Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SecuriteInfo.com.Win32.Evo-gen.29833.28353.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\cred64[1].dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\clip64[1].dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\246122658369_Desktop.zip
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\AppData\Roaming\a091ec0a6e2227\clip64.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\a091ec0a6e2227\cred64.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\_Files_\CURQNKVOIX.xlsx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_Files_\JSDNGYCOWY.docx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_Files_\JSDNGYCOWY.xlsx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_Files_\KZWFNRXYKI.docx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_Files_\NIKHQAIQAU.docx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_Files_\NIKHQAIQAU.xlsx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_Files_\RAYHIWGKDI.xlsx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_Files_\ZBEDCJPBEY.docx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gxo5w0te.hch.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_iy0vblow.bxf.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_iyswlnas.cwc.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qprtmgnp.q1a.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\Tasks\explorha.job
|
data
|
dropped
|
There are 12 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.29833.28353.exe
|
"C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.29833.28353.exe"
|
||
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
|
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
|
||
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
|
"C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe"
|
||
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
|
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
|
||
C:\Windows\SysWOW64\rundll32.exe
|
"C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
|
||
C:\Windows\System32\rundll32.exe
|
"C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
|
||
C:\Windows\System32\netsh.exe
|
netsh wlan show profiles
|
||
C:\Windows\SysWOW64\rundll32.exe
|
"C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell -Command Compress-Archive -Path 'C:\Users\user\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\user\AppData\Local\Temp\246122658369_Desktop.zip'
-CompressionLevel Optimal
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 1 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://193.233.132.56/Pneh2sXQk0/index.php
|
193.233.132.56
|
||
http://193.233.132.56/Pneh2sXQk0/index.php?wal=1
|
193.233.132.56
|
||
http://193.233.132.56/Pneh2sXQk0/Plugins/clip64.dll
|
193.233.132.56
|
||
http://193.233.132.56/Pneh2sXQk0/Plugins/cred64.dll
|
193.233.132.56
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
https://aka.ms/winsvr-2022-pshelp
|
unknown
|
||
http://193.233.132.56/l
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
http://193.233.132.56/Pneh2sXQk0/index.phpk
|
unknown
|
||
http://193.233.132.56/Pneh2sXQk0/index.phpd
|
unknown
|
||
http://193.233.132.56/Pneh2sXQk0/index.phpg
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://aka.ms/winsvr-2022-pshelpX
|
unknown
|
||
http://193.233.132.56/ferences.SourceAumid
|
unknown
|
||
http://193.233.132.56/Pneh2sXQk0/Plugins/clip64.dllv
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://193.233.132.56/Pneh2sXQk0/index.phpded
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
http://193.233.132.56/Pneh2sXQk0/index.php?wal=1s
|
unknown
|
||
http://193.233.132.56/Pneh2sXQk0/index.php3
|
unknown
|
||
http://193.233.132.56/Pneh2sXQk0/index.php?wal=1;BU)(A;OICI;GXGR;;;WD)D
|
unknown
|
||
http://193.233.132.56/Pneh2sXQk0/index.php2
|
unknown
|
||
http://193.233.132.56/Pneh2sXQk0/index.php-
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
http://193.233.132.56/Pneh2sXQk0/index.php27
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://193.233.132.56/
|
unknown
|
||
http://193.233.132.56/CoreCommonProxyStub.dll
|
unknown
|
||
http://193.233.132.56/Pneh2sXQk0/index.php6
|
unknown
|
There are 24 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
193.233.132.56
|
unknown
|
Russian Federation
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
5450000
|
direct allocation
|
page read and write
|
||
6C981000
|
unkown
|
page execute read
|
||
E11000
|
unkown
|
page execute and read and write
|
||
47E0000
|
direct allocation
|
page read and write
|
||
861000
|
unkown
|
page execute and read and write
|
||
4CD0000
|
direct allocation
|
page read and write
|
||
861000
|
unkown
|
page execute and read and write
|
||
861000
|
unkown
|
page execute and read and write
|
||
4D90000
|
direct allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
F84000
|
heap
|
page read and write
|
||
B31000
|
unkown
|
page execute and read and write
|
||
7DF4363D0000
|
trusted library allocation
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
110F000
|
unkown
|
page execute and write copy
|
||
162A000
|
heap
|
page read and write
|
||
356F000
|
stack
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
2CAF000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
21FF4000000
|
heap
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
AFD000
|
unkown
|
page execute and write copy
|
||
16C4000
|
heap
|
page read and write
|
||
57534F7000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
B25000
|
unkown
|
page execute and write copy
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
36BF000
|
stack
|
page read and write
|
||
850000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
3DEE000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
35BE000
|
stack
|
page read and write
|
||
8C9000
|
unkown
|
page write copy
|
||
1A3B90DA000
|
heap
|
page read and write
|
||
B02000
|
unkown
|
page execute and read and write
|
||
256D2C60000
|
trusted library allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
1016000
|
unkown
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C0000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
10B2000
|
unkown
|
page execute and read and write
|
||
16C5000
|
heap
|
page read and write
|
||
1A3BB198000
|
trusted library allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
57531F9000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
BC4000
|
heap
|
page read and write
|
||
1A3D3161000
|
heap
|
page read and write
|
||
27D0000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
B6A000
|
unkown
|
page execute and write copy
|
||
3A2E000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
256D2C60000
|
trusted library allocation
|
page read and write
|
||
B4B000
|
unkown
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
4D80000
|
direct allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
4341000
|
heap
|
page read and write
|
||
393F000
|
stack
|
page read and write
|
||
4E50000
|
direct allocation
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
54B3000
|
direct allocation
|
page read and write
|
||
5753476000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
49C0000
|
direct allocation
|
page execute and read and write
|
||
4F30000
|
direct allocation
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
256D2BB0000
|
trusted library allocation
|
page read and write
|
||
1600000
|
heap
|
page read and write
|
||
4C8E000
|
stack
|
page read and write
|
||
5630000
|
direct allocation
|
page execute and read and write
|
||
21FF5AE0000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
4930000
|
trusted library allocation
|
page read and write
|
||
55D0000
|
direct allocation
|
page execute and read and write
|
||
FD6000
|
unkown
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
6C4E000
|
stack
|
page read and write
|
||
25EE000
|
stack
|
page read and write
|
||
7FFD9B8C0000
|
trusted library allocation
|
page read and write
|
||
1A3D31E9000
|
heap
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
F70000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
699E000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
343F000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
3190000
|
direct allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
4E50000
|
direct allocation
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
456E000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
747A000
|
heap
|
page read and write
|
||
31BF000
|
stack
|
page read and write
|
||
EAEBF7D000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
AA6000
|
unkown
|
page execute and read and write
|
||
1A3BAC35000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
2CA0000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page read and write
|
||
B77000
|
unkown
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
4F10000
|
direct allocation
|
page execute and read and write
|
||
C44000
|
heap
|
page read and write
|
||
F84000
|
heap
|
page read and write
|
||
38D8FFE000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
1A3D3383000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
45AF000
|
stack
|
page read and write
|
||
AE2000
|
unkown
|
page execute and write copy
|
||
AEA000
|
unkown
|
page execute and read and write
|
||
31EE000
|
stack
|
page read and write
|
||
EAEBC7E000
|
stack
|
page read and write
|
||
4FB1000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
AE2000
|
unkown
|
page execute and write copy
|
||
16C4000
|
heap
|
page read and write
|
||
3BAF000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
FCE000
|
stack
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
4341000
|
heap
|
page read and write
|
||
161D000
|
heap
|
page read and write
|
||
F84000
|
heap
|
page read and write
|
||
1A3BC5FE000
|
trusted library allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
1A3D3114000
|
heap
|
page read and write
|
||
57530FE000
|
stack
|
page read and write
|
||
4B0B000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
C00000
|
direct allocation
|
page read and write
|
||
1A3BC642000
|
trusted library allocation
|
page read and write
|
||
7FFD9B860000
|
trusted library allocation
|
page read and write
|
||
5670000
|
direct allocation
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
15E2000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
4831000
|
heap
|
page read and write
|
||
B6A000
|
unkown
|
page execute and write copy
|
||
7FFD9B666000
|
trusted library allocation
|
page read and write
|
||
32EF000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
1A3D3375000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
B5F000
|
unkown
|
page execute and write copy
|
||
16C4000
|
heap
|
page read and write
|
||
4341000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
14FA000
|
stack
|
page read and write
|
||
41EF000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
47D0000
|
direct allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
F80000
|
direct allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
45EE000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
4FA0000
|
direct allocation
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
6D4F000
|
stack
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
840000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
4341000
|
heap
|
page read and write
|
||
47AF000
|
stack
|
page read and write
|
||
4F00000
|
direct allocation
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
2C3F000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
2BE5000
|
heap
|
page read and write
|
||
1A3D3252000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
A3D000
|
unkown
|
page execute and read and write
|
||
F80000
|
direct allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
1A3BC656000
|
trusted library allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
8D7000
|
unkown
|
page execute and write copy
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
C00000
|
direct allocation
|
page read and write
|
||
3180000
|
heap
|
page read and write
|
||
8C4000
|
unkown
|
page execute and read and write
|
||
2CD0000
|
direct allocation
|
page read and write
|
||
1A3D319D000
|
heap
|
page read and write
|
||
1091000
|
unkown
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
AEA000
|
unkown
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
46EF000
|
stack
|
page read and write
|
||
1A3D31A4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
B6A000
|
unkown
|
page execute and write copy
|
||
7FFD9B696000
|
trusted library allocation
|
page execute and read and write
|
||
4341000
|
heap
|
page read and write
|
||
21FF40AD000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
1A3D31D1000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
B31000
|
unkown
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
3FAE000
|
stack
|
page read and write
|
||
F80000
|
direct allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
A79000
|
unkown
|
page execute and write copy
|
||
A66000
|
unkown
|
page execute and read and write
|
||
A48000
|
unkown
|
page execute and write copy
|
||
3F2E000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
4CC0000
|
direct allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
1A3D3474000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
1A3BC8FB000
|
trusted library allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
33AF000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
10D5000
|
unkown
|
page execute and write copy
|
||
4980000
|
direct allocation
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
423E000
|
stack
|
page read and write
|
||
531E000
|
stack
|
page read and write
|
||
E87000
|
unkown
|
page execute and write copy
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
ADE000
|
unkown
|
page execute and write copy
|
||
16C4000
|
heap
|
page read and write
|
||
EAEBEFE000
|
stack
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
A28000
|
unkown
|
page execute and write copy
|
||
16C4000
|
heap
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
19DE000
|
stack
|
page read and write
|
||
1596000
|
heap
|
page read and write
|
||
256D13F0000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
7FFD9B792000
|
trusted library allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
7FFD9B8E0000
|
trusted library allocation
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
1A3B911D000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
38D93FE000
|
stack
|
page read and write
|
||
482F000
|
stack
|
page read and write
|
||
1A3BC69B000
|
trusted library allocation
|
page read and write
|
||
7FFD9B5B4000
|
trusted library allocation
|
page read and write
|
||
B62000
|
unkown
|
page execute and write copy
|
||
4EC0000
|
direct allocation
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
3190000
|
direct allocation
|
page read and write
|
||
256D11F0000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
6E00000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
AAE000
|
unkown
|
page execute and write copy
|
||
AA6000
|
unkown
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
256D2BB0000
|
trusted library allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
3CEF000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
342F000
|
stack
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
1A3BCC68000
|
trusted library allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
BC4000
|
heap
|
page read and write
|
||
4341000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
F80000
|
direct allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
3D2E000
|
stack
|
page read and write
|
||
49AE000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
2CD0000
|
direct allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
40EE000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
7436000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
ABA000
|
unkown
|
page execute and read and write
|
||
3BEE000
|
stack
|
page read and write
|
||
1A3CB3F8000
|
trusted library allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
46AE000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
BC4000
|
heap
|
page read and write
|
||
5600000
|
direct allocation
|
page execute and read and write
|
||
AFD000
|
unkown
|
page execute and write copy
|
||
40FE000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
1A3BAC00000
|
heap
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
2E3E000
|
stack
|
page read and write
|
||
10FB000
|
unkown
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
1A3BC612000
|
trusted library allocation
|
page read and write
|
||
B79000
|
unkown
|
page execute and write copy
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
B52000
|
unkown
|
page execute and write copy
|
||
6F4000
|
heap
|
page read and write
|
||
AFB000
|
unkown
|
page execute and write copy
|
||
1A3BC7BE000
|
trusted library allocation
|
page read and write
|
||
1A3BC92E000
|
trusted library allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
48F1000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
5790000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
4E90000
|
direct allocation
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
4DCE000
|
stack
|
page read and write
|
||
B62000
|
unkown
|
page execute and write copy
|
||
16C4000
|
heap
|
page read and write
|
||
B4B000
|
unkown
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
256D2BB0000
|
trusted library allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
2BBE000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
55E0000
|
direct allocation
|
page execute and read and write
|
||
3E6E000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
4E80000
|
direct allocation
|
page execute and read and write
|
||
1A3CB3FA000
|
trusted library allocation
|
page read and write
|
||
4A00000
|
direct allocation
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
38EE000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
B77000
|
unkown
|
page execute and write copy
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
3BEE000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
ACB000
|
unkown
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
2637000
|
heap
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
B5F000
|
unkown
|
page execute and write copy
|
||
A8D000
|
unkown
|
page execute and read and write
|
||
108E000
|
unkown
|
page execute and write copy
|
||
16C4000
|
heap
|
page read and write
|
||
3E3F000
|
stack
|
page read and write
|
||
4341000
|
heap
|
page read and write
|
||
1A3CB17A000
|
trusted library allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
4EF0000
|
direct allocation
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
4BAC000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
FF8000
|
unkown
|
page execute and write copy
|
||
2CEE000
|
stack
|
page read and write
|
||
1642000
|
heap
|
page read and write
|
||
AE2000
|
unkown
|
page execute and write copy
|
||
4341000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
F90000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
AB7000
|
unkown
|
page execute and write copy
|
||
C00000
|
direct allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
3E2F000
|
stack
|
page read and write
|
||
3EEF000
|
stack
|
page read and write
|
||
2F2F000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
BC4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
4DCE000
|
stack
|
page read and write
|
||
41EF000
|
stack
|
page read and write
|
||
7FFD9B5BD000
|
trusted library allocation
|
page execute and read and write
|
||
8CB000
|
unkown
|
page execute and write copy
|
||
16C4000
|
heap
|
page read and write
|
||
B5F000
|
unkown
|
page execute and write copy
|
||
8CB000
|
unkown
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
860000
|
unkown
|
page readonly
|
||
A66000
|
unkown
|
page execute and read and write
|
||
48F0000
|
heap
|
page read and write
|
||
FD8000
|
heap
|
page read and write
|
||
4960000
|
direct allocation
|
page execute and read and write
|
||
307F000
|
stack
|
page read and write
|
||
107B000
|
unkown
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
163B000
|
heap
|
page read and write
|
||
396E000
|
stack
|
page read and write
|
||
53D000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
48F1000
|
heap
|
page read and write
|
||
4341000
|
heap
|
page read and write
|
||
4E6F000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
F80000
|
direct allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
452F000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
57B4000
|
heap
|
page read and write
|
||
575307E000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
1A3D3419000
|
heap
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
4341000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
4341000
|
heap
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
A64000
|
unkown
|
page execute and write copy
|
||
6F4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
4350000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
4341000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
4831000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
4990000
|
direct allocation
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
7FFD9B8D0000
|
trusted library allocation
|
page read and write
|
||
8D7000
|
unkown
|
page execute and write copy
|
||
BC4000
|
heap
|
page read and write
|
||
861000
|
unkown
|
page execute and write copy
|
||
16C4000
|
heap
|
page read and write
|
||
8C9000
|
unkown
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
4D80000
|
direct allocation
|
page read and write
|
||
3B2F000
|
stack
|
page read and write
|
||
48F1000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
4F20000
|
direct allocation
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
E10000
|
unkown
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
4440000
|
trusted library allocation
|
page read and write
|
||
3F7F000
|
stack
|
page read and write
|
||
5440000
|
direct allocation
|
page read and write
|
||
32EF000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
47FE000
|
stack
|
page read and write
|
||
B68000
|
unkown
|
page execute and read and write
|
||
AFB000
|
unkown
|
page execute and write copy
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
1624000
|
heap
|
page read and write
|
||
1616000
|
heap
|
page read and write
|
||
2EEF000
|
stack
|
page read and write
|
||
1A3BAAD0000
|
heap
|
page readonly
|
||
1A3BC629000
|
trusted library allocation
|
page read and write
|
||
81D000
|
stack
|
page read and write
|
||
1A3D33DD000
|
heap
|
page read and write
|
||
4C2D000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
3190000
|
direct allocation
|
page read and write
|
||
1032000
|
unkown
|
page execute and write copy
|
||
6C980000
|
unkown
|
page readonly
|
||
4E20000
|
direct allocation
|
page execute and read and write
|
||
326F000
|
stack
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
BCE000
|
stack
|
page read and write
|
||
3AAE000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
382E000
|
stack
|
page read and write
|
||
1A3BCD2D000
|
trusted library allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
10AD000
|
unkown
|
page execute and write copy
|
||
16C4000
|
heap
|
page read and write
|
||
860000
|
unkown
|
page readonly
|
||
16C4000
|
heap
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
4FAF000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
7FFD9B5C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B918000
|
trusted library allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
312F000
|
stack
|
page read and write
|
||
3BBF000
|
stack
|
page read and write
|
||
B02000
|
unkown
|
page execute and read and write
|
||
256D2BB0000
|
trusted library allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
38D8B4E000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
2F6E000
|
stack
|
page read and write
|
||
1A3D34AE000
|
heap
|
page read and write
|
||
1A3BAB80000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
B52000
|
unkown
|
page execute and write copy
|
||
F6E000
|
stack
|
page read and write
|
||
32AE000
|
stack
|
page read and write
|
||
1118000
|
unkown
|
page execute and read and write
|
||
F7E000
|
stack
|
page read and write
|
||
541D000
|
stack
|
page read and write
|
||
486E000
|
stack
|
page read and write
|
||
1A3BC6AF000
|
trusted library allocation
|
page read and write
|
||
1600000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
35AE000
|
stack
|
page read and write
|
||
AE1000
|
unkown
|
page execute and read and write
|
||
1530000
|
heap
|
page read and write
|
||
A7A000
|
unkown
|
page execute and read and write
|
||
496F000
|
stack
|
page read and write
|
||
6F40000
|
heap
|
page read and write
|
||
1A3D3365000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
432F000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
A26000
|
unkown
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
4E50000
|
direct allocation
|
page execute and read and write
|
||
16C5000
|
heap
|
page read and write
|
||
1A3CB131000
|
trusted library allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
E10000
|
unkown
|
page readonly
|
||
C00000
|
direct allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
AEA000
|
unkown
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
1127000
|
unkown
|
page execute and read and write
|
||
16C5000
|
heap
|
page read and write
|
||
1A3B90CE000
|
heap
|
page read and write
|
||
3190000
|
direct allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
1A3BC16B000
|
trusted library allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
432F000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
332C000
|
stack
|
page read and write
|
||
26E0000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
575367F000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
366E000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
B6A000
|
unkown
|
page execute and write copy
|
||
4960000
|
direct allocation
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
4341000
|
heap
|
page read and write
|
||
4EA0000
|
direct allocation
|
page execute and read and write
|
||
7FFD9B750000
|
trusted library allocation
|
page read and write
|
||
F80000
|
direct allocation
|
page read and write
|
||
4341000
|
heap
|
page read and write
|
||
21FF5A40000
|
heap
|
page read and write
|
||
4D80000
|
direct allocation
|
page read and write
|
||
4960000
|
direct allocation
|
page execute and read and write
|
||
4F10000
|
direct allocation
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
256D1060000
|
heap
|
page read and write
|
||
B26000
|
unkown
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
6A05000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
4720000
|
heap
|
page read and write
|
||
55D0000
|
direct allocation
|
page execute and read and write
|
||
1A3B90A2000
|
heap
|
page read and write
|
||
1624000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
1A3BB111000
|
trusted library allocation
|
page read and write
|
||
2CD0000
|
direct allocation
|
page read and write
|
||
860000
|
unkown
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
6A06000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
1A3D3570000
|
trusted library allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
A48000
|
unkown
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
7FFD9B76A000
|
trusted library allocation
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
189E000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
BC4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
A77000
|
unkown
|
page execute and write copy
|
||
16C5000
|
heap
|
page read and write
|
||
1A3BAAA0000
|
trusted library allocation
|
page read and write
|
||
2D90000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
A48000
|
unkown
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
1A3D31F8000
|
heap
|
page read and write
|
||
C00000
|
direct allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
1A3D3427000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
10D6000
|
unkown
|
page execute and read and write
|
||
A3D000
|
unkown
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
B61000
|
unkown
|
page execute and read and write
|
||
ACA000
|
unkown
|
page execute and write copy
|
||
346E000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
4341000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
2A2F000
|
stack
|
page read and write
|
||
106A000
|
unkown
|
page execute and read and write
|
||
E7B000
|
unkown
|
page execute and read and write
|
||
40AF000
|
stack
|
page read and write
|
||
446F000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
2630000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
55D0000
|
direct allocation
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
1102000
|
unkown
|
page execute and write copy
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
3E7E000
|
stack
|
page read and write
|
||
256D3130000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
108D000
|
unkown
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
1A3BAA60000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
555C000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
1520000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
3190000
|
direct allocation
|
page read and write
|
||
B5F000
|
unkown
|
page execute and write copy
|
||
4341000
|
heap
|
page read and write
|
||
4F0D000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
436E000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
4831000
|
heap
|
page read and write
|
||
7FFD9B5B0000
|
trusted library allocation
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
42EE000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
7FFD9B890000
|
trusted library allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
548C000
|
stack
|
page read and write
|
||
46EF000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
B5F000
|
unkown
|
page execute and write copy
|
||
47D0000
|
direct allocation
|
page read and write
|
||
6E10000
|
heap
|
page read and write
|
||
4D2F000
|
stack
|
page read and write
|
||
A82000
|
unkown
|
page execute and write copy
|
||
16C4000
|
heap
|
page read and write
|
||
AA2000
|
unkown
|
page execute and write copy
|
||
1A3BBEF0000
|
trusted library allocation
|
page read and write
|
||
4E40000
|
direct allocation
|
page execute and read and write
|
||
ADE000
|
unkown
|
page execute and write copy
|
||
2DF6000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
256D2C60000
|
trusted library allocation
|
page read and write
|
||
ACA000
|
unkown
|
page execute and write copy
|
||
16C4000
|
heap
|
page read and write
|
||
ADE000
|
unkown
|
page execute and write copy
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
263D000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
F80000
|
direct allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
C00000
|
direct allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
A26000
|
unkown
|
page execute and read and write
|
||
15DB000
|
heap
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
7FFD9B5B2000
|
trusted library allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
422E000
|
stack
|
page read and write
|
||
AFB000
|
unkown
|
page execute and write copy
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
7FFD9B7F0000
|
trusted library allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
A82000
|
unkown
|
page execute and write copy
|
||
5752DEE000
|
stack
|
page read and write
|
||
4341000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
256D12D8000
|
heap
|
page read and write
|
||
4341000
|
heap
|
page read and write
|
||
4CC0000
|
direct allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
47D0000
|
direct allocation
|
page read and write
|
||
3D3E000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
36EE000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
7430000
|
heap
|
page read and write
|
||
1A3D3600000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
111A000
|
unkown
|
page execute and write copy
|
||
256D1263000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
BC4000
|
heap
|
page read and write
|
||
A48000
|
unkown
|
page execute and write copy
|
||
21FF3EF0000
|
heap
|
page read and write
|
||
4F10000
|
direct allocation
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
F84000
|
heap
|
page read and write
|
||
4F80000
|
direct allocation
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
742C000
|
stack
|
page read and write
|
||
357F000
|
stack
|
page read and write
|
||
4EB0000
|
direct allocation
|
page execute and read and write
|
||
21FF4068000
|
heap
|
page read and write
|
||
7FFD9B7C0000
|
trusted library allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
B6A000
|
unkown
|
page execute and write copy
|
||
2CD0000
|
direct allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
15C1000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
446F000
|
stack
|
page read and write
|
||
256D2BB0000
|
trusted library allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
50B0000
|
trusted library allocation
|
page read and write
|
||
2DFF000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
1A3B9430000
|
heap
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page read and write
|
||
1A3D3240000
|
heap
|
page read and write
|
||
1A3BC66C000
|
trusted library allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
A7A000
|
unkown
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
1111000
|
unkown
|
page execute and read and write
|
||
2BC0000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
5752DAE000
|
unkown
|
page read and write
|
||
5640000
|
direct allocation
|
page execute and read and write
|
||
16C5000
|
heap
|
page read and write
|
||
7FFD9B6D0000
|
trusted library allocation
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
4341000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
34EF000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
273F000
|
stack
|
page read and write
|
||
FD8000
|
unkown
|
page execute and write copy
|
||
7FFD9B870000
|
trusted library allocation
|
page read and write
|
||
B77000
|
unkown
|
page execute and write copy
|
||
AFC000
|
unkown
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
57532FE000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
263C000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
49B0000
|
direct allocation
|
page execute and read and write
|
||
B77000
|
unkown
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
8C4000
|
unkown
|
page execute and read and write
|
||
7FFD9B8B0000
|
trusted library allocation
|
page read and write
|
||
861000
|
unkown
|
page execute and write copy
|
||
5660000
|
direct allocation
|
page execute and read and write
|
||
57537FB000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
1A3BAB50000
|
trusted library allocation
|
page read and write
|
||
C00000
|
direct allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
A79000
|
unkown
|
page execute and write copy
|
||
1A3BC97A000
|
trusted library allocation
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
BBE000
|
stack
|
page read and write
|
||
8D7000
|
unkown
|
page execute and write copy
|
||
6F4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
21FF3FD0000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
3E2F000
|
stack
|
page read and write
|
||
B26000
|
unkown
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
39EF000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
6D60000
|
heap
|
page read and write
|
||
3190000
|
direct allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
4341000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
15E3000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page read and write
|
||
8C9000
|
unkown
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
8B4F000
|
stack
|
page read and write
|
||
4F70000
|
direct allocation
|
page execute and read and write
|
||
16C5000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
21FF4077000
|
heap
|
page read and write
|
||
7FFD9B660000
|
trusted library allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
109A000
|
unkown
|
page execute and read and write
|
||
16C5000
|
heap
|
page read and write
|
||
6C994000
|
unkown
|
page readonly
|
||
1A3CB141000
|
trusted library allocation
|
page read and write
|
||
1A3B9260000
|
heap
|
page read and write
|
||
1A3CB111000
|
trusted library allocation
|
page read and write
|
||
4F10000
|
direct allocation
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
1A3BC6DE000
|
trusted library allocation
|
page read and write
|
||
F9E000
|
heap
|
page read and write
|
||
1A3B9090000
|
heap
|
page read and write
|
||
256D12BF000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
4F50000
|
direct allocation
|
page execute and read and write
|
||
575377E000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
4341000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
2A7B000
|
stack
|
page read and write
|
||
EAEBE7D000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
AFD000
|
unkown
|
page execute and write copy
|
||
52CD000
|
stack
|
page read and write
|
||
8CB000
|
unkown
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
B49000
|
unkown
|
page execute and write copy
|
||
110F000
|
unkown
|
page execute and write copy
|
||
1A3BC99C000
|
trusted library allocation
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
1067000
|
unkown
|
page execute and write copy
|
||
1A3BAF80000
|
heap
|
page read and write
|
||
3FBE000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
4341000
|
heap
|
page read and write
|
||
A8D000
|
unkown
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
1A3CB402000
|
trusted library allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
2CC0000
|
heap
|
page read and write
|
||
5440000
|
direct allocation
|
page read and write
|
||
575327E000
|
stack
|
page read and write
|
||
3FAE000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
AA6000
|
unkown
|
page execute and read and write
|
||
7FFD9B8A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
36AF000
|
stack
|
page read and write
|
||
4341000
|
heap
|
page read and write
|
||
35AE000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
8C9000
|
unkown
|
page write copy
|
||
16C4000
|
heap
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
57B0000
|
heap
|
page read and write
|
||
2CE0000
|
heap
|
page read and write
|
||
7DF4363B0000
|
trusted library allocation
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
1A3B90EE000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
E79000
|
unkown
|
page read and write
|
||
392F000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
347E000
|
stack
|
page read and write
|
||
1A3BAAC0000
|
trusted library allocation
|
page read and write
|
||
2CD0000
|
direct allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
422E000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
49A0000
|
direct allocation
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
49D0000
|
direct allocation
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
C00000
|
direct allocation
|
page read and write
|
||
4960000
|
direct allocation
|
page execute and read and write
|
||
4341000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
B49000
|
unkown
|
page execute and write copy
|
||
C75000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
316E000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
7FFD9B5D0000
|
trusted library allocation
|
page read and write
|
||
383E000
|
stack
|
page read and write
|
||
2DDE000
|
heap
|
page read and write
|
||
1A3BC66F000
|
trusted library allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
306F000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
4780000
|
heap
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
3DAF000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
ABA000
|
unkown
|
page execute and read and write
|
||
EAEB906000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
4341000
|
heap
|
page read and write
|
||
4D33000
|
direct allocation
|
page read and write
|
||
111A000
|
unkown
|
page execute and write copy
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
382E000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
2CD0000
|
direct allocation
|
page read and write
|
||
AA2000
|
unkown
|
page execute and write copy
|
||
F0E000
|
stack
|
page read and write
|
||
B62000
|
unkown
|
page execute and write copy
|
||
16C4000
|
heap
|
page read and write
|
||
7FFD9B60C000
|
trusted library allocation
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
47BF000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
4EF0000
|
direct allocation
|
page execute and read and write
|
||
3ABE000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
4831000
|
heap
|
page read and write
|
||
5440000
|
direct allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
21FF4074000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
1658000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
1A3B918B000
|
heap
|
page read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
E79000
|
unkown
|
page write copy
|
||
A82000
|
unkown
|
page execute and write copy
|
||
16C4000
|
heap
|
page read and write
|
||
41EF000
|
stack
|
page read and write
|
||
1A3D3446000
|
heap
|
page read and write
|
||
57536FC000
|
stack
|
page read and write
|
||
6C99B000
|
unkown
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
746D000
|
heap
|
page read and write
|
||
2A3F000
|
stack
|
page read and write
|
||
B79000
|
unkown
|
page execute and write copy
|
||
F80000
|
direct allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
7FFD9B91C000
|
trusted library allocation
|
page read and write
|
||
6D0000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
402E000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
F80000
|
direct allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
BFC000
|
stack
|
page read and write
|
||
A28000
|
unkown
|
page execute and write copy
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
36EE000
|
stack
|
page read and write
|
||
7FFD9B9A3000
|
trusted library allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
4AAF000
|
stack
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
BC4000
|
heap
|
page read and write
|
||
AB7000
|
unkown
|
page execute and write copy
|
||
A48000
|
unkown
|
page execute and write copy
|
||
C00000
|
direct allocation
|
page read and write
|
||
21FF4005000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
507E000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
256D13F5000
|
heap
|
page read and write
|
||
256D2BB0000
|
trusted library allocation
|
page read and write
|
||
861000
|
unkown
|
page execute and write copy
|
||
16C4000
|
heap
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
860000
|
unkown
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
F80000
|
direct allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
346E000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
416F000
|
stack
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
43EF000
|
stack
|
page read and write
|
||
6F0000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
F84000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
4F90000
|
direct allocation
|
page execute and read and write
|
||
1A3BB339000
|
trusted library allocation
|
page read and write
|
||
4341000
|
heap
|
page read and write
|
||
1A3BAC07000
|
heap
|
page execute and read and write
|
||
C10000
|
heap
|
page read and write
|
||
4820000
|
heap
|
page read and write
|
||
F9A000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
103D000
|
unkown
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
6B0F000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
40EE000
|
stack
|
page read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
2E2E000
|
stack
|
page read and write
|
||
B25000
|
unkown
|
page execute and write copy
|
||
16C4000
|
heap
|
page read and write
|
||
1A3D3466000
|
heap
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
1A3D3110000
|
heap
|
page read and write
|
||
BC4000
|
heap
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
F80000
|
direct allocation
|
page read and write
|
||
1A3D349A000
|
heap
|
page read and write
|
||
2CFE000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
2BE0000
|
heap
|
page read and write
|
||
4E30000
|
direct allocation
|
page execute and read and write
|
||
6A00000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
10F9000
|
unkown
|
page execute and write copy
|
||
AAE000
|
unkown
|
page execute and write copy
|
||
F80000
|
direct allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
AB6000
|
unkown
|
page execute and read and write
|
||
B25000
|
unkown
|
page execute and write copy
|
||
EFD000
|
stack
|
page read and write
|
||
C00000
|
direct allocation
|
page read and write
|
||
30BE000
|
stack
|
page read and write
|
||
356F000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
4341000
|
heap
|
page read and write
|
||
A8D000
|
unkown
|
page execute and read and write
|
||
A64000
|
unkown
|
page execute and write copy
|
||
6E01000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
ADD000
|
unkown
|
page execute and read and write
|
||
1A3BB100000
|
heap
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
163A000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
31A0000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
7FFD9B7B0000
|
trusted library allocation
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
EAEBFFB000
|
stack
|
page read and write
|
||
1066000
|
unkown
|
page execute and read and write
|
||
1014000
|
unkown
|
page execute and write copy
|
||
289F000
|
stack
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
283F000
|
stack
|
page read and write
|
||
2DEF000
|
stack
|
page read and write
|
||
2BAB000
|
stack
|
page read and write
|
||
B79000
|
unkown
|
page execute and write copy
|
||
16C4000
|
heap
|
page read and write
|
||
4EE0000
|
direct allocation
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
3190000
|
direct allocation
|
page read and write
|
||
A78000
|
unkown
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
156E000
|
heap
|
page read and write
|
||
1A3B9280000
|
heap
|
page read and write
|
||
AFC000
|
unkown
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
162C000
|
heap
|
page read and write
|
||
F84000
|
heap
|
page read and write
|
||
3BFE000
|
stack
|
page read and write
|
||
21FF4086000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
4341000
|
heap
|
page read and write
|
||
C00000
|
direct allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
4EE0000
|
direct allocation
|
page execute and read and write
|
||
7FFD9B66C000
|
trusted library allocation
|
page execute and read and write
|
||
1A3BC9E5000
|
trusted library allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
36AF000
|
stack
|
page read and write
|
||
1659000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
7DF4363C0000
|
trusted library allocation
|
page execute and read and write
|
||
2CD0000
|
direct allocation
|
page read and write
|
||
118F000
|
stack
|
page read and write
|
||
2CE7000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
B02000
|
unkown
|
page execute and read and write
|
||
6F4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
256D12DF000
|
heap
|
page read and write
|
||
156A000
|
heap
|
page read and write
|
||
69DE000
|
stack
|
page read and write
|
||
4341000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
37AE000
|
stack
|
page read and write
|
||
55C0000
|
direct allocation
|
page execute and read and write
|
||
3F6E000
|
stack
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
2A3B000
|
stack
|
page read and write
|
||
4D6E000
|
stack
|
page read and write
|
||
1112000
|
unkown
|
page execute and write copy
|
||
16C4000
|
heap
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
4340000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
1129000
|
unkown
|
page execute and write copy
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
4341000
|
heap
|
page read and write
|
||
F84000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
3A7F000
|
stack
|
page read and write
|
||
4960000
|
direct allocation
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
1A3CB3F3000
|
trusted library allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
21FF4010000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
3190000
|
direct allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
2CD0000
|
direct allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
E74000
|
unkown
|
page execute and read and write
|
||
15C1000
|
heap
|
page read and write
|
||
491F000
|
stack
|
page read and write
|
||
B52000
|
unkown
|
page execute and write copy
|
||
EAEBDFB000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
B77000
|
unkown
|
page execute and write copy
|
||
4341000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
575317F000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
4341000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
F3E000
|
stack
|
page read and write
|
||
2F3F000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
37EF000
|
stack
|
page read and write
|
||
517F000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
262E000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
ACA000
|
unkown
|
page execute and write copy
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
47EE000
|
stack
|
page read and write
|
||
558F000
|
stack
|
page read and write
|
||
4830000
|
heap
|
page read and write
|
||
32FF000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page read and write
|
||
4F10000
|
direct allocation
|
page execute and read and write
|
||
4341000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
477E000
|
stack
|
page read and write
|
||
1A3BB6E5000
|
trusted library allocation
|
page read and write
|
||
5620000
|
direct allocation
|
page execute and read and write
|
||
16C5000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
ADD000
|
unkown
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
B68000
|
unkown
|
page execute and read and write
|
||
4D2E000
|
stack
|
page read and write
|
||
4AEE000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
2CD0000
|
direct allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
CA2000
|
heap
|
page read and write
|
||
7FFD9B7A0000
|
trusted library allocation
|
page execute and read and write
|
||
1600000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
ACB000
|
unkown
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
4C7E000
|
stack
|
page read and write
|
||
162A000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
1A3D3320000
|
heap
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
EAEBCFE000
|
stack
|
page read and write
|
||
481C000
|
stack
|
page read and write
|
||
4CBF000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
161E000
|
heap
|
page read and write
|
||
B61000
|
unkown
|
page execute and read and write
|
||
500F000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
4E70000
|
direct allocation
|
page execute and read and write
|
||
5650000
|
direct allocation
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
AD8000
|
unkown
|
page execute and write copy
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
B31000
|
unkown
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
10E1000
|
unkown
|
page execute and read and write
|
||
16C5000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
1A3B90D8000
|
heap
|
page read and write
|
||
21FF40B1000
|
heap
|
page read and write
|
||
21FF4060000
|
heap
|
page read and write
|
||
49F0000
|
direct allocation
|
page execute and read and write
|
||
7FFD9B810000
|
trusted library allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
4FB0000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
3190000
|
direct allocation
|
page read and write
|
||
AA2000
|
unkown
|
page execute and write copy
|
||
16C5000
|
heap
|
page read and write
|
||
4341000
|
heap
|
page read and write
|
||
2FEF000
|
stack
|
page read and write
|
||
7FFD9B8E3000
|
trusted library allocation
|
page read and write
|
||
F84000
|
heap
|
page read and write
|
||
E11000
|
unkown
|
page execute and write copy
|
||
3BAE000
|
stack
|
page read and write
|
||
442E000
|
stack
|
page read and write
|
||
7FFD9B880000
|
trusted library allocation
|
page read and write
|
||
1560000
|
heap
|
page read and write
|
||
4ECF000
|
stack
|
page read and write
|
||
1A3BC685000
|
trusted library allocation
|
page read and write
|
||
C00000
|
direct allocation
|
page read and write
|
||
45AF000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
A48000
|
unkown
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
1088000
|
unkown
|
page execute and write copy
|
||
860000
|
unkown
|
page readonly
|
||
2B7F000
|
stack
|
page read and write
|
||
256D1160000
|
heap
|
page read and write
|
||
3190000
|
direct allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page read and write
|
||
4BEF000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
ACB000
|
unkown
|
page execute and read and write
|
||
2CBF000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
3190000
|
direct allocation
|
page read and write
|
||
342F000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
3190000
|
direct allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
7FFD9B840000
|
trusted library allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
A26000
|
unkown
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
392F000
|
stack
|
page read and write
|
||
31FE000
|
stack
|
page read and write
|
||
F80000
|
direct allocation
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
A79000
|
unkown
|
page execute and write copy
|
||
16C5000
|
heap
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
8CB000
|
unkown
|
page execute and read and write
|
||
4970000
|
direct allocation
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
4341000
|
heap
|
page read and write
|
||
5752D23000
|
stack
|
page read and write
|
||
AB6000
|
unkown
|
page execute and read and write
|
||
16C5000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
3190000
|
direct allocation
|
page read and write
|
||
1600000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
38D8EFE000
|
unkown
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
3E6E000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
BC4000
|
heap
|
page read and write
|
||
A28000
|
unkown
|
page execute and write copy
|
||
16C4000
|
heap
|
page read and write
|
||
7492000
|
heap
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
38D8B3D000
|
stack
|
page read and write
|
||
2CD0000
|
direct allocation
|
page read and write
|
||
36FE000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
860000
|
unkown
|
page read and write
|
||
1A3BC6E4000
|
trusted library allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
1A3B9435000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
267C000
|
stack
|
page read and write
|
||
40BF000
|
stack
|
page read and write
|
||
256D12B4000
|
heap
|
page read and write
|
||
33EE000
|
stack
|
page read and write
|
||
A3D000
|
unkown
|
page execute and read and write
|
||
C00000
|
direct allocation
|
page read and write
|
||
38D90FD000
|
stack
|
page read and write
|
||
AFC000
|
unkown
|
page execute and read and write
|
||
333E000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
4D6F000
|
stack
|
page read and write
|
||
41FF000
|
stack
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
15A6000
|
heap
|
page read and write
|
||
2CD0000
|
direct allocation
|
page read and write
|
||
4341000
|
heap
|
page read and write
|
||
4E50000
|
direct allocation
|
page execute and read and write
|
||
6F4000
|
heap
|
page read and write
|
||
256D2C60000
|
trusted library allocation
|
page read and write
|
||
3CEF000
|
stack
|
page read and write
|
||
1A3D3360000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
1A3D348C000
|
heap
|
page read and write
|
||
161E000
|
heap
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
4341000
|
heap
|
page read and write
|
||
2CD0000
|
direct allocation
|
page read and write
|
||
AD8000
|
unkown
|
page execute and write copy
|
||
16C4000
|
heap
|
page read and write
|
||
129F000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
2A6E000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
256D12C9000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
4341000
|
heap
|
page read and write
|
||
4D8F000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
1A3BC658000
|
trusted library allocation
|
page read and write
|
||
31EE000
|
stack
|
page read and write
|
||
B68000
|
unkown
|
page execute and read and write
|
||
4843000
|
direct allocation
|
page read and write
|
||
4940000
|
direct allocation
|
page execute and read and write
|
||
71BE000
|
stack
|
page read and write
|
||
1056000
|
unkown
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
6C99D000
|
unkown
|
page readonly
|
||
16C4000
|
heap
|
page read and write
|
||
2CD0000
|
direct allocation
|
page read and write
|
||
37FF000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
482F000
|
stack
|
page read and write
|
||
A7A000
|
unkown
|
page execute and read and write
|
||
466F000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
15AC000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
7FFD9B900000
|
trusted library allocation
|
page read and write
|
||
15DE000
|
heap
|
page read and write
|
||
3A6F000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
28DE000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
71C000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
15B2000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
4FB1000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
2DEF000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
55B0000
|
direct allocation
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
7FFD9B904000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page execute and read and write
|
||
2910000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
4BED000
|
stack
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
1A3D3350000
|
heap
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
E7B000
|
unkown
|
page execute and write copy
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
436E000
|
stack
|
page read and write
|
||
332E000
|
stack
|
page read and write
|
||
2F7E000
|
stack
|
page read and write
|
||
285E000
|
stack
|
page read and write
|
||
6C0F000
|
stack
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
B26000
|
unkown
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
AB7000
|
unkown
|
page execute and write copy
|
||
4C2E000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
8C9000
|
unkown
|
page write copy
|
||
16C5000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
31A7000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
8CB000
|
unkown
|
page execute and write copy
|
||
16C5000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
AE1000
|
unkown
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
1A3D342C000
|
heap
|
page read and write
|
||
FED000
|
unkown
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
352E000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
4341000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
1A3B9118000
|
heap
|
page read and write
|
||
291A000
|
heap
|
page read and write
|
||
C1A000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
55F0000
|
direct allocation
|
page execute and read and write
|
||
7FFD9B7D0000
|
trusted library allocation
|
page read and write
|
||
AD8000
|
unkown
|
page execute and write copy
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
1092000
|
unkown
|
page execute and write copy
|
||
16C4000
|
heap
|
page read and write
|
||
169E000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
2CBE000
|
stack
|
page read and write
|
||
1624000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
1617000
|
heap
|
page read and write
|
||
F20000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
1A3BC683000
|
trusted library allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
57535FE000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
49E0000
|
direct allocation
|
page execute and read and write
|
||
AB6000
|
unkown
|
page execute and read and write
|
||
5610000
|
direct allocation
|
page execute and read and write
|
||
2D9A000
|
heap
|
page read and write
|
||
162C000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
6E10000
|
heap
|
page read and write
|
||
7FFD9B7E0000
|
trusted library allocation
|
page read and write
|
||
18DE000
|
stack
|
page read and write
|
||
2AE0000
|
heap
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
2CD0000
|
direct allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
472E000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
1A3D341B000
|
heap
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
1A3D34A7000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
4930000
|
direct allocation
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
90F0000
|
trusted library allocation
|
page read and write
|
||
717C000
|
stack
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page read and write
|
||
38D8B44000
|
stack
|
page read and write
|
||
15BF000
|
heap
|
page read and write
|
||
1A3BC699000
|
trusted library allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
BC4000
|
heap
|
page read and write
|
||
41AE000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
7485000
|
heap
|
page read and write
|
||
21FF4086000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
55D0000
|
direct allocation
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
55D0000
|
direct allocation
|
page execute and read and write
|
||
48EF000
|
stack
|
page read and write
|
||
1A3B9116000
|
heap
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
4341000
|
heap
|
page read and write
|
||
FF8000
|
unkown
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
256D313A000
|
heap
|
page read and write
|
||
4341000
|
heap
|
page read and write
|
||
2810000
|
heap
|
page read and write
|
||
1127000
|
unkown
|
page execute and write copy
|
||
16C4000
|
heap
|
page read and write
|
||
3D2E000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
42AF000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
1A3BAC30000
|
heap
|
page read and write
|
||
4341000
|
heap
|
page read and write
|
||
1A3BC640000
|
trusted library allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
4F40000
|
direct allocation
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
362F000
|
stack
|
page read and write
|
||
4EAE000
|
stack
|
page read and write
|
||
256D2D40000
|
heap
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
4FB1000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
55D0000
|
direct allocation
|
page execute and read and write
|
||
30AE000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
1A3D345C000
|
heap
|
page read and write
|
||
1A3BCD31000
|
trusted library allocation
|
page read and write
|
||
55A0000
|
direct allocation
|
page execute and read and write
|
||
7FFD9B5CB000
|
trusted library allocation
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
1600000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
ADD000
|
unkown
|
page execute and read and write
|
||
7DC000
|
stack
|
page read and write
|
||
43C000
|
stack
|
page read and write
|
||
4341000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
3B6E000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
3A6F000
|
stack
|
page read and write
|
||
ABA000
|
unkown
|
page execute and read and write
|
||
16C5000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
2C7E000
|
stack
|
page read and write
|
||
10AB000
|
unkown
|
page execute and write copy
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
8C4000
|
unkown
|
page execute and read and write
|
||
EAEBD7E000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
45EE000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
37EF000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
2B6F000
|
stack
|
page read and write
|
||
3C6F000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
105E000
|
unkown
|
page execute and write copy
|
||
16C4000
|
heap
|
page read and write
|
||
31AF000
|
stack
|
page read and write
|
||
3CFF000
|
stack
|
page read and write
|
||
3F6F000
|
stack
|
page read and write
|
||
4F10000
|
direct allocation
|
page execute and read and write
|
||
7FFD9B830000
|
trusted library allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
1A3BC62C000
|
trusted library allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
1A3D33CD000
|
heap
|
page read and write
|
||
7FFD9B5B3000
|
trusted library allocation
|
page execute and read and write
|
||
3190000
|
direct allocation
|
page read and write
|
||
48F1000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
256D1295000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
F84000
|
heap
|
page read and write
|
||
A64000
|
unkown
|
page execute and write copy
|
||
1A3D3150000
|
heap
|
page read and write
|
||
27C0000
|
heap
|
page read and write
|
||
4ED0000
|
direct allocation
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
B49000
|
unkown
|
page execute and write copy
|
||
302E000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
EAEB98E000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
3AAE000
|
stack
|
page read and write
|
||
4FB1000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
4341000
|
heap
|
page read and write
|
||
545D000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
575337E000
|
stack
|
page read and write
|
||
4D0E000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
102A000
|
unkown
|
page execute and read and write
|
||
4341000
|
heap
|
page read and write
|
||
163F000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
1A3BAB10000
|
trusted library allocation
|
page read and write
|
||
7FFD9B969000
|
trusted library allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
F84000
|
heap
|
page read and write
|
||
406E000
|
stack
|
page read and write
|
||
4FB0000
|
direct allocation
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
707C000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
4341000
|
heap
|
page read and write
|
||
C90000
|
heap
|
page read and write
|
||
51CD000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
4341000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
7FFD9B800000
|
trusted library allocation
|
page read and write
|
||
139F000
|
stack
|
page read and write
|
||
B6A000
|
unkown
|
page execute and write copy
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
F80000
|
direct allocation
|
page read and write
|
||
1052000
|
unkown
|
page execute and write copy
|
||
16C4000
|
heap
|
page read and write
|
||
BC4000
|
heap
|
page read and write
|
||
4341000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
472E000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
4FB1000
|
heap
|
page read and write
|
||
1621000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
8CB000
|
unkown
|
page execute and write copy
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
10AC000
|
unkown
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
396E000
|
stack
|
page read and write
|
||
575424E000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
F84000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
7FFD9B850000
|
trusted library allocation
|
page read and write
|
||
4950000
|
direct allocation
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
397E000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
B5F000
|
unkown
|
page execute and write copy
|
||
B4B000
|
unkown
|
page execute and read and write
|
||
44AE000
|
stack
|
page read and write
|
||
163F000
|
heap
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
4ECF000
|
stack
|
page read and write
|
||
293F000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
1A3D3123000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
4E60000
|
direct allocation
|
page execute and read and write
|
||
C48000
|
heap
|
page read and write
|
||
4E50000
|
direct allocation
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
496C000
|
stack
|
page read and write
|
||
40AF000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
575357A000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
4DF3000
|
direct allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
3CAE000
|
stack
|
page read and write
|
||
57533F9000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
4960000
|
direct allocation
|
page execute and read and write
|
||
16C5000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
AE1000
|
unkown
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
7FFD9B761000
|
trusted library allocation
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
6F48000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
38AF000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
4E50000
|
direct allocation
|
page execute and read and write
|
||
4341000
|
heap
|
page read and write
|
||
F27000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
4341000
|
heap
|
page read and write
|
||
1A3BC740000
|
trusted library allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
7FFD9B909000
|
trusted library allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
C00000
|
direct allocation
|
page read and write
|
||
F84000
|
heap
|
page read and write
|
||
B61000
|
unkown
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
1A3BC786000
|
trusted library allocation
|
page read and write
|
||
1A3B9070000
|
heap
|
page read and write
|
||
256D1140000
|
heap
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
376F000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
4E0F000
|
stack
|
page read and write
|
||
1029000
|
unkown
|
page execute and write copy
|
||
F84000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
107A000
|
unkown
|
page execute and write copy
|
||
16C4000
|
heap
|
page read and write
|
||
4341000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
1A3D344E000
|
heap
|
page read and write
|
||
162C000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
433F000
|
stack
|
page read and write
|
||
1629000
|
heap
|
page read and write
|
||
6E0E000
|
heap
|
page read and write
|
||
8C9000
|
unkown
|
page read and write
|
||
AAE000
|
unkown
|
page execute and write copy
|
||
732C000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
B77000
|
unkown
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
4341000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
4341000
|
heap
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
21FF5AD0000
|
heap
|
page read and write
|
||
A66000
|
unkown
|
page execute and read and write
|
||
16C4000
|
heap
|
page read and write
|
||
4CC0000
|
direct allocation
|
page read and write
|
||
44AE000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
57541CE000
|
stack
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
21FF4086000
|
heap
|
page read and write
|
||
2A7E000
|
stack
|
page read and write
|
||
11BB000
|
stack
|
page read and write
|
||
F84000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
F84000
|
heap
|
page read and write
|
||
4F60000
|
direct allocation
|
page execute and read and write
|
||
1624000
|
heap
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
There are 2239 hidden memdumps, click here to show them.