocation
|
page execute and read and write
|
||
62B0000
|
heap
|
page read and write
|
||
35EE000
|
stack
|
page read and write
|
||
1E1F0FA5000
|
heap
|
page read and write
|
||
FB4000
|
heap
|
page read and write
|
||
4E20000
|
direct allocation
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
4C80000
|
direct allocation
|
page execute and read and write
|
||
1E1F2D26000
|
heap
|
page execute and read and write
|
||
7FFD242B0000
|
trusted library allocation
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
2D4F000
|
stack
|
page read and write
|
||
46EF000
|
stack
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
1E1F0B90000
|
heap
|
page read and write
|
||
49F1000
|
heap
|
page read and write
|
||
4EF3000
|
direct allocation
|
page read and write
|
||
5280000
|
direct allocation
|
page execute and read and write
|
||
4B70000
|
direct allocation
|
page execute and read and write
|
||
5120000
|
direct allocation
|
page execute and read and write
|
||
1314000
|
heap
|
page read and write
|
||
4EB0000
|
direct allocation
|
page execute and read and write
|
||
410E000
|
stack
|
page read and write
|
||
422E000
|
stack
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
2FFF000
|
stack
|
page read and write
|
||
4A53000
|
direct allocation
|
page read and write
|
||
13A0000
|
direct allocation
|
page read and write
|
||
398E000
|
stack
|
page read and write
|
||
42DF000
|
stack
|
page read and write
|
||
50A0000
|
direct allocation
|
page execute and read and write
|
||
4A9E000
|
stack
|
page read and write
|
||
201000
|
unkown
|
page execute and write copy
|
||
346F000
|
stack
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
318E000
|
stack
|
page read and write
|
||
1314000
|
heap
|
page read and write
|
||
404E000
|
stack
|
page read and write
|
||
13A0000
|
direct allocation
|
page read and write
|
||
3EFF000
|
stack
|
page read and write
|
||
4E20000
|
direct allocation
|
page read and write
|
||
CD0000
|
direct allocation
|
page read and write
|
||
7FFD24550000
|
trusted library allocation
|
page read and write
|
||
C64000
|
heap
|
page read and write
|
||
426F000
|
stack
|
page read and write
|
||
13A0000
|
direct allocation
|
page read and write
|
||
3C5E000
|
stack
|
page read and write
|
||
146F000
|
stack
|
page read and write
|
||
FA0000
|
direct allocation
|
page read and write
|
||
314E000
|
stack
|
page read and write
|
||
52E0000
|
direct allocation
|
page execute and read and write
|
||
4871000
|
heap
|
page read and write
|
||
7FFD243B0000
|
trusted library allocation
|
page execute and read and write
|
||
BF2000
|
heap
|
page read and write
|
||
7FFD244E0000
|
trusted library allocation
|
page read and write
|
||
49E0000
|
direct allocation
|
page read and write
|
||
7FFD24460000
|
trusted library allocation
|
page execute and read and write
|
||
C80000
|
unkown
|
page read and write
|
||
4B70000
|
direct allocation
|
page execute and read and write
|
||
4690000
|
heap
|
page read and write
|
||
264000
|
unkown
|
page execute and read and write
|
||
4B70000
|
direct allocation
|
page execute and read and write
|
||
6A7B000
|
stack
|
page read and write
|
||
4991000
|
heap
|
page read and write
|
||
3FEF000
|
stack
|
page read and write
|
||
2D6F000
|
stack
|
page read and write
|
||
3E9F000
|
stack
|
page read and write
|
||
3F5E000
|
stack
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
1E18151E000
|
trusted library allocation
|
page read and write
|
||
497E000
|
stack
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
200000
|
unkown
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
5460000
|
direct allocation
|
page execute and read and write
|
||
627E000
|
stack
|
page read and write
|
||
41EF000
|
stack
|
page read and write
|
||
4B70000
|
direct allocation
|
page execute and read and write
|
||
B3E000
|
stack
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
20C08A30000
|
heap
|
page read and write
|
||
B5F000
|
heap
|
page read and write
|
||
1E18162E000
|
trusted library allocation
|
page read and write
|
||
52D0000
|
direct allocation
|
page execute and read and write
|
||
1E1F2720000
|
heap
|
page execute and read and write
|
||
418E000
|
stack
|
page read and write
|
||
4541000
|
heap
|
page read and write
|
||
DF4000
|
heap
|
page read and write
|
||
4C3F000
|
stack
|
page read and write
|
||
343E000
|
stack
|
page read and write
|
||
3FC000
|
unkown
|
page execute and read and write
|
||
4871000
|
heap
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
4CDF000
|
stack
|
page read and write
|
||
450F000
|
stack
|
page read and write
|
||
2D67000
|
heap
|
page read and write
|
||
416E000
|
stack
|
page read and write
|
||
41FE000
|
stack
|
page read and write
|
||
2E6F000
|
stack
|
page read and write
|
||
B8DA87F000
|
stack
|
page read and write
|
||
6C6000
|
unkown
|
page execute and write copy
|
||
472E000
|
stack
|
page read and write
|
||
D94000
|
heap
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
4A53000
|
direct allocation
|
page read and write
|
||
BE1000
|
heap
|
page read and write
|
||
5010000
|
direct allocation
|
page execute and read and write
|
||
20C0A4D0000
|
heap
|
page read and write
|
||
DF4000
|
heap
|
page read and write
|
||
4B60000
|
direct allocation
|
page execute and read and write
|
||
5450000
|
direct allocation
|
page execute and read and write
|
||
5F0000
|
heap
|
page read and write
|
||
358F000
|
stack
|
page read and write
|
||
1E180001000
|
trusted library allocation
|
page read and write
|
||
4E50000
|
direct allocation
|
page execute and read and write
|
||
269000
|
unkown
|
page write copy
|
||
1E181579000
|
trusted library allocation
|
page read and write
|
||
45BE000
|
stack
|
page read and write
|
||
7FFD24294000
|
trusted library allocation
|
page read and write
|
||
3FC000
|
unkown
|
page execute and read and write
|
||
BFC000
|
heap
|
page read and write
|
||
2D60000
|
heap
|
page read and write
|
||
13D4000
|
heap
|
page read and write
|
||
426E000
|
stack
|
page read and write
|
||
455F000
|
stack
|
page read and write
|
||
51D000
|
unkown
|
page execute and read and write
|
||
1146000
|
unkown
|
page execute and write copy
|
||
5280000
|
direct allocation
|
page execute and read and write
|
||
20C08AB7000
|
heap
|
page read and write
|
||
5470000
|
direct allocation
|
page execute and read and write
|
||
4871000
|
heap
|
page read and write
|
||
4650000
|
direct allocation
|
page read and write
|
||
A6C000
|
stack
|
page read and write
|
||
BA0000
|
direct allocation
|
page read and write
|
||
4650000
|
direct allocation
|
page read and write
|
||
13A0000
|
direct allocation
|
page read and write
|
||
3D0F000
|
stack
|
page read and write
|
||
7FFD2434C000
|
trusted library allocation
|
page execute and read and write
|
||
954000
|
heap
|
page read and write
|
||
4B2F000
|
stack
|
page read and write
|
||
4D10000
|
direct allocation
|
page execute and read and write
|
||
2C50000
|
direct allocation
|
page read and write
|
||
C0E000
|
stack
|
page read and write
|
||
401E000
|
stack
|
page read and write
|
||
F90000
|
unkown
|
page execute and read and write
|
||
4E60000
|
direct allocation
|
page execute and read and write
|
||
31CF000
|
stack
|
page read and write
|
||
62B6000
|
heap
|
page read and write
|
||
49E0000
|
direct allocation
|
page read and write
|
||
264000
|
unkown
|
page execute and read and write
|
||
4E73000
|
direct allocation
|
page read and write
|
||
1E1F2CCD000
|
heap
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
1E1F0CB7000
|
heap
|
page read and write
|
||
7FFD244F0000
|
trusted library allocation
|
page read and write
|
||
1E181563000
|
trusted library allocation
|
page read and write
|
||
BA0000
|
direct allocation
|
page read and write
|
||
4CC0000
|
direct allocation
|
page execute and read and write
|
||
BB4000
|
heap
|
page read and write
|
||
2D40000
|
direct allocation
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
DF4000
|
heap
|
page read and write
|
||
4D00000
|
direct allocation
|
page execute and read and write
|
||
3E0E000
|
stack
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
3F7E000
|
stack
|
page read and write
|
||
424E000
|
stack
|
page read and write
|
||
386F000
|
stack
|
page read and write
|
||
FB4000
|
heap
|
page read and write
|
||
62B5000
|
heap
|
page read and write
|
||
38AE000
|
stack
|
page read and write
|
||
45EF000
|
stack
|
page read and write
|
||
412F000
|
stack
|
page read and write
|
||
4BF0000
|
direct allocation
|
page execute and read and write
|
||
4F60000
|
direct allocation
|
page execute and read and write
|
||
13D0000
|
heap
|
page read and write
|
||
4DA000
|
unkown
|
page execute and read and write
|
||
4650000
|
direct allocation
|
page read and write
|
||
B07C87D000
|
stack
|
page read and write
|
||
26B000
|
unkown
|
page execute and read and write
|
||
51E000
|
unkown
|
page execute and write copy
|
||
486F000
|
stack
|
page read and write
|
||
4E70000
|
direct allocation
|
page execute and read and write
|
||
CD0000
|
direct allocation
|
page read and write
|
||
20C08A50000
|
heap
|
page read and write
|
||
BA0000
|
direct allocation
|
page read and write
|
||
3F3E000
|
stack
|
page read and write
|
||
B7E000
|
stack
|
page read and write
|
||
49E0000
|
direct allocation
|
page read and write
|
||
46BF000
|
stack
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
33DF000
|
stack
|
page read and write
|
||
C0E000
|
heap
|
page read and write
|
||
DF4000
|
heap
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
32FE000
|
stack
|
page read and write
|
||
13BE000
|
stack
|
page read and write
|
||
7FFD245F0000
|
trusted library allocation
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
1E190031000
|
trusted library allocation
|
page read and write
|
||
412E000
|
stack
|
page read and write
|
||
CD0000
|
direct allocation
|
page read and write
|
||
531E000
|
stack
|
page read and write
|
||
B8F000
|
heap
|
page read and write
|
||
4D3E000
|
stack
|
page read and write
|
||
28A6D6A0000
|
trusted library allocation
|
page read and write
|
||
DF4000
|
heap
|
page read and write
|
||
4551000
|
heap
|
page read and write
|
||
C0D000
|
heap
|
page read and write
|
||
6C4000
|
unkown
|
page execute and read and write
|
||
4FE0000
|
direct allocation
|
page execute and read and write
|
||
BCB000
|
heap
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
44EF000
|
stack
|
page read and write
|
||
2D40000
|
direct allocation
|
page read and write
|
||
5460000
|
direct allocation
|
page execute and read and write
|
||
4AF0000
|
direct allocation
|
page read and write
|
||
13D4000
|
heap
|
page read and write
|
||
326E000
|
stack
|
page read and write
|
||
3C4F000
|
stack
|
page read and write
|
||
339E000
|
stack
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
441F000
|
stack
|
page read and write
|
||
41DE000
|
stack
|
page read and write
|
||
354E000
|
stack
|
page read and write
|
||
133D000
|
stack
|
page read and write
|
||
116D000
|
stack
|
page read and write
|
||
B8DA97E000
|
stack
|
page read and write
|
||
3D6E000
|
stack
|
page read and write
|
||
7FFD24480000
|
trusted library allocation
|
page execute and read and write
|
||
4D53000
|
direct allocation
|
page read and write
|
||
DAD000
|
stack
|
page read and write
|
||
54A0000
|
direct allocation
|
page execute and read and write
|
||
31A0000
|
direct allocation
|
page read and write
|
||
50C0000
|
direct allocation
|
page execute and read and write
|
||
43EE000
|
stack
|
page read and write
|
||
BB4000
|
heap
|
page read and write
|
||
107B000
|
heap
|
page read and write
|
||
360F000
|
stack
|
page read and write
|
||
38CE000
|
stack
|
page read and write
|
||
28A6D750000
|
trusted library allocation
|
page read and write
|
||
3EEE000
|
stack
|
page read and write
|
||
F34000
|
heap
|
page read and write
|
||
4B70000
|
direct allocation
|
page execute and read and write
|
||
D94000
|
heap
|
page read and write
|
||
F7E000
|
stack
|
page read and write
|
||
3E4F000
|
stack
|
page read and write
|
||
510000
|
unkown
|
page execute and read and write
|
||
D94000
|
heap
|
page read and write
|
||
476E000
|
stack
|
page read and write
|
||
318B000
|
stack
|
page read and write
|
||
336F000
|
stack
|
page read and write
|
||
4DA000
|
unkown
|
page execute and read and write
|
||
2C30000
|
direct allocation
|
page read and write
|
||
CD0000
|
direct allocation
|
page read and write
|
||
30AF000
|
stack
|
page read and write
|
||
CF4000
|
heap
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
3B8E000
|
stack
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
13D4000
|
heap
|
page read and write
|
||
4FC0000
|
direct allocation
|
page execute and read and write
|
||
1414000
|
heap
|
page read and write
|
||
4541000
|
heap
|
page read and write
|
||
B8D9F9E000
|
unkown
|
page read and write
|
||
4E30000
|
trusted library allocation
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
36AF000
|
stack
|
page read and write
|
||
5500000
|
direct allocation
|
page execute and read and write
|
||
FB4000
|
heap
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
50F0000
|
direct allocation
|
page read and write
|
||
EDE000
|
stack
|
page read and write
|
||
20C08A90000
|
heap
|
page read and write
|
||
4C60000
|
direct allocation
|
page execute and read and write
|
||
6C6000
|
unkown
|
page execute and write copy
|
||
4F60000
|
direct allocation
|
page execute and read and write
|
||
4E20000
|
direct allocation
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
409E000
|
stack
|
page read and write
|
||
482F000
|
stack
|
page read and write
|
||
2B3F000
|
stack
|
page read and write
|
||
5430000
|
direct allocation
|
page execute and read and write
|
||
D94000
|
heap
|
page read and write
|
||
3FC000
|
unkown
|
page execute and read and write
|
||
4871000
|
heap
|
page read and write
|
||
F34000
|
heap
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
FA0000
|
direct allocation
|
page read and write
|
||
BB4000
|
heap
|
page read and write
|
||
4541000
|
heap
|
page read and write
|
||
4EF0000
|
trusted library allocation
|
page read and write
|
||
BA9000
|
heap
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
D94000
|
heap
|
page read and write
|
||
4E70000
|
direct allocation
|
page execute and read and write
|
||
4871000
|
heap
|
page read and write
|
||
1314000
|
heap
|
page read and write
|
||
BB4000
|
heap
|
page read and write
|
||
7DF46C7C0000
|
trusted library allocation
|
page execute and read and write
|
||
486E000
|
stack
|
page read and write
|
||
3BCF000
|
stack
|
page read and write
|
||
4540000
|
direct allocation
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
507F000
|
stack
|
page read and write
|
||
51D000
|
unkown
|
page execute and write copy
|
||
7FFD24346000
|
trusted library allocation
|
page read and write
|
||
42CF000
|
stack
|
page read and write
|
||
303E000
|
stack
|
page read and write
|
||
489F000
|
stack
|
page read and write
|
||
4AF0000
|
direct allocation
|
page read and write
|
||
49E0000
|
direct allocation
|
page read and write
|
||
44AE000
|
stack
|
page read and write
|
||
7FFD24570000
|
trusted library allocation
|
page read and write
|
||
367E000
|
stack
|
page read and write
|
||
50D0000
|
direct allocation
|
page execute and read and write
|
||
B3E000
|
heap
|
page read and write
|
||
FA0000
|
direct allocation
|
page read and write
|
||
BA0000
|
direct allocation
|
page read and write
|
||
176E000
|
stack
|
page read and write
|
||
85FC000
|
stack
|
page read and write
|
||
35CE000
|
stack
|
page read and write
|
||
5010000
|
direct allocation
|
page execute and read and write
|
||
31A0000
|
direct allocation
|
page read and write
|
||
4E20000
|
direct allocation
|
page read and write
|
||
BEB000
|
heap
|
page read and write
|
||
269000
|
unkown
|
page write copy
|
||
4871000
|
heap
|
page read and write
|
||
7FFD245C0000
|
trusted library allocation
|
page read and write
|
||
162E000
|
stack
|
page read and write
|
||
282E000
|
stack
|
page read and write
|
||
20C08AB7000
|
heap
|
page read and write
|
||
4C00000
|
direct allocation
|
page execute and read and write
|
||
49F0000
|
heap
|
page read and write
|
||
5420000
|
direct allocation
|
page execute and read and write
|
||
374F000
|
stack
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
F0A000
|
heap
|
page read and write
|
||
451E000
|
stack
|
page read and write
|
||
4F90000
|
direct allocation
|
page execute and read and write
|
||
31A0000
|
direct allocation
|
page read and write
|
||
51D000
|
unkown
|
page execute and read and write
|
||
4CF0000
|
direct allocation
|
page execute and read and write
|
||
AFD000
|
stack
|
page read and write
|
||
1150000
|
direct allocation
|
page execute and read and write
|
||
1E1F2F98000
|
heap
|
page read and write
|
||
1314000
|
heap
|
page read and write
|
||
1E1902F8000
|
trusted library allocation
|
page read and write
|
||
481E000
|
stack
|
page read and write
|
||
20C08AB7000
|
heap
|
page read and write
|
||
396F000
|
stack
|
page read and write
|
||
3D5F000
|
stack
|
page read and write
|
||
440F000
|
stack
|
page read and write
|
||
4FF0000
|
direct allocation
|
page execute and read and write
|
||
C64000
|
heap
|
page read and write
|
||
39CF000
|
stack
|
page read and write
|
||
301F000
|
stack
|
page read and write
|
||
7FFD24650000
|
trusted library allocation
|
page read and write
|
||
4BD0000
|
direct allocation
|
page execute and read and write
|
||
264000
|
unkown
|
page execute and read and write
|
||
4540000
|
direct allocation
|
page read and write
|
||
269000
|
unkown
|
page write copy
|
||
1414000
|
heap
|
page read and write
|
||
14A0000
|
heap
|
page read and write
|
||
3E2F000
|
stack
|
page read and write
|
||
1E1815D7000
|
trusted library allocation
|
page read and write
|
||
D4E000
|
stack
|
page read and write
|
||
2C00000
|
heap
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
414F000
|
stack
|
page read and write
|
||
1314000
|
heap
|
page read and write
|
||
C64000
|
heap
|
page read and write
|
||
7FFD245C3000
|
trusted library allocation
|
page read and write
|
||
47FF000
|
stack
|
page read and write
|
||
2830000
|
heap
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
2D40000
|
direct allocation
|
page read and write
|
||
4FCF000
|
stack
|
page read and write
|
||
201000
|
unkown
|
page execute and write copy
|
||
6C6000
|
unkown
|
page execute and write copy
|
||
3DCF000
|
stack
|
page read and write
|
||
4540000
|
direct allocation
|
page read and write
|
||
2CEE000
|
stack
|
page read and write
|
||
388F000
|
stack
|
page read and write
|
||
4E2F000
|
stack
|
page read and write
|
||
4F30000
|
direct allocation
|
page read and write
|
||
2BFE000
|
stack
|
page read and write
|
||
200000
|
unkown
|
page readonly
|
||
BB4000
|
heap
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
428F000
|
stack
|
page read and write
|
||
269000
|
unkown
|
page write copy
|
||
314F000
|
stack
|
page read and write
|
||
7FFD24540000
|
trusted library allocation
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
4991000
|
heap
|
page read and write
|
||
411E000
|
stack
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
40CF000
|
stack
|
page read and write
|
||
200000
|
unkown
|
page read and write
|
||
328F000
|
stack
|
page read and write
|
||
4B70000
|
direct allocation
|
page execute and read and write
|
||
7FFD244B0000
|
trusted library allocation
|
page read and write
|
||
4C80000
|
direct allocation
|
page execute and read and write
|
||
4DA000
|
unkown
|
page execute and read and write
|
||
7FFD246D0000
|
trusted library allocation
|
page read and write
|
||
4EF0000
|
direct allocation
|
page execute and read and write
|
||
4541000
|
heap
|
page read and write
|
||
4B70000
|
direct allocation
|
page execute and read and write
|
||
4661000
|
heap
|
page read and write
|
||
954000
|
heap
|
page read and write
|
||
66C0000
|
heap
|
page read and write
|
||
4DA000
|
unkown
|
page execute and read and write
|
||
130E000
|
stack
|
page read and write
|
||
EFB000
|
heap
|
page read and write
|
||
950000
|
heap
|
page read and write
|
||
432F000
|
stack
|
page read and write
|
||
4F50000
|
direct allocation
|
page execute and read and write
|
||
4B90000
|
direct allocation
|
page execute and read and write
|
||
7FFD242A0000
|
trusted library allocation
|
page read and write
|
||
CF4000
|
heap
|
page read and write
|
||
200000
|
unkown
|
page read and write
|
||
269000
|
unkown
|
page write copy
|
||
BF2000
|
heap
|
page read and write
|
||
269000
|
unkown
|
page read and write
|
||
5090000
|
direct allocation
|
page execute and read and write
|
||
4871000
|
heap
|
page read and write
|
||
50B0000
|
trusted library allocation
|
page read and write
|
||
4B50000
|
direct allocation
|
page execute and read and write
|
||
419F000
|
stack
|
page read and write
|
||
26B000
|
unkown
|
page execute and read and write
|
||
5450000
|
direct allocation
|
page execute and read and write
|
||
20C08AD9000
|
heap
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
353F000
|
stack
|
page read and write
|
||
C81000
|
unkown
|
page execute and write copy
|
||
1E1817F4000
|
trusted library allocation
|
page read and write
|
||
13D4000
|
heap
|
page read and write
|
||
49E0000
|
direct allocation
|
page read and write
|
||
EFD000
|
stack
|
page read and write
|
||
F34000
|
heap
|
page read and write
|
||
4B50000
|
direct allocation
|
page execute and read and write
|
||
4871000
|
heap
|
page read and write
|
||
335F000
|
stack
|
page read and write
|
||
2C30000
|
direct allocation
|
page read and write
|
||
300F000
|
stack
|
page read and write
|
||
DF4000
|
heap
|
page read and write
|
||
2F4F000
|
stack
|
page read and write
|
||
1E181C24000
|
trusted library allocation
|
page read and write
|
||
39AF000
|
stack
|
page read and write
|
||
5010000
|
direct allocation
|
page execute and read and write
|
||
3A1F000
|
stack
|
page read and write
|
||
7FFD24376000
|
trusted library allocation
|
page execute and read and write
|
||
20C08C10000
|
heap
|
page read and write
|
||
CD0000
|
direct allocation
|
page read and write
|
||
375E000
|
stack
|
page read and write
|
||
429E000
|
stack
|
page read and write
|
||
2D4F000
|
stack
|
page read and write
|
||
200000
|
unkown
|
page read and write
|
||
4880000
|
heap
|
page read and write
|
||
5333000
|
direct allocation
|
page read and write
|
||
C64000
|
heap
|
page read and write
|
||
4CD0000
|
direct allocation
|
page execute and read and write
|
||
4990000
|
trusted library allocation
|
page read and write
|
||
377F000
|
stack
|
page read and write
|
||
900000
|
heap
|
page read and write
|
||
CF4000
|
heap
|
page read and write
|
||
1414000
|
heap
|
page read and write
|
||
7FFD24500000
|
trusted library allocation
|
page read and write
|
||
3EDE000
|
stack
|
page read and write
|
||
31AF000
|
stack
|
page read and write
|
||
4E3F000
|
stack
|
page read and write
|
||
4CA0000
|
direct allocation
|
page execute and read and write
|
||
1E181520000
|
trusted library allocation
|
page read and write
|
||
1E1F0C30000
|
heap
|
page read and write
|
||
340E000
|
stack
|
page read and write
|
||
5490000
|
direct allocation
|
page execute and read and write
|
||
4540000
|
direct allocation
|
page read and write
|
||
4AB1000
|
heap
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
11CE000
|
stack
|
page read and write
|
||
B8DA3F9000
|
stack
|
page read and write
|
||
64FF000
|
stack
|
page read and write
|
||
4541000
|
heap
|
page read and write
|
||
2C2E000
|
stack
|
page read and write
|
||
D94000
|
heap
|
page read and write
|
||
460E000
|
stack
|
page read and write
|
||
510000
|
unkown
|
page execute and read and write
|
||
31A0000
|
direct allocation
|
page read and write
|
||
5100000
|
direct allocation
|
page execute and read and write
|
||
4871000
|
heap
|
page read and write
|
||
DF4000
|
heap
|
page read and write
|
||
4B70000
|
direct allocation
|
page execute and read and write
|
||
200000
|
unkown
|
page readonly
|
||
CF4000
|
heap
|
page read and write
|
||
39EE000
|
stack
|
page read and write
|
||
13D4000
|
heap
|
page read and write
|
||
14BB000
|
heap
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
BFC000
|
heap
|
page read and write
|
||
4B70000
|
direct allocation
|
page execute and read and write
|
||
C4E000
|
stack
|
page read and write
|
||
3FC000
|
unkown
|
page execute and read and write
|
||
1410000
|
heap
|
page read and write
|
||
127E000
|
stack
|
page read and write
|
||
BA0000
|
direct allocation
|
page read and write
|
||
CD0000
|
direct allocation
|
page read and write
|
||
1414000
|
heap
|
page read and write
|
||
FA0000
|
direct allocation
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
4541000
|
heap
|
page read and write
|
||
496F000
|
stack
|
page read and write
|
||
4541000
|
heap
|
page read and write
|
||
2C5F000
|
stack
|
page read and write
|
||
2C30000
|
direct allocation
|
page read and write
|
||
4E70000
|
direct allocation
|
page execute and read and write
|
||
AEE000
|
stack
|
page read and write
|
||
38FE000
|
stack
|
page read and write
|
||
B8DA9FB000
|
stack
|
page read and write
|
||
4AB1000
|
heap
|
page read and write
|
||
37DE000
|
stack
|
page read and write
|
||
1314000
|
heap
|
page read and write
|
||
365F000
|
stack
|
page read and write
|
||
13D4000
|
heap
|
page read and write
|
||
BB4000
|
heap
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
200000
|
unkown
|
page read and write
|
||
2E4E000
|
stack
|
page read and write
|
||
C64000
|
heap
|
page read and write
|
||
28A6D6A0000
|
trusted library allocation
|
page read and write
|
||
BF2000
|
heap
|
page read and write
|
||
264000
|
unkown
|
page execute and read and write
|
||
353E000
|
stack
|
page read and write
|
||
4F60000
|
direct allocation
|
page execute and read and write
|
||
530E000
|
stack
|
page read and write
|
||
443E000
|
stack
|
page read and write
|
||
269000
|
unkown
|
page read and write
|
||
2DEF000
|
stack
|
page read and write
|
||
51D000
|
unkown
|
page execute and read and write
|
||
13D4000
|
heap
|
page read and write
|
||
4B70000
|
direct allocation
|
page execute and read and write
|
||
42AE000
|
stack
|
page read and write
|
||
1314000
|
heap
|
page read and write
|
||
2DAE000
|
stack
|
page read and write
|
||
2FAE000
|
stack
|
page read and write
|
||
B07CB7D000
|
stack
|
page read and write
|
||
5460000
|
direct allocation
|
page execute and read and write
|
||
106C000
|
stack
|
page read and write
|
||
3CBF000
|
stack
|
page read and write
|
||
4BE0000
|
direct allocation
|
page execute and read and write
|
||
43CF000
|
stack
|
page read and write
|
||
26B000
|
unkown
|
page execute and read and write
|
||
28A6D671000
|
heap
|
page read and write
|
||
4B70000
|
direct allocation
|
page execute and read and write
|
||
DF4000
|
heap
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
There are 1927 hidden memdumps, click here to show them.