Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
PLAY.mal_.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
A:\Recovery\WindowsRE\boot.sdi.PLAY (copy)
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_PLAY.mal_.exe_1445cdc43efb964b32befeee25a179accaf97_d3ad2702_0d741ad7\Report.wer
|
Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_PLAY.mal_.exe_1445cdc43efb964b32befeee25a179accaf97_d3ad2702_1fe7fa4f\Report.wer
|
Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Package Cache\{12578975-C765-4BDF-8DDC-3284BC0E855F}v14.21.27702\packages\vcRuntimeAdditional_amd64\cab1.cab
|
data
|
dropped
|
||
C:\ProgramData\Package Cache\{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}v12.0.21005\packages\vcRuntimeMinimum_x86\cab1.cab
|
data
|
dropped
|
||
C:\ProgramData\Package Cache\{19F7E289-17B8-44EC-A099-927507B6F739}v14.21.27702\packages\vcRuntimeMinimum_x86\cab1.cab
|
data
|
dropped
|
||
C:\ProgramData\Package Cache\{213668DB-2263-4E2D-ABB8-487FD539130E}v14.21.27702\packages\vcRuntimeAdditional_x86\cab1.cab
|
data
|
dropped
|
||
C:\ProgramData\Package Cache\{37B8F9C7-03FB-3253-8781-2517C99D7C00}v11.0.61030\packages\vcRuntimeAdditional_amd64\cab1.cab
|
data
|
dropped
|
||
C:\ProgramData\Package Cache\{929FBD26-9020-399B-9A7A-751D61F0B942}v12.0.21005\packages\vcRuntimeAdditional_amd64\cab1.cab
|
data
|
dropped
|
||
C:\ProgramData\Package Cache\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}v12.0.21005\packages\vcRuntimeMinimum_amd64\cab1.cab
|
data
|
dropped
|
||
C:\ProgramData\Package Cache\{B175520C-86A2-35A7-8619-86DC379688B9}v11.0.61030\packages\vcRuntimeAdditional_x86\cab1.cab
|
data
|
dropped
|
||
C:\ProgramData\Package Cache\{BD95A8CD-1D9F-35AD-981A-3E7925026EBB}v11.0.61030\packages\vcRuntimeMinimum_x86\cab1.cab
|
data
|
dropped
|
||
C:\ProgramData\Package Cache\{CF2BEA3C-26EA-32F8-AA9B-331F7E34BA97}v11.0.61030\packages\vcRuntimeMinimum_amd64\cab1.cab
|
data
|
dropped
|
||
C:\ProgramData\Package Cache\{F7CAC7DF-3524-4C2D-A7DB-E16140A3D5E6}v14.21.27702\packages\vcRuntimeMinimum_amd64\cab1.cab
|
data
|
dropped
|
||
C:\ProgramData\Package Cache\{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}v12.0.21005\packages\vcRuntimeAdditional_x86\cab1.cab
|
data
|
dropped
|
||
C:\ProgramData\USOShared\Logs\UpdateSessionOrchestration.007.etl
|
data
|
dropped
|
||
C:\ProgramData\USOShared\Logs\UpdateSessionOrchestration.008.etl
|
data
|
dropped
|
||
C:\ProgramData\USOShared\Logs\UpdateUx_Temp.1.etl
|
data
|
dropped
|
||
C:\Recovery\WindowsRE\Winre.wim
|
data
|
dropped
|
||
C:\Recovery\WindowsRE\boot.sdi
|
data
|
dropped
|
||
A:\Recovery\WindowsRE\ReAgent.xml.PLAY (copy)
|
data
|
dropped
|
||
C:\$Recycle.Bin\S-1-5-18\desktop.ini
|
data
|
dropped
|
||
C:\$Recycle.Bin\S-1-5-18\desktop.ini.PLAY (copy)
|
data
|
dropped
|
||
C:\$Recycle.Bin\S-1-5-21-3853321935-2125563209-4053062332-1000\desktop.ini
|
data
|
dropped
|
||
C:\$Recycle.Bin\S-1-5-21-3853321935-2125563209-4053062332-1000\desktop.ini.PLAY (copy)
|
data
|
dropped
|
||
C:\$Recycle.Bin\S-1-5-21-3853321935-2125563209-4053062332-1001\desktop.ini
|
data
|
dropped
|
||
C:\$Recycle.Bin\S-1-5-21-3853321935-2125563209-4053062332-1001\desktop.ini.PLAY (copy)
|
data
|
dropped
|
||
C:\$Recycle.Bin\S-1-5-21-3853321935-2125563209-4053062332-1002\desktop.ini
|
data
|
dropped
|
||
C:\$Recycle.Bin\S-1-5-21-3853321935-2125563209-4053062332-1002\desktop.ini.PLAY (copy)
|
data
|
dropped
|
||
C:\Documents and Settings\All Users\Adobe\Setup\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\abcpy.ini.PLAY (copy)
|
data
|
dropped
|
||
C:\Documents and Settings\All Users\Adobe\Setup\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\setup.ini.PLAY (copy)
|
data
|
dropped
|
||
C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application
Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application
Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application
Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft
Help\MS.DATABASECOMPARE.16.1033.hxn.PLAY (copy)
|
data
|
dropped
|
||
C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application
Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application
Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application
Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft
Help\MS.EXCEL.16.1033.hxn.PLAY (copy)
|
data
|
dropped
|
||
C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application
Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application
Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application
Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft
Help\MS.GRAPH.16.1033.hxn.PLAY (copy)
|
data
|
dropped
|
||
C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application
Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application
Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application
Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft
Help\MS.GROOVE.16.1033.hxn.PLAY (copy)
|
data
|
dropped
|
||
C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application
Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application
Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application
Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft
Help\MS.LYNC.16.1033.hxn.PLAY (copy)
|
data
|
dropped
|
||
C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application
Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application
Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application
Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft
Help\MS.LYNC_BASIC.16.1033.hxn.PLAY (copy)
|
data
|
dropped
|
||
C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application
Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application
Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application
Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft
Help\MS.LYNC_ONLINE.16.1033.hxn.PLAY (copy)
|
data
|
dropped
|
||
C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application
Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application
Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application
Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft
Help\MS.MSACCESS.16.1033.hxn.PLAY (copy)
|
data
|
dropped
|
||
C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application
Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application
Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application
Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft
Help\MS.MSOUC.16.1033.hxn.PLAY (copy)
|
data
|
dropped
|
||
C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application
Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application
Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application
Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft
Help\MS.MSPUB.16.1033.hxn.PLAY (copy)
|
data
|
dropped
|
||
C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application
Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application
Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application
Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft
Help\MS.ONENOTE.16.1033.hxn.PLAY (copy)
|
data
|
dropped
|
||
C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application
Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application
Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application
Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft
Help\MS.OUTLOOK.16.1033.hxn.PLAY (copy)
|
COM executable for DOS
|
dropped
|
||
C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application
Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application
Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application
Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft
Help\MS.POWERPNT.16.1033.hxn.PLAY (copy)
|
data
|
dropped
|
||
C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application
Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application
Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application
Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft
Help\MS.SETLANG.16.1033.hxn.PLAY (copy)
|
data
|
dropped
|
||
C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application
Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application
Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application
Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft
Help\MS.SKYPEFB.16.1033.hxn.PLAY (copy)
|
data
|
dropped
|
||
C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application
Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application
Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application
Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft
Help\MS.SKYPEFB_BASIC.16.1033.hxn.PLAY (copy)
|
data
|
dropped
|
||
C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application
Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application
Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application
Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft
Help\MS.SKYPEFB_ONLINE.16.1033.hxn.PLAY (copy)
|
data
|
dropped
|
||
C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application
Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application
Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application
Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft
Help\MS.SKYPEFB_ONLINEG.16.1033.hxn.PLAY (copy)
|
data
|
dropped
|
||
C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application
Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application
Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application
Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft
Help\MS.SPREADSHEETCOMPARE.16.1033.hxn.PLAY (copy)
|
data
|
dropped
|
||
C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application
Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application
Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application
Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft
Help\MS.WINWORD.16.1033.hxn.PLAY (copy)
|
data
|
dropped
|
||
C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application
Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application
Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application
Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft
Help\nslist.hxl.PLAY (copy)
|
data
|
dropped
|
||
C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application
Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application
Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application
Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft
OneDrive\setup\refcount.ini.PLAY (copy)
|
data
|
dropped
|
||
C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application
Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application
Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application
Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Package
Cache\{050d4fc8-5d48-4b8f-8972-47c82c46020f}\state.rsm.PLAY (copy)
|
data
|
dropped
|
||
C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application
Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application
Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application
Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Package
Cache\{33d1fd90-4274-48a1-9bc1-97e33d9c2d6f}\state.rsm.PLAY (copy)
|
data
|
dropped
|
||
C:\ProgramData\Adobe\Setup\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\AcroRdrDCUpd1901220034.msp
|
data
|
dropped
|
||
C:\ProgramData\Adobe\Setup\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\Data1.cab
|
data
|
dropped
|
||
C:\ProgramData\Adobe\Setup\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\abcpy.ini
|
data
|
dropped
|
||
C:\ProgramData\Adobe\Setup\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\setup.ini
|
data
|
dropped
|
||
C:\ProgramData\Microsoft Help\MS.DATABASECOMPARE.16.1033.hxn
|
data
|
dropped
|
||
C:\ProgramData\Microsoft Help\MS.EXCEL.16.1033.hxn
|
data
|
dropped
|
||
C:\ProgramData\Microsoft Help\MS.GRAPH.16.1033.hxn
|
data
|
dropped
|
||
C:\ProgramData\Microsoft Help\MS.GROOVE.16.1033.hxn
|
data
|
dropped
|
||
C:\ProgramData\Microsoft Help\MS.LYNC.16.1033.hxn
|
data
|
dropped
|
||
C:\ProgramData\Microsoft Help\MS.LYNC_BASIC.16.1033.hxn
|
data
|
dropped
|
||
C:\ProgramData\Microsoft Help\MS.LYNC_ONLINE.16.1033.hxn
|
data
|
dropped
|
||
C:\ProgramData\Microsoft Help\MS.MSACCESS.16.1033.hxn
|
data
|
dropped
|
||
C:\ProgramData\Microsoft Help\MS.MSOUC.16.1033.hxn
|
data
|
dropped
|
||
C:\ProgramData\Microsoft Help\MS.MSPUB.16.1033.hxn
|
data
|
dropped
|
||
C:\ProgramData\Microsoft Help\MS.ONENOTE.16.1033.hxn
|
data
|
dropped
|
||
C:\ProgramData\Microsoft Help\MS.OUTLOOK.16.1033.hxn
|
COM executable for DOS
|
dropped
|
||
C:\ProgramData\Microsoft Help\MS.POWERPNT.16.1033.hxn
|
data
|
dropped
|
||
C:\ProgramData\Microsoft Help\MS.SETLANG.16.1033.hxn
|
data
|
dropped
|
||
C:\ProgramData\Microsoft Help\MS.SKYPEFB.16.1033.hxn
|
data
|
dropped
|
||
C:\ProgramData\Microsoft Help\MS.SKYPEFB_BASIC.16.1033.hxn
|
data
|
dropped
|
||
C:\ProgramData\Microsoft Help\MS.SKYPEFB_ONLINE.16.1033.hxn
|
data
|
dropped
|
||
C:\ProgramData\Microsoft Help\MS.SKYPEFB_ONLINEG.16.1033.hxn
|
data
|
dropped
|
||
C:\ProgramData\Microsoft Help\MS.SPREADSHEETCOMPARE.16.1033.hxn
|
data
|
dropped
|
||
C:\ProgramData\Microsoft Help\MS.WINWORD.16.1033.hxn
|
data
|
dropped
|
||
C:\ProgramData\Microsoft Help\nslist.hxl
|
data
|
dropped
|
||
C:\ProgramData\Microsoft OneDrive\setup\refcount.ini
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessibility\Desktop.ini
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\desktop.ini
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Java\Get Help.url
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Java\Visit Java.com.url
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Microsoft Office 2016 Tools\desktop.ini
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\desktop.ini
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1115.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1FF.tmp.dmp
|
Mini DuMP crash report, 15 streams, Fri Sep 2 06:09:42 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8ACC.tmp.dmp
|
Mini DuMP crash report, 15 streams, Fri Sep 2 06:09:21 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD5B.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE60C.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERED70.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Oracle\Java\installcache\baseimagefam8
|
data
|
dropped
|
||
C:\ProgramData\Package Cache\{050d4fc8-5d48-4b8f-8972-47c82c46020f}\state.rsm
|
data
|
dropped
|
||
C:\ProgramData\Package Cache\{33d1fd90-4274-48a1-9bc1-97e33d9c2d6f}\state.rsm
|
data
|
dropped
|
||
C:\ProgramData\Package Cache\{49697869-be8e-427d-81a0-c334d1d14950}\state.rsm
|
data
|
dropped
|
||
C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\state.rsm
|
data
|
dropped
|
||
C:\ProgramData\Package Cache\{f4220b74-9edd-4ded-bc8b-0342c1e164d8}\state.rsm
|
data
|
dropped
|
||
C:\ProgramData\Package Cache\{f65db027-aff3-4070-886a-0d87064aabb1}\state.rsm
|
data
|
dropped
|
||
C:\ProgramData\USOPrivate\UpdateStore\updatestore4df22196-a1f2-426c-aa27-062a9f86aba6.xml
|
data
|
dropped
|
||
C:\ProgramData\USOPrivate\UpdateStore\updatestore51b519d5-b6f5-4333-8df6-e74d7c9aead4.xml
|
data
|
dropped
|
||
C:\ProgramData\USOShared\Logs\NotifyIcon.001.etl
|
data
|
dropped
|
||
C:\ProgramData\USOShared\Logs\NotifyIcon.002.etl
|
data
|
dropped
|
||
C:\ProgramData\USOShared\Logs\NotifyIcon.003.etl
|
data
|
dropped
|
||
C:\ProgramData\USOShared\Logs\NotifyIcon.004.etl
|
data
|
dropped
|
||
C:\ProgramData\USOShared\Logs\NotifyIcon.005.etl
|
data
|
dropped
|
||
C:\ProgramData\USOShared\Logs\NotifyIcon_Temp.1.etl
|
data
|
dropped
|
||
C:\ProgramData\USOShared\Logs\UpdateSessionOrchestration.001.etl
|
data
|
dropped
|
||
C:\ProgramData\USOShared\Logs\UpdateSessionOrchestration.002.etl
|
data
|
dropped
|
||
C:\ProgramData\USOShared\Logs\UpdateSessionOrchestration.003.etl
|
data
|
dropped
|
||
C:\ProgramData\USOShared\Logs\UpdateSessionOrchestration.004.etl
|
data
|
dropped
|
||
C:\ProgramData\USOShared\Logs\UpdateSessionOrchestration.005.etl
|
data
|
dropped
|
||
C:\ProgramData\USOShared\Logs\UpdateSessionOrchestration.006.etl
|
data
|
dropped
|
||
C:\ProgramData\USOShared\Logs\UpdateSessionOrchestration.009.etl
|
data
|
dropped
|
||
C:\ProgramData\USOShared\Logs\UpdateSessionOrchestration.010.etl
|
data
|
dropped
|
||
C:\ProgramData\USOShared\Logs\UpdateSessionOrchestration.011.etl
|
data
|
dropped
|
||
C:\ProgramData\USOShared\Logs\UpdateSessionOrchestration.012.etl
|
data
|
dropped
|
||
C:\ProgramData\USOShared\Logs\UpdateSessionOrchestration.013.etl
|
data
|
dropped
|
||
C:\ProgramData\USOShared\Logs\UpdateSessionOrchestration.014.etl
|
data
|
dropped
|
||
C:\ProgramData\USOShared\Logs\UpdateSessionOrchestration.015.etl
|
data
|
dropped
|
||
C:\ProgramData\USOShared\Logs\UpdateSessionOrchestration.016.etl
|
data
|
dropped
|
||
C:\ProgramData\regid.1991-06.com.microsoft\regid.1991-06.com.microsoft Microsoft Office Professional Plus 2016.swidtag
|
data
|
dropped
|
||
C:\ProgramData\regid.1991-06.com.microsoft\regid.1991-06.com.microsoft_Windows-10-Pro.swidtag
|
data
|
dropped
|
||
C:\ReadMe.txt
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Recovery\WindowsRE\ReAgent.xml
|
data
|
dropped
|
||
C:\Users\Public\Desktop\desktop.ini
|
PGP\011Secret Key -
|
dropped
|
||
C:\Users\Public\Documents\desktop.ini
|
data
|
dropped
|
||
C:\Users\Public\Music\desktop.ini
|
data
|
dropped
|
||
C:\Users\Public\Pictures\desktop.ini
|
data
|
dropped
|
||
C:\Users\Public\Videos\desktop.ini
|
data
|
modified
|
||
C:\bootTel.dat
|
data
|
dropped
|
||
C:\bootTel.dat.PLAY (copy)
|
data
|
dropped
|
There are 130 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\PLAY.mal_.exe
|
"C:\Users\user\Desktop\PLAY.mal_.exe"
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 5460 -s 1540
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 5460 -s 1540
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 5460 -s 2796
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://bugreport.sun.com/bugreport/crash.jsp
|
unknown
|
||
http://www.oracle.com/hotspot/jvm/java/monitor/address
|
unknown
|
||
http://crl.thawte.com/ThawteTimestampingCA.crl0
|
unknown
|
||
http://www.oracle.com/hotspot/jvm/vm/compiler/id
|
unknown
|
||
http://www.oracle.com/hotspot/jvm/
|
unknown
|
||
http://www.oracle.com/hotspot/jvm/vm/gc/id
|
unknown
|
||
http://bugreport.sun.com/bugreport/crash.jspVM
|
unknown
|
||
http://ocsp.thawte.com0
|
unknown
|
||
http://www.oracle.com/hotspot/jvm/vm/code_sweeper/id
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
192.168.2.148
|
unknown
|
unknown
|
||
192.168.2.149
|
unknown
|
unknown
|
||
192.168.2.146
|
unknown
|
unknown
|
||
192.168.2.147
|
unknown
|
unknown
|
||
192.168.2.140
|
unknown
|
unknown
|
||
192.168.2.141
|
unknown
|
unknown
|
||
192.168.2.144
|
unknown
|
unknown
|
||
192.168.2.145
|
unknown
|
unknown
|
||
192.168.2.142
|
unknown
|
unknown
|
||
192.168.2.143
|
unknown
|
unknown
|
||
192.168.2.159
|
unknown
|
unknown
|
||
192.168.2.157
|
unknown
|
unknown
|
||
192.168.2.158
|
unknown
|
unknown
|
||
192.168.2.151
|
unknown
|
unknown
|
||
192.168.2.152
|
unknown
|
unknown
|
||
192.168.2.150
|
unknown
|
unknown
|
||
192.168.2.155
|
unknown
|
unknown
|
||
192.168.2.156
|
unknown
|
unknown
|
||
192.168.2.153
|
unknown
|
unknown
|
||
192.168.2.154
|
unknown
|
unknown
|
||
192.168.2.126
|
unknown
|
unknown
|
||
192.168.2.247
|
unknown
|
unknown
|
||
192.168.2.127
|
unknown
|
unknown
|
||
192.168.2.248
|
unknown
|
unknown
|
||
192.168.2.124
|
unknown
|
unknown
|
||
192.168.2.245
|
unknown
|
unknown
|
||
192.168.2.125
|
unknown
|
unknown
|
||
192.168.2.246
|
unknown
|
unknown
|
||
192.168.2.128
|
unknown
|
unknown
|
||
192.168.2.249
|
unknown
|
unknown
|
||
192.168.2.129
|
unknown
|
unknown
|
||
192.168.2.240
|
unknown
|
unknown
|
||
192.168.2.122
|
unknown
|
unknown
|
||
192.168.2.243
|
unknown
|
unknown
|
||
192.168.2.123
|
unknown
|
unknown
|
||
192.168.2.244
|
unknown
|
unknown
|
||
192.168.2.120
|
unknown
|
unknown
|
||
192.168.2.241
|
unknown
|
unknown
|
||
192.168.2.121
|
unknown
|
unknown
|
||
192.168.2.242
|
unknown
|
unknown
|
||
192.168.2.97
|
unknown
|
unknown
|
||
192.168.2.137
|
unknown
|
unknown
|
||
192.168.2.96
|
unknown
|
unknown
|
||
192.168.2.138
|
unknown
|
unknown
|
||
192.168.2.99
|
unknown
|
unknown
|
||
192.168.2.135
|
unknown
|
unknown
|
||
192.168.2.98
|
unknown
|
unknown
|
||
192.168.2.136
|
unknown
|
unknown
|
||
192.168.2.139
|
unknown
|
unknown
|
||
192.168.2.250
|
unknown
|
unknown
|
||
192.168.2.130
|
unknown
|
unknown
|
||
192.168.2.251
|
unknown
|
unknown
|
||
192.168.2.91
|
unknown
|
unknown
|
||
192.168.2.90
|
unknown
|
unknown
|
||
192.168.2.93
|
unknown
|
unknown
|
||
192.168.2.133
|
unknown
|
unknown
|
||
192.168.2.254
|
unknown
|
unknown
|
||
192.168.2.92
|
unknown
|
unknown
|
||
192.168.2.134
|
unknown
|
unknown
|
||
192.168.2.95
|
unknown
|
unknown
|
||
192.168.2.131
|
unknown
|
unknown
|
||
192.168.2.252
|
unknown
|
unknown
|
||
192.168.2.94
|
unknown
|
unknown
|
||
192.168.2.132
|
unknown
|
unknown
|
||
192.168.2.253
|
unknown
|
unknown
|
||
192.168.2.104
|
unknown
|
unknown
|
||
192.168.2.225
|
unknown
|
unknown
|
||
192.168.2.105
|
unknown
|
unknown
|
||
192.168.2.226
|
unknown
|
unknown
|
||
192.168.2.102
|
unknown
|
unknown
|
||
192.168.2.223
|
unknown
|
unknown
|
||
192.168.2.103
|
unknown
|
unknown
|
||
192.168.2.224
|
unknown
|
unknown
|
||
192.168.2.108
|
unknown
|
unknown
|
||
192.168.2.229
|
unknown
|
unknown
|
||
192.168.2.109
|
unknown
|
unknown
|
||
192.168.2.106
|
unknown
|
unknown
|
||
192.168.2.227
|
unknown
|
unknown
|
||
192.168.2.107
|
unknown
|
unknown
|
||
192.168.2.228
|
unknown
|
unknown
|
||
192.168.2.100
|
unknown
|
unknown
|
||
192.168.2.221
|
unknown
|
unknown
|
||
192.168.2.101
|
unknown
|
unknown
|
||
192.168.2.222
|
unknown
|
unknown
|
||
192.168.2.220
|
unknown
|
unknown
|
||
192.168.2.115
|
unknown
|
unknown
|
||
192.168.2.236
|
unknown
|
unknown
|
||
192.168.2.116
|
unknown
|
unknown
|
||
192.168.2.237
|
unknown
|
unknown
|
||
192.168.2.113
|
unknown
|
unknown
|
||
192.168.2.234
|
unknown
|
unknown
|
||
192.168.2.114
|
unknown
|
unknown
|
||
192.168.2.235
|
unknown
|
unknown
|
||
192.168.2.119
|
unknown
|
unknown
|
||
192.168.2.117
|
unknown
|
unknown
|
||
192.168.2.238
|
unknown
|
unknown
|
||
192.168.2.118
|
unknown
|
unknown
|
||
192.168.2.239
|
unknown
|
unknown
|
||
192.168.2.111
|
unknown
|
unknown
|
||
192.168.2.232
|
unknown
|
unknown
|
There are 90 hidden IPs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
|
AmiHivePermissionsCorrect
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
|
AmiHiveOwnerCorrect
|
||
\REGISTRY\A\{1a33ef08-b54a-6ddc-fe2c-ed020b0e2d68}\Root\InventoryApplicationFile\play.mal_.exe|e1fb99c
|
ProgramId
|
||
\REGISTRY\A\{1a33ef08-b54a-6ddc-fe2c-ed020b0e2d68}\Root\InventoryApplicationFile\play.mal_.exe|e1fb99c
|
FileId
|
||
\REGISTRY\A\{1a33ef08-b54a-6ddc-fe2c-ed020b0e2d68}\Root\InventoryApplicationFile\play.mal_.exe|e1fb99c
|
LowerCaseLongPath
|
||
\REGISTRY\A\{1a33ef08-b54a-6ddc-fe2c-ed020b0e2d68}\Root\InventoryApplicationFile\play.mal_.exe|e1fb99c
|
LongPathHash
|
||
\REGISTRY\A\{1a33ef08-b54a-6ddc-fe2c-ed020b0e2d68}\Root\InventoryApplicationFile\play.mal_.exe|e1fb99c
|
Name
|
||
\REGISTRY\A\{1a33ef08-b54a-6ddc-fe2c-ed020b0e2d68}\Root\InventoryApplicationFile\play.mal_.exe|e1fb99c
|
Publisher
|
||
\REGISTRY\A\{1a33ef08-b54a-6ddc-fe2c-ed020b0e2d68}\Root\InventoryApplicationFile\play.mal_.exe|e1fb99c
|
Version
|
||
\REGISTRY\A\{1a33ef08-b54a-6ddc-fe2c-ed020b0e2d68}\Root\InventoryApplicationFile\play.mal_.exe|e1fb99c
|
BinFileVersion
|
||
\REGISTRY\A\{1a33ef08-b54a-6ddc-fe2c-ed020b0e2d68}\Root\InventoryApplicationFile\play.mal_.exe|e1fb99c
|
BinaryType
|
||
\REGISTRY\A\{1a33ef08-b54a-6ddc-fe2c-ed020b0e2d68}\Root\InventoryApplicationFile\play.mal_.exe|e1fb99c
|
ProductName
|
||
\REGISTRY\A\{1a33ef08-b54a-6ddc-fe2c-ed020b0e2d68}\Root\InventoryApplicationFile\play.mal_.exe|e1fb99c
|
ProductVersion
|
||
\REGISTRY\A\{1a33ef08-b54a-6ddc-fe2c-ed020b0e2d68}\Root\InventoryApplicationFile\play.mal_.exe|e1fb99c
|
LinkDate
|
||
\REGISTRY\A\{1a33ef08-b54a-6ddc-fe2c-ed020b0e2d68}\Root\InventoryApplicationFile\play.mal_.exe|e1fb99c
|
BinProductVersion
|
||
\REGISTRY\A\{1a33ef08-b54a-6ddc-fe2c-ed020b0e2d68}\Root\InventoryApplicationFile\play.mal_.exe|e1fb99c
|
Size
|
||
\REGISTRY\A\{1a33ef08-b54a-6ddc-fe2c-ed020b0e2d68}\Root\InventoryApplicationFile\play.mal_.exe|e1fb99c
|
Language
|
||
\REGISTRY\A\{1a33ef08-b54a-6ddc-fe2c-ed020b0e2d68}\Root\InventoryApplicationFile\play.mal_.exe|e1fb99c
|
IsPeFile
|
||
\REGISTRY\A\{1a33ef08-b54a-6ddc-fe2c-ed020b0e2d68}\Root\InventoryApplicationFile\play.mal_.exe|e1fb99c
|
IsOsComponent
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
|
ExceptionRecord
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceTicket
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceId
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
ApplicationFlags
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
|
001840064172BCE4
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
TickCount
|
There are 16 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
BBA0000
|
direct allocation
|
page read and write
|
||
C72E000
|
stack
|
page read and write
|
||
7260000
|
direct allocation
|
page read and write | page no cache
|
||
138FF000
|
stack
|
page read and write
|
||
AD30000
|
direct allocation
|
page read and write
|
||
2D76000
|
direct allocation
|
page read and write
|
||
7B298FF000
|
stack
|
page read and write
|
||
1253E000
|
stack
|
page read and write
|
||
AFD0000
|
direct allocation
|
page read and write
|
||
3E60000
|
direct allocation
|
page read and write | page no cache
|
||
C830000
|
direct allocation
|
page read and write
|
||
B6C7C77000
|
stack
|
page read and write
|
||
107F000
|
heap
|
page read and write
|
||
FE3E000
|
stack
|
page read and write
|
||
778A77E000
|
stack
|
page read and write
|
||
BE1E000
|
stack
|
page read and write
|
||
13C49F90000
|
trusted library allocation
|
page read and write
|
||
ADE0000
|
direct allocation
|
page read and write
|
||
3060000
|
direct allocation
|
page read and write | page no cache
|
||
24017F8E000
|
heap
|
page read and write
|
||
3DB000
|
unkown
|
page read and write
|
||
13C45000000
|
heap
|
page read and write
|
||
AE40000
|
direct allocation
|
page read and write
|
||
1713E000
|
stack
|
page read and write
|
||
12F3E000
|
stack
|
page read and write
|
||
1307E000
|
stack
|
page read and write
|
||
B810000
|
trusted library allocation
|
page read and write
|
||
3DB000
|
unkown
|
page read and write
|
||
B040000
|
direct allocation
|
page read and write
|
||
2EEB1C6C000
|
heap
|
page read and write
|
||
1033E000
|
stack
|
page read and write
|
||
2EEB1C76000
|
heap
|
page read and write
|
||
AE60000
|
direct allocation
|
page read and write
|
||
13C4487A000
|
heap
|
page read and write
|
||
9555CFF000
|
stack
|
page read and write
|
||
1343E000
|
stack
|
page read and write
|
||
21CB3802000
|
trusted library allocation
|
page read and write
|
||
1155000
|
heap
|
page read and write
|
||
F1FE000
|
stack
|
page read and write
|
||
B0CF000
|
direct allocation
|
page read and write
|
||
10ABD000
|
stack
|
page read and write
|
||
1430000
|
direct allocation
|
page read and write | page no cache
|
||
106B000
|
heap
|
page read and write
|
||
B81C000
|
trusted library allocation
|
page read and write
|
||
22C4EFE000
|
stack
|
page read and write
|
||
4660000
|
direct allocation
|
page read and write | page no cache
|
||
1079000
|
heap
|
page read and write
|
||
101FE000
|
stack
|
page read and write
|
||
3560000
|
direct allocation
|
page read and write | page no cache
|
||
10B0000
|
trusted library allocation
|
page read and write
|
||
BCDE000
|
stack
|
page read and write
|
||
D4FE000
|
stack
|
page read and write
|
||
12F3E000
|
stack
|
page read and write
|
||
105F000
|
heap
|
page read and write
|
||
1091000
|
heap
|
page read and write
|
||
19F3705F000
|
heap
|
page read and write
|
||
1097000
|
heap
|
page read and write
|
||
13C4A0F5000
|
heap
|
page read and write
|
||
FD7000
|
heap
|
page read and write
|
||
1073000
|
heap
|
page read and write
|
||
108FF000
|
stack
|
page read and write
|
||
ADB0000
|
direct allocation
|
page read and write
|
||
C45E000
|
stack
|
page read and write
|
||
14CFF000
|
stack
|
page read and write
|
||
EE7E000
|
stack
|
page read and write
|
||
B82A000
|
trusted library allocation
|
page read and write
|
||
AEF0000
|
direct allocation
|
page read and write
|
||
AE50000
|
direct allocation
|
page read and write
|
||
1057E000
|
stack
|
page read and write
|
||
B11F000
|
direct allocation
|
page read and write
|
||
2D9D000
|
direct allocation
|
page read and write
|
||
FF7E000
|
stack
|
page read and write
|
||
B824000
|
trusted library allocation
|
page read and write
|
||
106FE000
|
stack
|
page read and write
|
||
FBFE000
|
stack
|
page read and write
|
||
4B60000
|
direct allocation
|
page read and write | page no cache
|
||
BBA0000
|
direct allocation
|
page read and write
|
||
AEA0000
|
direct allocation
|
page read and write
|
||
C840000
|
direct allocation
|
page read and write
|
||
ACC0000
|
direct allocation
|
page read and write
|
||
15ABE000
|
stack
|
page read and write
|
||
3F60000
|
direct allocation
|
page read and write | page no cache
|
||
AF70000
|
direct allocation
|
page read and write
|
||
1016000
|
heap
|
page read and write
|
||
24018A02000
|
heap
|
page read and write
|
||
1077000
|
heap
|
page read and write
|
||
10A7D000
|
stack
|
page read and write
|
||
1150000
|
heap
|
page read and write
|
||
1433E000
|
stack
|
page read and write
|
||
5560000
|
direct allocation
|
page read and write | page no cache
|
||
2A925300000
|
heap
|
page read and write
|
||
109FF000
|
stack
|
page read and write
|
||
B6E0000
|
trusted library allocation
|
page read and write
|
||
2EEB1C58000
|
heap
|
page read and write
|
||
AF50000
|
direct allocation
|
page read and write
|
||
EF7F000
|
stack
|
page read and write
|
||
AFA0000
|
direct allocation
|
page read and write
|
||
1065000
|
heap
|
page read and write
|
||
1133F000
|
stack
|
page read and write
|
||
B85A000
|
trusted library allocation
|
page read and write
|
||
5960000
|
direct allocation
|
page read and write | page no cache
|
||
16DBE000
|
stack
|
page read and write
|
||
1430000
|
direct allocation
|
page read and write | page no cache
|
||
177BE000
|
stack
|
page read and write
|
||
11CFE000
|
stack
|
page read and write
|
||
129FF000
|
stack
|
page read and write
|
||
1460000
|
heap
|
page read and write
|
||
11BFE000
|
stack
|
page read and write
|
||
AD20000
|
direct allocation
|
page read and write
|
||
13C44872000
|
heap
|
page read and write
|
||
B6C78FE000
|
stack
|
page read and write
|
||
147FF000
|
stack
|
page read and write
|
||
14BFE000
|
stack
|
page read and write
|
||
3F60000
|
direct allocation
|
page read and write | page no cache
|
||
106B000
|
heap
|
page read and write
|
||
DB7E000
|
stack
|
page read and write
|
||
137FE000
|
stack
|
page read and write
|
||
1069000
|
heap
|
page read and write
|
||
24018900000
|
heap
|
page read and write
|
||
778A37D000
|
stack
|
page read and write
|
||
B840000
|
trusted library allocation
|
page read and write
|
||
13C45920000
|
trusted library section
|
page readonly
|
||
142F000
|
stack
|
page read and write
|
||
10AE000
|
heap
|
page read and write
|
||
FBA000
|
heap
|
page read and write
|
||
95560FF000
|
stack
|
page read and write
|
||
12B7E000
|
stack
|
page read and write
|
||
AE20000
|
direct allocation
|
page read and write
|
||
C31E000
|
stack
|
page read and write
|
||
7B297F7000
|
stack
|
page read and write
|
||
13C4488E000
|
heap
|
page read and write
|
||
1703E000
|
stack
|
page read and write
|
||
FEA000
|
heap
|
page read and write
|
||
1042000
|
heap
|
page read and write
|
||
4360000
|
direct allocation
|
page read and write | page no cache
|
||
107F000
|
heap
|
page read and write
|
||
108B000
|
heap
|
page read and write
|
||
FE9000
|
heap
|
page read and write
|
||
2A92528C000
|
heap
|
page read and write
|
||
24017E51000
|
heap
|
page read and write
|
||
105A000
|
heap
|
page read and write
|
||
14FBE000
|
stack
|
page read and write
|
||
B812000
|
trusted library allocation
|
page read and write
|
||
109FF000
|
stack
|
page read and write
|
||
EBBE000
|
stack
|
page read and write
|
||
1483E000
|
stack
|
page read and write
|
||
21CB3046000
|
heap
|
page read and write
|
||
4460000
|
direct allocation
|
page read and write | page no cache
|
||
1443F000
|
stack
|
page read and write
|
||
B15F000
|
direct allocation
|
page read and write
|
||
2CC1000
|
direct allocation
|
page read and write
|
||
3260000
|
direct allocation
|
page read and write | page no cache
|
||
1467000
|
heap
|
page read and write
|
||
AE40000
|
direct allocation
|
page read and write
|
||
107F000
|
heap
|
page read and write
|
||
141BF000
|
stack
|
page read and write
|
||
B84C000
|
trusted library allocation
|
page read and write
|
||
13C44FF0000
|
trusted library allocation
|
page read and write
|
||
156FE000
|
stack
|
page read and write
|
||
DCBE000
|
stack
|
page read and write
|
||
E5D000
|
stack
|
page read and write
|
||
2D7F000
|
direct allocation
|
page read and write
|
||
B858000
|
trusted library allocation
|
page read and write
|
||
109D000
|
heap
|
page read and write
|
||
F1FE000
|
stack
|
page read and write
|
||
1069000
|
heap
|
page read and write
|
||
1042000
|
heap
|
page read and write
|
||
BB5E000
|
stack
|
page read and write
|
||
1073000
|
heap
|
page read and write
|
||
5860000
|
direct allocation
|
page read and write | page no cache
|
||
2C10000
|
direct allocation
|
page read and write
|
||
ACD0000
|
direct allocation
|
page read and write
|
||
24018943000
|
heap
|
page read and write
|
||
B843000
|
trusted library allocation
|
page read and write
|
||
BBC0000
|
direct allocation
|
page read and write
|
||
3B1000
|
unkown
|
page execute read
|
||
1187E000
|
stack
|
page read and write
|
||
1143E000
|
stack
|
page read and write
|
||
2C60000
|
direct allocation
|
page read and write
|
||
13C4A04A000
|
heap
|
page read and write
|
||
5B60000
|
direct allocation
|
page read and write | page no cache
|
||
13C44878000
|
heap
|
page read and write
|
||
155FE000
|
stack
|
page read and write
|
||
C11E000
|
stack
|
page read and write
|
||
B85C000
|
trusted library allocation
|
page read and write
|
||
1091000
|
heap
|
page read and write
|
||
F2FE000
|
stack
|
page read and write
|
||
1047000
|
heap
|
page read and write
|
||
1014000
|
heap
|
page read and write
|
||
FF5000
|
heap
|
page read and write
|
||
13C4A01D000
|
heap
|
page read and write
|
||
1044000
|
heap
|
page read and write
|
||
1753E000
|
stack
|
page read and write
|
||
FF9000
|
heap
|
page read and write
|
||
5B60000
|
direct allocation
|
page read and write | page no cache
|
||
178BE000
|
stack
|
page read and write
|
||
ADB0000
|
direct allocation
|
page read and write
|
||
101A000
|
heap
|
page read and write
|
||
C9EE000
|
stack
|
page read and write
|
||
21A89230000
|
trusted library allocation
|
page read and write
|
||
13C49FC0000
|
remote allocation
|
page read and write
|
||
1150000
|
heap
|
page read and write
|
||
B836000
|
trusted library allocation
|
page read and write
|
||
3B0000
|
unkown
|
page readonly
|
||
2CAB000
|
direct allocation
|
page read and write
|
||
1003000
|
heap
|
page read and write
|
||
ACB0000
|
direct allocation
|
page read and write
|
||
DC7E000
|
stack
|
page read and write
|
||
27C4E1B0000
|
remote allocation
|
page read and write
|
||
120FF000
|
stack
|
page read and write
|
||
2D7C000
|
direct allocation
|
page read and write
|
||
1460000
|
heap
|
page read and write
|
||
13C44660000
|
heap
|
page read and write
|
||
B14F000
|
direct allocation
|
page read and write
|
||
10A1000
|
heap
|
page read and write
|
||
239D3864000
|
heap
|
page read and write
|
||
22C537E000
|
stack
|
page read and write
|
||
2EEB1C00000
|
heap
|
page read and write
|
||
B0CF000
|
direct allocation
|
page read and write
|
||
12EFF000
|
stack
|
page read and write
|
||
2EEB1C61000
|
heap
|
page read and write
|
||
1057E000
|
stack
|
page read and write
|
||
7B2916B000
|
stack
|
page read and write
|
||
106F000
|
heap
|
page read and write
|
||
128BF000
|
stack
|
page read and write
|
||
13C45930000
|
trusted library section
|
page readonly
|
||
AE90000
|
direct allocation
|
page read and write
|
||
AD70000
|
direct allocation
|
page read and write
|
||
2C60000
|
direct allocation
|
page read and write
|
||
3DE000
|
unkown
|
page readonly
|
||
4D60000
|
direct allocation
|
page read and write | page no cache
|
||
2C60000
|
direct allocation
|
page read and write | page no cache
|
||
10CFE000
|
stack
|
page read and write
|
||
E5D000
|
stack
|
page read and write
|
||
11A7E000
|
stack
|
page read and write
|
||
109B000
|
heap
|
page read and write
|
||
1010000
|
heap
|
page read and write
|
||
2A92526F000
|
heap
|
page read and write
|
||
12A3E000
|
stack
|
page read and write
|
||
BE5E000
|
stack
|
page read and write
|
||
10AB000
|
heap
|
page read and write
|
||
239D387E000
|
heap
|
page read and write
|
||
1091000
|
heap
|
page read and write
|
||
E07E000
|
stack
|
page read and write
|
||
13C4A102000
|
heap
|
page read and write
|
||
B83C000
|
trusted library allocation
|
page read and write
|
||
AD90000
|
direct allocation
|
page read and write
|
||
13C45960000
|
trusted library section
|
page readonly
|
||
2EEB1C29000
|
heap
|
page read and write
|
||
13C45CC0000
|
trusted library allocation
|
page read and write
|
||
C880000
|
direct allocation
|
page read and write
|
||
B84E000
|
trusted library allocation
|
page read and write
|
||
ECFE000
|
stack
|
page read and write
|
||
D6E4A7F000
|
stack
|
page read and write
|
||
12CBE000
|
stack
|
page read and write
|
||
5A60000
|
direct allocation
|
page read and write | page no cache
|
||
6A60000
|
direct allocation
|
page read and write | page no cache
|
||
D03E000
|
stack
|
page read and write
|
||
1267E000
|
stack
|
page read and write
|
||
7B2947E000
|
stack
|
page read and write
|
||
1079000
|
heap
|
page read and write
|
||
1150000
|
heap
|
page read and write
|
||
AFF0000
|
direct allocation
|
page read and write
|
||
100BE000
|
stack
|
page read and write
|
||
21CB3031000
|
heap
|
page read and write
|
||
B85A000
|
trusted library allocation
|
page read and write
|
||
1583E000
|
stack
|
page read and write
|
||
BBD0000
|
direct allocation
|
page read and write
|
||
1097000
|
heap
|
page read and write
|
||
AFA0000
|
direct allocation
|
page read and write
|
||
B838000
|
trusted library allocation
|
page read and write
|
||
6260000
|
direct allocation
|
page read and write | page no cache
|
||
D1BE000
|
stack
|
page read and write
|
||
136BE000
|
stack
|
page read and write
|
||
1155000
|
heap
|
page read and write
|
||
778A6F9000
|
stack
|
page read and write
|
||
E2FE000
|
stack
|
page read and write
|
||
22C4A7A000
|
stack
|
page read and write
|
||
6060000
|
direct allocation
|
page read and write | page no cache
|
||
15ABE000
|
stack
|
page read and write
|
||
D13E000
|
stack
|
page read and write
|
||
3960000
|
direct allocation
|
page read and write | page no cache
|
||
14D3E000
|
stack
|
page read and write
|
||
B040000
|
direct allocation
|
page read and write
|
||
4E60000
|
direct allocation
|
page read and write | page no cache
|
||
B59E000
|
stack
|
page read and write
|
||
13C45015000
|
heap
|
page read and write
|
||
132BF000
|
stack
|
page read and write
|
||
159BE000
|
stack
|
page read and write
|
||
B91E000
|
stack
|
page read and write
|
||
ACD0000
|
direct allocation
|
page read and write
|
||
2A92524F000
|
heap
|
page read and write
|
||
B18F000
|
direct allocation
|
page read and write
|
||
338A000
|
direct allocation
|
page read and write
|
||
AD50000
|
direct allocation
|
page read and write
|
||
AF00000
|
direct allocation
|
page read and write
|
||
B847000
|
trusted library allocation
|
page read and write
|
||
106BE000
|
stack
|
page read and write
|
||
140BE000
|
stack
|
page read and write
|
||
B810000
|
trusted library allocation
|
page read and write
|
||
FA7E000
|
stack
|
page read and write
|
||
3B1000
|
unkown
|
page execute read
|
||
D6E467C000
|
stack
|
page read and write
|
||
6F60000
|
direct allocation
|
page read and write | page no cache
|
||
3260000
|
direct allocation
|
page read and write | page no cache
|
||
1430000
|
direct allocation
|
page read and write | page no cache
|
||
1046000
|
heap
|
page read and write
|
||
F6FE000
|
stack
|
page read and write
|
||
1016000
|
heap
|
page read and write
|
||
1573E000
|
stack
|
page read and write
|
||
132F000
|
stack
|
page read and write
|
||
1077000
|
heap
|
page read and write
|
||
2C60000
|
direct allocation
|
page read and write
|
||
14E3F000
|
stack
|
page read and write
|
||
5C60000
|
direct allocation
|
page read and write | page no cache
|
||
1440000
|
direct allocation
|
page read and write
|
||
21A89702000
|
heap
|
page read and write
|
||
1079000
|
heap
|
page read and write
|
||
1007000
|
heap
|
page read and write
|
||
B13F000
|
direct allocation
|
page read and write
|
||
1443F000
|
stack
|
page read and write
|
||
FD4000
|
heap
|
page read and write
|
||
13C45102000
|
heap
|
page read and write
|
||
778AA79000
|
stack
|
page read and write
|
||
2A92523C000
|
heap
|
page read and write
|
||
B090000
|
direct allocation
|
page read and write
|
||
BF0000
|
unkown
|
page read and write
|
||
3DB000
|
unkown
|
page read and write
|
||
AEA0000
|
direct allocation
|
page read and write
|
||
136BE000
|
stack
|
page read and write
|
||
21A89502000
|
trusted library allocation
|
page read and write
|
||
AF30000
|
direct allocation
|
page read and write
|
||
AE10000
|
direct allocation
|
page read and write
|
||
12B3F000
|
stack
|
page read and write
|
||
1460000
|
heap
|
page read and write
|
||
D03E000
|
stack
|
page read and write
|
||
AE50000
|
direct allocation
|
page read and write
|
||
BBB0000
|
direct allocation
|
page read and write
|
||
6060000
|
direct allocation
|
page read and write | page no cache
|
||
D23E000
|
stack
|
page read and write
|
||
FF9000
|
heap
|
page read and write
|
||
10B0000
|
trusted library allocation
|
page read and write
|
||
15E7E000
|
stack
|
page read and write
|
||
13C49F70000
|
trusted library allocation
|
page read and write
|
||
2C10000
|
direct allocation
|
page read and write
|
||
111FE000
|
stack
|
page read and write
|
||
C7AE000
|
stack
|
page read and write
|
||
1047000
|
heap
|
page read and write
|
||
5260000
|
direct allocation
|
page read and write | page no cache
|
||
3DB000
|
unkown
|
page read and write
|
||
13C49CC0000
|
trusted library allocation
|
page read and write
|
||
3760000
|
direct allocation
|
page read and write | page no cache
|
||
DFBF000
|
stack
|
page read and write
|
||
2EEB1B00000
|
heap
|
page read and write
|
||
CEF0000
|
trusted library allocation
|
page read and write
|
||
2EEB1C64000
|
heap
|
page read and write
|
||
3B0000
|
unkown
|
page readonly
|
||
114BE000
|
stack
|
page read and write
|
||
2401896D000
|
heap
|
page read and write
|
||
13C45100000
|
heap
|
page read and write
|
||
FBA000
|
heap
|
page read and write
|
||
13C448AE000
|
heap
|
page read and write
|
||
114FD000
|
stack
|
page read and write
|
||
1078000
|
heap
|
page read and write
|
||
2EEB1D02000
|
heap
|
page read and write
|
||
151FF000
|
stack
|
page read and write
|
||
4D60000
|
direct allocation
|
page read and write | page no cache
|
||
10AE000
|
heap
|
page read and write
|
||
2EEB1C3D000
|
heap
|
page read and write
|
||
E53E000
|
stack
|
page read and write
|
||
3260000
|
direct allocation
|
page read and write | page no cache
|
||
239D3829000
|
heap
|
page read and write
|
||
138FF000
|
stack
|
page read and write
|
||
AC70000
|
direct allocation
|
page read and write
|
||
124FF000
|
stack
|
page read and write
|
||
2EEB1C67000
|
heap
|
page read and write
|
||
B10F000
|
direct allocation
|
page read and write
|
||
1307E000
|
stack
|
page read and write
|
||
22C467B000
|
stack
|
page read and write
|
||
146FE000
|
stack
|
page read and write
|
||
22C4E7F000
|
stack
|
page read and write
|
||
147FF000
|
stack
|
page read and write
|
||
FBA000
|
heap
|
page read and write
|
||
AFD0000
|
direct allocation
|
page read and write
|
||
E43E000
|
stack
|
page read and write
|
||
24018902000
|
heap
|
page read and write
|
||
1042000
|
heap
|
page read and write
|
||
D2FE000
|
stack
|
page read and write
|
||
C8A0000
|
direct allocation
|
page read and write
|
||
2C60000
|
direct allocation
|
page read and write
|
||
24017E00000
|
heap
|
page read and write
|
||
15D3E000
|
stack
|
page read and write
|
||
2A925A02000
|
trusted library allocation
|
page read and write
|
||
D1BE000
|
stack
|
page read and write
|
||
10AD000
|
heap
|
page read and write
|
||
2C10000
|
direct allocation
|
page read and write
|
||
C215000
|
stack
|
page read and write
|
||
132F000
|
stack
|
page read and write
|
||
105BE000
|
stack
|
page read and write
|
||
10F7E000
|
stack
|
page read and write
|
||
B17F000
|
direct allocation
|
page read and write
|
||
AF20000
|
direct allocation
|
page read and write
|
||
B84C000
|
trusted library allocation
|
page read and write
|
||
16DBE000
|
stack
|
page read and write
|
||
2C98000
|
direct allocation
|
page read and write
|
||
118FE000
|
stack
|
page read and write
|
||
13C49E80000
|
trusted library allocation
|
page read and write
|
||
D2FE000
|
stack
|
page read and write
|
||
2EEB1C79000
|
heap
|
page read and write
|
||
AE00000
|
direct allocation
|
page read and write
|
||
24017E13000
|
heap
|
page read and write
|
||
108B000
|
heap
|
page read and write
|
||
179FE000
|
stack
|
page read and write
|
||
1002000
|
heap
|
page read and write
|
||
108B000
|
heap
|
page read and write
|
||
318B000
|
direct allocation
|
page read and write
|
||
B836000
|
trusted library allocation
|
page read and write
|
||
10F7E000
|
stack
|
page read and write
|
||
142F000
|
stack
|
page read and write
|
||
24017E57000
|
heap
|
page read and write
|
||
E7BE000
|
stack
|
page read and write
|
||
2A925313000
|
heap
|
page read and write
|
||
109D000
|
heap
|
page read and write
|
||
AEE0000
|
direct allocation
|
page read and write
|
||
B59E000
|
stack
|
page read and write
|
||
ADA0000
|
direct allocation
|
page read and write
|
||
AE60000
|
direct allocation
|
page read and write
|
||
3DE000
|
unkown
|
page readonly
|
||
2C10000
|
direct allocation
|
page read and write
|
||
B856000
|
trusted library allocation
|
page read and write
|
||
B82E000
|
trusted library allocation
|
page read and write
|
||
11EFE000
|
stack
|
page read and write
|
||
E63F000
|
stack
|
page read and write
|
||
AD40000
|
direct allocation
|
page read and write
|
||
12DFE000
|
stack
|
page read and write
|
||
AE20000
|
direct allocation
|
page read and write
|
||
2CCE000
|
direct allocation
|
page read and write
|
||
10A9000
|
heap
|
page read and write
|
||
11BFE000
|
stack
|
page read and write
|
||
107F000
|
heap
|
page read and write
|
||
2EEB1C7D000
|
heap
|
page read and write
|
||
114FD000
|
stack
|
page read and write
|
||
2C10000
|
heap
|
page read and write
|
||
1007000
|
heap
|
page read and write
|
||
14F7F000
|
stack
|
page read and write
|
||
19F37002000
|
heap
|
page read and write
|
||
BBB0000
|
direct allocation
|
page read and write
|
||
FA70000
|
direct allocation
|
page read and write
|
||
13C448A6000
|
heap
|
page read and write
|
||
C5E0000
|
direct allocation
|
page read and write
|
||
21CB2ED0000
|
heap
|
page read and write
|
||
DEBF000
|
stack
|
page read and write
|
||
AEE0000
|
direct allocation
|
page read and write
|
||
2C60000
|
direct allocation
|
page read and write
|
||
14BFE000
|
stack
|
page read and write
|
||
1002000
|
heap
|
page read and write
|
||
107FF000
|
stack
|
page read and write
|
||
11CFE000
|
stack
|
page read and write
|
||
7B291EE000
|
stack
|
page read and write
|
||
1407F000
|
stack
|
page read and write
|
||
BFDE000
|
stack
|
page read and write
|
||
B85E000
|
trusted library allocation
|
page read and write
|
||
1183E000
|
stack
|
page read and write
|
||
AD50000
|
direct allocation
|
page read and write
|
||
2C60000
|
direct allocation
|
page read and write
|
||
1537E000
|
stack
|
page read and write
|
||
107F000
|
heap
|
page read and write
|
||
3B1000
|
unkown
|
page execute read
|
||
B7E0000
|
trusted library allocation
|
page read and write
|
||
C6E7DFF000
|
stack
|
page read and write
|
||
122FF000
|
stack
|
page read and write
|
||
AF30000
|
direct allocation
|
page read and write
|
||
5D60000
|
direct allocation
|
page read and write | page no cache
|
||
B5DE000
|
stack
|
page read and write
|
||
2A925302000
|
heap
|
page read and write
|
||
3D4000
|
unkown
|
page readonly
|
||
105BE000
|
stack
|
page read and write
|
||
FB0000
|
heap
|
page read and write
|
||
1026000
|
heap
|
page read and write
|
||
101BE000
|
stack
|
page read and write
|
||
AED0000
|
direct allocation
|
page read and write
|
||
2A925202000
|
heap
|
page read and write
|
||
EA3E000
|
stack
|
page read and write
|
||
11FFF000
|
stack
|
page read and write
|
||
2CD7000
|
direct allocation
|
page read and write
|
||
ACA0000
|
direct allocation
|
page read and write
|
||
178FE000
|
stack
|
page read and write
|
||
3D4000
|
unkown
|
page readonly
|
||
ADC0000
|
direct allocation
|
page read and write
|
||
19F37029000
|
heap
|
page read and write
|
||
6360000
|
direct allocation
|
page read and write | page no cache
|
||
ECBE000
|
stack
|
page read and write
|
||
10AE000
|
heap
|
page read and write
|
||
141BF000
|
stack
|
page read and write
|
||
AE90000
|
direct allocation
|
page read and write
|
||
14BBF000
|
stack
|
page read and write
|
||
B804000
|
trusted library allocation
|
page read and write
|
||
123FF000
|
stack
|
page read and write
|
||
2F60000
|
direct allocation
|
page read and write | page no cache
|
||
AF40000
|
direct allocation
|
page read and write
|
||
16D7E000
|
stack
|
page read and write
|
||
B17F000
|
direct allocation
|
page read and write
|
||
2C94000
|
direct allocation
|
page read and write
|
||
B6C7E7E000
|
stack
|
page read and write
|
||
1067000
|
heap
|
page read and write
|
||
B847000
|
trusted library allocation
|
page read and write
|
||
BBB0000
|
remote allocation
|
page read and write
|
||
21A89400000
|
unkown
|
page read and write
|
||
DDBE000
|
stack
|
page read and write
|
||
3D60000
|
direct allocation
|
page read and write | page no cache
|
||
150FE000
|
stack
|
page read and write
|
||
1073000
|
heap
|
page read and write
|
||
1263F000
|
stack
|
page read and write
|
||
13A7E000
|
stack
|
page read and write
|
||
B840000
|
trusted library allocation
|
page read and write
|
||
B1AF000
|
direct allocation
|
page read and write
|
||
5660000
|
direct allocation
|
page read and write | page no cache
|
||
B800000
|
trusted library allocation
|
page read and write
|
||
13C45840000
|
trusted library allocation
|
page read and write
|
||
2C60000
|
direct allocation
|
page read and write
|
||
CEF0000
|
trusted library allocation
|
page read and write
|
||
2EEB1C57000
|
heap
|
page read and write
|
||
239D387C000
|
heap
|
page read and write
|
||
1042000
|
heap
|
page read and write
|
||
B810000
|
trusted library allocation
|
page read and write
|
||
142F000
|
stack
|
page read and write
|
||
1123E000
|
stack
|
page read and write
|
||
13C45301000
|
trusted library allocation
|
page read and write
|
||
21A89700000
|
heap
|
page read and write
|
||
2C60000
|
direct allocation
|
page read and write
|
||
B0DF000
|
direct allocation
|
page read and write
|
||
F6BE000
|
stack
|
page read and write
|
||
1393E000
|
stack
|
page read and write
|
||
13E3E000
|
stack
|
page read and write
|
||
1587E000
|
stack
|
page read and write
|
||
FD4000
|
heap
|
page read and write
|
||
E17E000
|
stack
|
page read and write
|
||
ACA0000
|
direct allocation
|
page read and write
|
||
19F36FC0000
|
trusted library allocation
|
page read and write
|
||
2EEB1C47000
|
heap
|
page read and write
|
||
1073000
|
heap
|
page read and write
|
||
C6E767B000
|
stack
|
page read and write
|
||
BD1E000
|
stack
|
page read and write
|
||
1042000
|
heap
|
page read and write
|
||
1044000
|
heap
|
page read and write
|
||
B840000
|
trusted library allocation
|
page read and write
|
||
AFB0000
|
direct allocation
|
page read and write
|
||
2C20000
|
direct allocation
|
page read and write
|
||
AE80000
|
direct allocation
|
page read and write
|
||
109F000
|
heap
|
page read and write
|
||
14E3F000
|
stack
|
page read and write
|
||
5F60000
|
direct allocation
|
page read and write | page no cache
|
||
10B0000
|
trusted library allocation
|
page read and write
|
||
6260000
|
direct allocation
|
page read and write | page no cache
|
||
D53E000
|
stack
|
page read and write
|
||
3560000
|
direct allocation
|
page read and write | page no cache
|
||
2EEB23A0000
|
trusted library allocation
|
page read and write
|
||
132FE000
|
stack
|
page read and write
|
||
4060000
|
direct allocation
|
page read and write | page no cache
|
||
5E60000
|
direct allocation
|
page read and write | page no cache
|
||
FEA000
|
heap
|
page read and write
|
||
6C60000
|
direct allocation
|
page read and write | page no cache
|
||
1533F000
|
stack
|
page read and write
|
||
7B299FF000
|
stack
|
page read and write
|
||
AE70000
|
direct allocation
|
page read and write
|
||
EBBE000
|
stack
|
page read and write
|
||
2D60000
|
direct allocation
|
page read and write | page no cache
|
||
B824000
|
trusted library allocation
|
page read and write
|
||
EB7E000
|
stack
|
page read and write
|
||
2D90000
|
direct allocation
|
page read and write
|
||
B070000
|
direct allocation
|
page read and write
|
||
142F000
|
stack
|
page read and write
|
||
5560000
|
direct allocation
|
page read and write | page no cache
|
||
3060000
|
direct allocation
|
page read and write | page no cache
|
||
AD00000
|
direct allocation
|
page read and write
|
||
2C60000
|
direct allocation
|
page read and write
|
||
E2BE000
|
stack
|
page read and write
|
||
1016000
|
heap
|
page read and write
|
||
B090000
|
direct allocation
|
page read and write
|
||
1042000
|
heap
|
page read and write
|
||
14A7F000
|
stack
|
page read and write
|
||
106D000
|
heap
|
page read and write
|
||
14E7E000
|
stack
|
page read and write
|
||
21A89402000
|
unkown
|
page read and write
|
||
11DFE000
|
unkown
|
page read and write
|
||
AD70000
|
direct allocation
|
page read and write
|
||
B847000
|
trusted library allocation
|
page read and write
|
||
D27E000
|
stack
|
page read and write
|
||
FF9000
|
heap
|
page read and write
|
||
239D3813000
|
heap
|
page read and write
|
||
1067000
|
heap
|
page read and write
|
||
7C457F9000
|
stack
|
page read and write
|
||
108B000
|
heap
|
page read and write
|
||
19F37013000
|
heap
|
page read and write
|
||
5760000
|
direct allocation
|
page read and write | page no cache
|
||
239D3913000
|
heap
|
page read and write
|
||
13C4A03D000
|
heap
|
page read and write
|
||
13F3F000
|
stack
|
page read and write
|
||
AFC0000
|
direct allocation
|
page read and write
|
||
145BE000
|
stack
|
page read and write
|
||
105A000
|
heap
|
page read and write
|
||
15AFE000
|
stack
|
page read and write
|
||
107D000
|
heap
|
page read and write
|
||
1007000
|
heap
|
page read and write
|
||
109D000
|
heap
|
page read and write
|
||
B19F000
|
direct allocation
|
page read and write
|
||
B0C0000
|
direct allocation
|
page read and write
|
||
13C45113000
|
heap
|
page read and write
|
||
EFEDCFE000
|
stack
|
page read and write
|
||
B060000
|
direct allocation
|
page read and write
|
||
16EFE000
|
stack
|
page read and write
|
||
14E7E000
|
stack
|
page read and write
|
||
13C4A02B000
|
heap
|
page read and write
|
||
D6E4CFD000
|
stack
|
page read and write
|
||
15D7E000
|
stack
|
page read and write
|
||
105A000
|
heap
|
page read and write
|
||
B1AF000
|
direct allocation
|
page read and write
|
||
B10F000
|
direct allocation
|
page read and write
|
||
21A89290000
|
heap
|
page read and write
|
||
109D000
|
heap
|
page read and write
|
||
1047000
|
heap
|
page read and write
|
||
11BBE000
|
stack
|
page read and write
|
||
B0EF000
|
direct allocation
|
page read and write
|
||
15BFE000
|
stack
|
page read and write
|
||
16EBE000
|
stack
|
page read and write
|
||
113E000
|
stack
|
page read and write
|
||
E5D000
|
stack
|
page read and write
|
||
4160000
|
direct allocation
|
page read and write | page no cache
|
||
1407F000
|
stack
|
page read and write
|
||
10FE000
|
stack
|
page read and write
|
||
10A3E000
|
stack
|
page read and write
|
||
15E7E000
|
stack
|
page read and write
|
||
2C20000
|
direct allocation
|
page read and write
|
||
13E3E000
|
stack
|
page read and write
|
||
1483E000
|
stack
|
page read and write
|
||
1077000
|
heap
|
page read and write
|
||
CEEE000
|
stack
|
page read and write
|
||
1069000
|
heap
|
page read and write
|
||
ADC0000
|
direct allocation
|
page read and write
|
||
13C44FD1000
|
trusted library allocation
|
page read and write
|
||
2C60000
|
direct allocation
|
page read and write
|
||
105D000
|
heap
|
page read and write
|
||
13C44856000
|
heap
|
page read and write
|
||
24018990000
|
heap
|
page read and write
|
||
D63E000
|
stack
|
page read and write
|
||
6D60000
|
direct allocation
|
page read and write | page no cache
|
||
DB3E000
|
stack
|
page read and write
|
||
1002000
|
heap
|
page read and write
|
||
E07E000
|
stack
|
page read and write
|
||
239D3720000
|
heap
|
page read and write
|
||
B861000
|
trusted library allocation
|
page read and write
|
||
BBB0000
|
remote allocation
|
page read and write
|
||
27C4E0E0000
|
heap
|
page read and write
|
||
FCFE000
|
stack
|
page read and write
|
||
F1BE000
|
stack
|
page read and write
|
||
120FF000
|
stack
|
page read and write
|
||
6160000
|
direct allocation
|
page read and write | page no cache
|
||
AE30000
|
direct allocation
|
page read and write
|
||
146BF000
|
stack
|
page read and write
|
||
21A89602000
|
heap
|
page read and write
|
||
BBD0000
|
direct allocation
|
page read and write
|
||
14D3E000
|
stack
|
page read and write
|
||
CAEE000
|
stack
|
page read and write
|
||
106F000
|
heap
|
page read and write
|
||
BBD0000
|
remote allocation
|
page read and write
|
||
2D60000
|
direct allocation
|
page read and write | page no cache
|
||
106F000
|
heap
|
page read and write
|
||
108B000
|
heap
|
page read and write
|
||
13C4A0DF000
|
heap
|
page read and write
|
||
13C45002000
|
heap
|
page read and write
|
||
3A92000
|
direct allocation
|
page read and write
|
||
19F37075000
|
heap
|
page read and write
|
||
B802000
|
trusted library allocation
|
page read and write
|
||
3560000
|
direct allocation
|
page read and write | page no cache
|
||
37D9000
|
direct allocation
|
page read and write
|
||
B81B000
|
trusted library allocation
|
page read and write
|
||
E8FE000
|
stack
|
page read and write
|
||
13C45970000
|
trusted library section
|
page readonly
|
||
2C60000
|
direct allocation
|
page read and write
|
||
FBA000
|
heap
|
page read and write
|
||
4A60000
|
direct allocation
|
page read and write | page no cache
|
||
13C49D50000
|
trusted library allocation
|
page read and write
|
||
16EBE000
|
stack
|
page read and write
|
||
E6BE000
|
stack
|
page read and write
|
||
21CB3069000
|
heap
|
page read and write
|
||
109F000
|
heap
|
page read and write
|
||
142FE000
|
stack
|
page read and write
|
||
24017E6F000
|
heap
|
page read and write
|
||
109D000
|
heap
|
page read and write
|
||
123FF000
|
stack
|
page read and write
|
||
7C456FA000
|
stack
|
page read and write
|
||
CBEE000
|
stack
|
page read and write
|
||
21CB3052000
|
heap
|
page read and write
|
||
109B000
|
heap
|
page read and write
|
||
1497E000
|
stack
|
page read and write
|
||
1042000
|
heap
|
page read and write
|
||
105A000
|
heap
|
page read and write
|
||
2C60000
|
direct allocation
|
page read and write
|
||
2C60000
|
direct allocation
|
page read and write
|
||
E93E000
|
stack
|
page read and write
|
||
AF80000
|
direct allocation
|
page read and write
|
||
13C4A056000
|
heap
|
page read and write
|
||
B0B0000
|
direct allocation
|
page read and write
|
||
107F000
|
heap
|
page read and write
|
||
13DFF000
|
stack
|
page read and write
|
||
1067000
|
heap
|
page read and write
|
||
C7EE000
|
stack
|
page read and write
|
||
239D383C000
|
heap
|
page read and write
|
||
10AD000
|
heap
|
page read and write
|
||
3DE000
|
unkown
|
page readonly
|
||
2F60000
|
direct allocation
|
page read and write | page no cache
|
||
C0DF000
|
stack
|
page read and write
|
||
1042000
|
heap
|
page read and write
|
||
114BE000
|
stack
|
page read and write
|
||
B83C000
|
trusted library allocation
|
page read and write
|
||
3D4000
|
unkown
|
page readonly
|
||
2EEB1C73000
|
heap
|
page read and write
|
||
13C49E68000
|
trusted library allocation
|
page read and write
|
||
E5D000
|
stack
|
page read and write
|
||
D3FE000
|
stack
|
page read and write
|
||
13F3F000
|
stack
|
page read and write
|
||
AEC0000
|
direct allocation
|
page read and write
|
||
13C49CD0000
|
trusted library allocation
|
page read and write
|
||
C6E787E000
|
stack
|
page read and write
|
||
239D3800000
|
heap
|
page read and write
|
||
B85A000
|
trusted library allocation
|
page read and write
|
||
12B7E000
|
stack
|
page read and write
|
||
110FE000
|
stack
|
page read and write
|
||
1097000
|
heap
|
page read and write
|
||
3060000
|
direct allocation
|
page read and write | page no cache
|
||
1155000
|
heap
|
page read and write
|
||
19F37802000
|
trusted library allocation
|
page read and write
|
||
21A89500000
|
trusted library allocation
|
page read and write
|
||
24017CE0000
|
heap
|
page read and write
|
||
F6FE000
|
stack
|
page read and write
|
||
ACC0000
|
direct allocation
|
page read and write
|
||
B080000
|
direct allocation
|
page read and write
|
||
1353F000
|
stack
|
page read and write
|
||
1097000
|
heap
|
page read and write
|
||
13C49E60000
|
trusted library allocation
|
page read and write
|
||
13C446C0000
|
heap
|
page read and write
|
||
5A60000
|
direct allocation
|
page read and write | page no cache
|
||
C82E000
|
stack
|
page read and write
|
||
BBC0000
|
direct allocation
|
page read and write
|
||
27C4E180000
|
trusted library allocation
|
page read and write
|
||
95557AC000
|
stack
|
page read and write
|
||
108E000
|
heap
|
page read and write
|
||
D53E000
|
stack
|
page read and write
|
||
F0BE000
|
stack
|
page read and write
|
||
D73F000
|
stack
|
page read and write
|
||
13CFE000
|
stack
|
page read and write
|
||
24017E43000
|
heap
|
page read and write
|
||
13C4A000000
|
heap
|
page read and write
|
||
1277F000
|
stack
|
page read and write
|
||
D17E000
|
stack
|
page read and write
|
||
2EEB1C5E000
|
heap
|
page read and write
|
||
1061000
|
heap
|
page read and write
|
||
B83C000
|
trusted library allocation
|
page read and write
|
||
EFED7CB000
|
stack
|
page read and write
|
||
1533F000
|
stack
|
page read and write
|
||
2EEB1C69000
|
heap
|
page read and write
|
||
E93E000
|
stack
|
page read and write
|
||
27C4E202000
|
heap
|
page read and write
|
||
B16F000
|
direct allocation
|
page read and write
|
||
13A3F000
|
stack
|
page read and write
|
||
B856000
|
trusted library allocation
|
page read and write
|
||
1002000
|
heap
|
page read and write
|
||
C890000
|
direct allocation
|
page read and write
|
||
1003000
|
heap
|
page read and write
|
||
DFBF000
|
stack
|
page read and write
|
||
13A7E000
|
stack
|
page read and write
|
||
3D71000
|
direct allocation
|
page read and write
|
||
E2BE000
|
stack
|
page read and write
|
||
1005000
|
heap
|
page read and write
|
||
2C60000
|
direct allocation
|
page read and write | page no cache
|
||
12CBE000
|
stack
|
page read and write
|
||
17B3E000
|
stack
|
page read and write
|
||
D27E000
|
stack
|
page read and write
|
||
27C4E1B0000
|
remote allocation
|
page read and write
|
||
C11E000
|
stack
|
page read and write
|
||
14F7F000
|
stack
|
page read and write
|
||
B84C000
|
trusted library allocation
|
page read and write
|
||
21CB2E80000
|
heap
|
page read and write
|
||
5E60000
|
direct allocation
|
page read and write | page no cache
|
||
C460000
|
direct allocation
|
page read and write
|
||
C880000
|
direct allocation
|
page read and write
|
||
FCFE000
|
stack
|
page read and write
|
||
BCDE000
|
stack
|
page read and write
|
||
1767E000
|
stack
|
page read and write
|
||
2C10000
|
heap
|
page read and write
|
||
2A925308000
|
heap
|
page read and write
|
||
21CB303D000
|
heap
|
page read and write
|
||
1197E000
|
unkown
|
page read and write
|
||
C870000
|
direct allocation
|
page read and write
|
||
15AFE000
|
stack
|
page read and write
|
||
AD60000
|
direct allocation
|
page read and write
|
||
239D36C0000
|
heap
|
page read and write
|
||
14ABE000
|
stack
|
page read and write
|
||
FD7000
|
heap
|
page read and write
|
||
AD80000
|
direct allocation
|
page read and write
|
||
C6E7CFA000
|
stack
|
page read and write
|
||
FE8000
|
heap
|
page read and write
|
||
10E3E000
|
stack
|
page read and write
|
||
106FE000
|
stack
|
page read and write
|
||
B0C0000
|
direct allocation
|
page read and write
|
||
115FE000
|
stack
|
page read and write
|
||
D73F000
|
stack
|
page read and write
|
||
179FE000
|
stack
|
page read and write
|
||
B020000
|
direct allocation
|
page read and write
|
||
13C49E60000
|
trusted library allocation
|
page read and write
|
||
EA7E000
|
stack
|
page read and write
|
||
C86E000
|
stack
|
page read and write
|
||
BBD0000
|
remote allocation
|
page read and write
|
||
B84C000
|
trusted library allocation
|
page read and write
|
||
13C44913000
|
heap
|
page read and write
|
||
1065000
|
heap
|
page read and write
|
||
1753E000
|
stack
|
page read and write
|
||
4660000
|
direct allocation
|
page read and write | page no cache
|
||
1343E000
|
stack
|
page read and write
|
||
C7AE000
|
stack
|
page read and write
|
||
1573E000
|
stack
|
page read and write
|
||
1777E000
|
stack
|
page read and write
|
||
35CA000
|
direct allocation
|
page read and write
|
||
15D3E000
|
stack
|
page read and write
|
||
1096000
|
heap
|
page read and write
|
||
100BE000
|
stack
|
page read and write
|
||
FD7000
|
heap
|
page read and write
|
||
CBEE000
|
stack
|
page read and write
|
||
B856000
|
trusted library allocation
|
page read and write
|
||
AE70000
|
direct allocation
|
page read and write
|
||
AFE0000
|
direct allocation
|
page read and write
|
||
1763E000
|
stack
|
page read and write
|
||
EA7E000
|
stack
|
page read and write
|
||
3E60000
|
direct allocation
|
page read and write | page no cache
|
||
1018000
|
heap
|
page read and write
|
||
B14F000
|
direct allocation
|
page read and write
|
||
BBA0000
|
direct allocation
|
page read and write
|
||
FA3E000
|
stack
|
page read and write
|
||
D63E000
|
stack
|
page read and write
|
||
113E000
|
stack
|
page read and write
|
||
15D7E000
|
stack
|
page read and write
|
||
BF5E000
|
stack
|
page read and write
|
||
133FF000
|
stack
|
page read and write
|
||
BA1E000
|
stack
|
page read and write
|
||
24018802000
|
heap
|
page read and write
|
||
2D60000
|
direct allocation
|
page read and write | page no cache
|
||
2C20000
|
direct allocation
|
page read and write
|
||
6B60000
|
direct allocation
|
page read and write | page no cache
|
||
FDFE000
|
stack
|
page read and write
|
||
ACB0000
|
direct allocation
|
page read and write
|
||
B6C787C000
|
stack
|
page read and write
|
||
D6E4BFF000
|
stack
|
page read and write
|
||
D6E4E7E000
|
stack
|
page read and write
|
||
AC60000
|
direct allocation
|
page read and write
|
||
1440000
|
direct allocation
|
page read and write
|
||
21A89515000
|
trusted library allocation
|
page read and write
|
||
150BF000
|
stack
|
page read and write
|
||
5160000
|
direct allocation
|
page read and write | page no cache
|
||
108F000
|
heap
|
page read and write
|
||
123F000
|
trusted library allocation
|
page read and write
|
||
2C60000
|
direct allocation
|
page read and write | page no cache
|
||
14CFF000
|
stack
|
page read and write
|
||
2EEB1C3E000
|
heap
|
page read and write
|
||
AEB0000
|
direct allocation
|
page read and write
|
||
C6E7EFA000
|
stack
|
page read and write
|
||
108B000
|
heap
|
page read and write
|
||
6860000
|
direct allocation
|
page read and write | page no cache
|
||
1367F000
|
stack
|
page read and write
|
||
EDFE000
|
stack
|
page read and write
|
||
108B000
|
heap
|
page read and write
|
||
1440000
|
direct allocation
|
page read and write
|
||
E53E000
|
stack
|
page read and write
|
||
13C49EA0000
|
trusted library allocation
|
page read and write
|
||
4160000
|
direct allocation
|
page read and write | page no cache
|
||
121FF000
|
stack
|
page read and write
|
||
3D4000
|
unkown
|
page readonly
|
||
B050000
|
direct allocation
|
page read and write
|
||
D6E497E000
|
stack
|
page read and write
|
||
22C4F7F000
|
stack
|
page read and write
|
||
2C20000
|
direct allocation
|
page read and write
|
||
22C4D7E000
|
stack
|
page read and write
|
||
12B3F000
|
stack
|
page read and write
|
||
3B1000
|
unkown
|
page execute read
|
||
2A925120000
|
trusted library allocation
|
page read and write
|
||
1147E000
|
stack
|
page read and write
|
||
2EEB1C3C000
|
heap
|
page read and write
|
||
3A74000
|
direct allocation
|
page read and write
|
||
2EEB1C5B000
|
heap
|
page read and write
|
||
F59000
|
stack
|
page read and write
|
||
5260000
|
direct allocation
|
page read and write | page no cache
|
||
C62E000
|
stack
|
page read and write
|
||
BF5E000
|
stack
|
page read and write
|
||
22C507A000
|
stack
|
page read and write
|
||
21A89600000
|
heap
|
page read and write
|
||
1713E000
|
stack
|
page read and write
|
||
24017E91000
|
heap
|
page read and write
|
||
3B60000
|
direct allocation
|
page read and write | page no cache
|
||
2CBC000
|
direct allocation
|
page read and write
|
||
13C4A011000
|
heap
|
page read and write
|
||
142FE000
|
stack
|
page read and write
|
||
129FF000
|
stack
|
page read and write
|
||
24018913000
|
heap
|
page read and write
|
||
1763E000
|
stack
|
page read and write
|
||
178FE000
|
stack
|
page read and write
|
||
4860000
|
direct allocation
|
page read and write | page no cache
|
||
101FE000
|
stack
|
page read and write
|
||
1044000
|
heap
|
page read and write
|
||
1018000
|
heap
|
page read and write
|
||
C6E797F000
|
stack
|
page read and write
|
||
239D3865000
|
heap
|
page read and write
|
||
1014000
|
heap
|
page read and write
|
||
155FE000
|
stack
|
page read and write
|
||
AE30000
|
direct allocation
|
page read and write
|
||
2CCA000
|
direct allocation
|
page read and write
|
||
3260000
|
direct allocation
|
page read and write | page no cache
|
||
6F60000
|
direct allocation
|
page read and write | page no cache
|
||
1493F000
|
stack
|
page read and write
|
||
1163D000
|
stack
|
page read and write
|
||
1061000
|
heap
|
page read and write
|
||
2CB5000
|
direct allocation
|
page read and write
|
||
13C49E84000
|
trusted library allocation
|
page read and write
|
||
1357E000
|
stack
|
page read and write
|
||
95564FF000
|
stack
|
page read and write
|
||
7C458FF000
|
stack
|
page read and write
|
||
FA3E000
|
stack
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
D6E4DFD000
|
stack
|
page read and write
|
||
B836000
|
trusted library allocation
|
page read and write
|
||
1547F000
|
stack
|
page read and write
|
||
24017FB9000
|
heap
|
page read and write
|
||
9555EFF000
|
stack
|
page read and write
|
||
13C44829000
|
heap
|
page read and write
|
||
27C4E23D000
|
heap
|
page read and write
|
||
AFC0000
|
direct allocation
|
page read and write
|
||
10AE000
|
heap
|
page read and write
|
||
E63F000
|
stack
|
page read and write
|
||
4460000
|
direct allocation
|
page read and write | page no cache
|
||
2EEB1C6A000
|
heap
|
page read and write
|
||
2A92524A000
|
heap
|
page read and write
|
||
B858000
|
trusted library allocation
|
page read and write
|
||
146FE000
|
stack
|
page read and write
|
||
13C45950000
|
trusted library section
|
page readonly
|
||
FF5000
|
heap
|
page read and write
|
||
107F000
|
heap
|
page read and write
|
||
1028000
|
heap
|
page read and write
|
||
FB0000
|
heap
|
page read and write
|
||
2EEB1A90000
|
heap
|
page read and write
|
||
B0A0000
|
direct allocation
|
page read and write
|
||
1547F000
|
stack
|
page read and write
|
||
AD40000
|
direct allocation
|
page read and write
|
||
150BF000
|
stack
|
page read and write
|
||
12DBF000
|
stack
|
page read and write
|
||
1079000
|
heap
|
page read and write
|
||
141FD000
|
stack
|
page read and write
|
||
13BBE000
|
stack
|
page read and write
|
||
EF7F000
|
stack
|
page read and write
|
||
B070000
|
direct allocation
|
page read and write
|
||
14ABE000
|
stack
|
page read and write
|
||
2CDB000
|
direct allocation
|
page read and write
|
||
1777E000
|
stack
|
page read and write
|
||
13C4A100000
|
heap
|
page read and write
|
||
10BFE000
|
stack
|
page read and write
|
||
B838000
|
trusted library allocation
|
page read and write
|
||
2C60000
|
direct allocation
|
page read and write | page no cache
|
||
B800000
|
trusted library allocation
|
page read and write
|
||
FB0000
|
heap
|
page read and write
|
||
10CFE000
|
stack
|
page read and write
|
||
D13E000
|
stack
|
page read and write
|
||
24018908000
|
heap
|
page read and write
|
||
7C459FE000
|
stack
|
page read and write
|
||
1197E000
|
unkown
|
page read and write
|
||
6D60000
|
direct allocation
|
page read and write | page no cache
|
||
C8EE000
|
stack
|
page read and write
|
||
19F3705B000
|
heap
|
page read and write
|
||
13C4B000000
|
heap
|
page read and write
|
||
1143E000
|
stack
|
page read and write
|
||
10AD000
|
heap
|
page read and write
|
||
E3FE000
|
stack
|
page read and write
|
||
B010000
|
direct allocation
|
page read and write
|
||
3191000
|
direct allocation
|
page read and write
|
||
118BE000
|
stack
|
page read and write
|
||
128FE000
|
stack
|
page read and write
|
||
F1BE000
|
stack
|
page read and write
|
||
109B000
|
heap
|
page read and write
|
||
E6BE000
|
stack
|
page read and write
|
||
DCBE000
|
stack
|
page read and write
|
||
7160000
|
direct allocation
|
page read and write | page no cache
|
||
6560000
|
direct allocation
|
page read and write | page no cache
|
||
132F000
|
stack
|
page read and write
|
||
35E6000
|
direct allocation
|
page read and write
|
||
122FF000
|
stack
|
page read and write
|
||
21A89428000
|
heap
|
page read and write
|
||
C0DF000
|
stack
|
page read and write
|
||
1357E000
|
stack
|
page read and write
|
||
2C60000
|
direct allocation
|
page read and write
|
||
10FE000
|
stack
|
page read and write
|
||
12DBF000
|
stack
|
page read and write
|
||
13C4A0A5000
|
heap
|
page read and write
|
||
2EEB1C60000
|
heap
|
page read and write
|
||
DEBF000
|
stack
|
page read and write
|
||
1047000
|
heap
|
page read and write
|
||
3DF3000
|
direct allocation
|
page read and write
|
||
24017E92000
|
heap
|
page read and write
|
||
1523E000
|
stack
|
page read and write
|
||
19F36EC0000
|
heap
|
page read and write
|
||
B843000
|
trusted library allocation
|
page read and write
|
||
4260000
|
direct allocation
|
page read and write | page no cache
|
||
13F7E000
|
stack
|
page read and write
|
||
110FE000
|
stack
|
page read and write
|
||
19F36E50000
|
heap
|
page read and write
|
||
BF0000
|
unkown
|
page read and write
|
||
146BF000
|
stack
|
page read and write
|
||
2C60000
|
direct allocation
|
page read and write
|
||
DB7E000
|
stack
|
page read and write
|
||
21CB2E70000
|
heap
|
page read and write
|
||
2EEB1C42000
|
heap
|
page read and write
|
||
12A3E000
|
stack
|
page read and write
|
||
19F37113000
|
heap
|
page read and write
|
||
24017E3C000
|
heap
|
page read and write
|
||
ADE0000
|
direct allocation
|
page read and write
|
||
F7FE000
|
stack
|
page read and write
|
||
BBC0000
|
direct allocation
|
page read and write
|
||
109B000
|
heap
|
page read and write
|
||
BF9E000
|
stack
|
page read and write
|
||
1043E000
|
stack
|
page read and write
|
||
1069000
|
heap
|
page read and write
|
||
21CB3102000
|
heap
|
page read and write
|
||
2C60000
|
direct allocation
|
page read and write
|
||
B814000
|
trusted library allocation
|
page read and write
|
||
B91E000
|
stack
|
page read and write
|
||
107D000
|
heap
|
page read and write
|
||
D6E48FE000
|
stack
|
page read and write
|
||
239D4002000
|
trusted library allocation
|
page read and write
|
||
24017D70000
|
trusted library allocation
|
page read and write
|
||
19F36E60000
|
heap
|
page read and write
|
||
107D000
|
heap
|
page read and write
|
||
BB9E000
|
stack
|
page read and write
|
||
105F000
|
heap
|
page read and write
|
||
2EEB1C83000
|
heap
|
page read and write
|
||
C9EE000
|
stack
|
page read and write
|
||
5F60000
|
direct allocation
|
page read and write | page no cache
|
||
13C44800000
|
heap
|
page read and write
|
||
1450000
|
direct allocation
|
page read and write
|
||
1062000
|
heap
|
page read and write
|
||
1523E000
|
stack
|
page read and write
|
||
C31E000
|
stack
|
page read and write
|
||
14BBF000
|
stack
|
page read and write
|
||
239D3884000
|
heap
|
page read and write
|
||
FDFE000
|
stack
|
page read and write
|
||
5860000
|
direct allocation
|
page read and write | page no cache
|
||
E2FE000
|
stack
|
page read and write
|
||
239D3889000
|
heap
|
page read and write
|
||
19F37102000
|
heap
|
page read and write
|
||
24017CD0000
|
heap
|
page read and write
|
||
27C4E302000
|
heap
|
page read and write
|
||
1173D000
|
stack
|
page read and write
|
||
FA7E000
|
stack
|
page read and write
|
||
106F000
|
heap
|
page read and write
|
||
239D3853000
|
heap
|
page read and write
|
||
6760000
|
direct allocation
|
page read and write | page no cache
|
||
1047000
|
heap
|
page read and write
|
||
1457F000
|
stack
|
page read and write
|
||
13C49FB0000
|
trusted library allocation
|
page read and write
|
||
13C4A104000
|
heap
|
page read and write
|
||
B82D000
|
trusted library allocation
|
page read and write
|
||
109B000
|
heap
|
page read and write
|
||
B0DF000
|
direct allocation
|
page read and write
|
||
EFEDDFE000
|
stack
|
page read and write
|
||
145BE000
|
stack
|
page read and write
|
||
24017FE5000
|
heap
|
page read and write
|
||
2C60000
|
direct allocation
|
page read and write
|
||
132BF000
|
stack
|
page read and write
|
||
2C8A000
|
direct allocation
|
page read and write
|
||
14A7F000
|
stack
|
page read and write
|
||
110BF000
|
stack
|
page read and write
|
||
B000000
|
direct allocation
|
page read and write
|
||
1317F000
|
stack
|
page read and write
|
||
27C4E213000
|
heap
|
page read and write
|
||
101A000
|
heap
|
page read and write
|
||
16D7E000
|
stack
|
page read and write
|
||
1082000
|
heap
|
page read and write
|
||
127BE000
|
stack
|
page read and write
|
||
2DA0000
|
direct allocation
|
page read and write
|
||
106F000
|
heap
|
page read and write
|
||
B49E000
|
stack
|
page read and write
|
||
1014000
|
heap
|
page read and write
|
||
109F000
|
heap
|
page read and write
|
||
24018A27000
|
heap
|
page read and write
|
||
CF3E000
|
stack
|
page read and write
|
||
B84D000
|
trusted library allocation
|
page read and write
|
||
B852000
|
trusted library allocation
|
page read and write
|
||
13C49E90000
|
trusted library allocation
|
page read and write
|
||
10BFE000
|
stack
|
page read and write
|
||
10D3E000
|
stack
|
page read and write
|
||
1133F000
|
stack
|
page read and write
|
||
22C4DFF000
|
stack
|
page read and write
|
||
6560000
|
direct allocation
|
page read and write | page no cache
|
||
B080000
|
direct allocation
|
page read and write
|
||
13A3F000
|
stack
|
page read and write
|
||
140BE000
|
stack
|
page read and write
|
||
AEF0000
|
direct allocation
|
page read and write
|
||
3D60000
|
direct allocation
|
page read and write | page no cache
|
||
FBFE000
|
stack
|
page read and write
|
||
3DB000
|
unkown
|
page write copy
|
||
DB3E000
|
stack
|
page read and write
|
||
27C4E0F0000
|
heap
|
page read and write
|
||
B849000
|
trusted library allocation
|
page read and write
|
||
22C497A000
|
stack
|
page read and write
|
||
BBB0000
|
direct allocation
|
page read and write
|
||
2F60000
|
direct allocation
|
page read and write | page no cache
|
||
1044000
|
heap
|
page read and write
|
||
C76E000
|
stack
|
page read and write
|
||
FF7E000
|
stack
|
page read and write
|
||
6A60000
|
direct allocation
|
page read and write | page no cache
|
||
B020000
|
direct allocation
|
page read and write
|
||
1044000
|
heap
|
page read and write
|
||
AE10000
|
direct allocation
|
page read and write
|
||
13C4A0E4000
|
heap
|
page read and write
|
||
1047000
|
heap
|
page read and write
|
||
24018922000
|
heap
|
page read and write
|
||
106B000
|
heap
|
page read and write
|
||
1044000
|
heap
|
page read and write
|
||
B81C000
|
trusted library allocation
|
page read and write
|
||
1079000
|
heap
|
page read and write
|
||
BE1E000
|
stack
|
page read and write
|
||
AFF0000
|
direct allocation
|
page read and write
|
||
13C45940000
|
trusted library section
|
page readonly
|
||
E7FE000
|
stack
|
page read and write
|
||
1147E000
|
stack
|
page read and write
|
||
13C45118000
|
heap
|
page read and write
|
||
1032000
|
heap
|
page read and write
|
||
B81E000
|
trusted library allocation
|
page read and write
|
||
1597E000
|
stack
|
page read and write
|
||
6E60000
|
direct allocation
|
page read and write | page no cache
|
||
BBC0000
|
direct allocation
|
page read and write
|
||
3261000
|
direct allocation
|
page read and write
|
||
107D000
|
heap
|
page read and write
|
||
2EEB2402000
|
trusted library allocation
|
page read and write
|
||
D17E000
|
stack
|
page read and write
|
||
C870000
|
direct allocation
|
page read and write
|
||
BBB0000
|
direct allocation
|
page read and write
|
||
778AB7B000
|
stack
|
page read and write
|
||
B829000
|
trusted library allocation
|
page read and write
|
||
107F000
|
heap
|
page read and write
|
||
778A87F000
|
stack
|
page read and write
|
||
10A7D000
|
stack
|
page read and write
|
||
7B296FB000
|
stack
|
page read and write
|
||
1087000
|
heap
|
page read and write
|
||
B0FF000
|
direct allocation
|
page read and write
|
||
2C60000
|
direct allocation
|
page read and write
|
||
22C4B7F000
|
stack
|
page read and write
|
||
2EEB1C74000
|
heap
|
page read and write
|
||
FFBE000
|
stack
|
page read and write
|
||
B6C7D7F000
|
stack
|
page read and write
|
||
1150000
|
heap
|
page read and write
|
||
1077000
|
heap
|
page read and write
|
||
150FE000
|
stack
|
page read and write
|
||
1043E000
|
stack
|
page read and write
|
||
113E000
|
stack
|
page read and write
|
||
13C49D40000
|
trusted library allocation
|
page read and write
|
||
EFEDAFE000
|
stack
|
page read and write
|
||
1003000
|
heap
|
page read and write
|
||
101D000
|
heap
|
page read and write
|
||
13C44813000
|
heap
|
page read and write
|
||
2C60000
|
direct allocation
|
page read and write
|
||
1393E000
|
stack
|
page read and write
|
||
6460000
|
direct allocation
|
page read and write | page no cache
|
||
1048000
|
heap
|
page read and write
|
||
24017D40000
|
heap
|
page read and write
|
||
BFDE000
|
stack
|
page read and write
|
||
B6C7B7B000
|
stack
|
page read and write
|
||
5C60000
|
direct allocation
|
page read and write | page no cache
|
||
13C49F30000
|
trusted library allocation
|
page read and write
|
||
24017E43000
|
heap
|
page read and write
|
||
22C4C7B000
|
stack
|
page read and write
|
||
19F37000000
|
heap
|
page read and write
|
||
1088000
|
heap
|
page read and write
|
||
ACF0000
|
direct allocation
|
page read and write
|
||
BA1E000
|
stack
|
page read and write
|
||
15C3E000
|
stack
|
page read and write
|
||
AE00000
|
direct allocation
|
page read and write
|
||
2A92527D000
|
heap
|
page read and write
|
||
4C60000
|
direct allocation
|
page read and write | page no cache
|
||
1457F000
|
stack
|
page read and write
|
||
13C44858000
|
heap
|
page read and write
|
||
132F000
|
stack
|
page read and write
|
||
B820000
|
trusted library allocation
|
page read and write
|
||
159BE000
|
stack
|
page read and write
|
||
2EEB1C4E000
|
heap
|
page read and write
|
||
7C455FF000
|
stack
|
page read and write
|
||
1353F000
|
stack
|
page read and write
|
||
D2BE000
|
stack
|
page read and write
|
||
EA3E000
|
stack
|
page read and write
|
||
13C4A0A2000
|
heap
|
page read and write
|
||
2F60000
|
direct allocation
|
page read and write | page no cache
|
||
5360000
|
direct allocation
|
page read and write | page no cache
|
||
1193E000
|
unkown
|
page read and write
|
||
6460000
|
direct allocation
|
page read and write | page no cache
|
||
BA5E000
|
stack
|
page read and write
|
||
B83C000
|
trusted library allocation
|
page read and write
|
||
22C4877000
|
stack
|
page read and write
|
||
FBBE000
|
stack
|
page read and write
|
||
B6C797F000
|
stack
|
page read and write
|
||
24018A00000
|
heap
|
page read and write
|
||
3B1000
|
unkown
|
page execute read
|
||
B838000
|
trusted library allocation
|
page read and write
|
||
1447E000
|
stack
|
page read and write
|
||
D23E000
|
stack
|
page read and write
|
||
C62E000
|
stack
|
page read and write
|
||
B050000
|
direct allocation
|
page read and write
|
||
124FF000
|
stack
|
page read and write
|
||
2EEB1C63000
|
heap
|
page read and write
|
||
3960000
|
direct allocation
|
page read and write | page no cache
|
||
21A8940D000
|
unkown
|
page read and write
|
||
6660000
|
direct allocation
|
page read and write | page no cache
|
||
107D000
|
heap
|
page read and write
|
||
C7EE000
|
stack
|
page read and write
|
||
105A000
|
heap
|
page read and write
|
||
C8A0000
|
direct allocation
|
page read and write
|
||
2EEB1C41000
|
heap
|
page read and write
|
||
B838000
|
trusted library allocation
|
page read and write
|
||
2A924FC0000
|
heap
|
page read and write
|
||
AC90000
|
direct allocation
|
page read and write
|
||
1253E000
|
stack
|
page read and write
|
||
6B60000
|
direct allocation
|
page read and write | page no cache
|
||
1450000
|
direct allocation
|
page read and write
|
||
22C5179000
|
stack
|
page read and write
|
||
2C60000
|
direct allocation
|
page read and write
|
||
10FE000
|
stack
|
page read and write
|
||
107D000
|
heap
|
page read and write
|
||
16C7E000
|
stack
|
page read and write
|
||
2C60000
|
direct allocation
|
page read and write
|
||
B818000
|
trusted library allocation
|
page read and write
|
||
24017E2A000
|
heap
|
page read and write
|
||
6860000
|
direct allocation
|
page read and write | page no cache
|
||
CAEE000
|
stack
|
page read and write
|
||
13C49F80000
|
trusted library allocation
|
page read and write
|
||
ECBE000
|
stack
|
page read and write
|
||
177BE000
|
stack
|
page read and write
|
||
7060000
|
direct allocation
|
page read and write | page no cache
|
||
1267E000
|
stack
|
page read and write
|
||
13B7F000
|
stack
|
page read and write
|
||
1450000
|
direct allocation
|
page read and write
|
||
27C4E200000
|
heap
|
page read and write
|
||
13C44FF3000
|
trusted library allocation
|
page read and write
|
||
AD30000
|
direct allocation
|
page read and write
|
||
13CFE000
|
stack
|
page read and write
|
||
ACE0000
|
direct allocation
|
page read and write
|
||
1155000
|
heap
|
page read and write
|
||
1042000
|
heap
|
page read and write
|
||
B82A000
|
trusted library allocation
|
page read and write
|
||
1447E000
|
stack
|
page read and write
|
||
13C44841000
|
heap
|
page read and write
|
||
2D60000
|
direct allocation
|
page read and write | page no cache
|
||
17A3E000
|
stack
|
page read and write
|
||
21A89523000
|
heap
|
page read and write
|
||
21A89613000
|
heap
|
page read and write
|
||
1032000
|
heap
|
page read and write
|
||
24017E88000
|
heap
|
page read and write
|
||
10AE000
|
heap
|
page read and write
|
||
AF90000
|
direct allocation
|
page read and write
|
||
1087000
|
heap
|
page read and write
|
||
2CD2000
|
direct allocation
|
page read and write
|
||
1007000
|
heap
|
page read and write
|
||
1450000
|
direct allocation
|
page read and write
|
||
13C4A0AC000
|
heap
|
page read and write
|
||
106F000
|
heap
|
page read and write
|
||
24017E69000
|
heap
|
page read and write
|
||
AC80000
|
direct allocation
|
page read and write
|
||
AD00000
|
direct allocation
|
page read and write
|
||
3760000
|
direct allocation
|
page read and write | page no cache
|
||
AD60000
|
direct allocation
|
page read and write
|
||
137BF000
|
stack
|
page read and write
|
||
106B000
|
heap
|
page read and write
|
||
BD1E000
|
stack
|
page read and write
|
||
1597E000
|
stack
|
page read and write
|
||
AD90000
|
direct allocation
|
page read and write
|
||
131BE000
|
stack
|
page read and write
|
||
BE5E000
|
stack
|
page read and write
|
||
12C7F000
|
stack
|
page read and write
|
||
105A000
|
heap
|
page read and write
|
||
113E000
|
stack
|
page read and write
|
||
3DE000
|
unkown
|
page readonly
|
||
2C60000
|
direct allocation
|
page read and write
|
||
13C49EA4000
|
trusted library allocation
|
page read and write
|
||
2EEB1C62000
|
heap
|
page read and write
|
||
2EEB1C44000
|
heap
|
page read and write
|
||
1193E000
|
unkown
|
page read and write
|
||
13C447C0000
|
trusted library allocation
|
page read and write
|
||
B82E000
|
trusted library allocation
|
page read and write
|
||
13C44894000
|
heap
|
page read and write
|
||
2EEB1C45000
|
heap
|
page read and write
|
||
1767E000
|
stack
|
page read and write
|
||
24018954000
|
heap
|
page read and write
|
||
24018922000
|
heap
|
page read and write
|
||
10BBE000
|
stack
|
page read and write
|
||
10FBE000
|
stack
|
page read and write
|
||
13C44902000
|
heap
|
page read and write
|
||
F83E000
|
stack
|
page read and write
|
||
27C4E223000
|
heap
|
page read and write
|
||
B81A000
|
trusted library allocation
|
page read and write
|
||
128FE000
|
stack
|
page read and write
|
||
24018A13000
|
heap
|
page read and write
|
||
109F000
|
heap
|
page read and write
|
||
E8FE000
|
stack
|
page read and write
|
||
3760000
|
direct allocation
|
page read and write | page no cache
|
||
240189AE000
|
heap
|
page read and write
|
||
105F000
|
heap
|
page read and write
|
||
27C4EC02000
|
trusted library allocation
|
page read and write
|
||
2A925200000
|
heap
|
page read and write
|
||
27C4E229000
|
heap
|
page read and write
|
||
EFEDEFF000
|
stack
|
page read and write
|
||
AED0000
|
direct allocation
|
page read and write
|
||
1537E000
|
stack
|
page read and write
|
||
6C60000
|
direct allocation
|
page read and write | page no cache
|
||
B060000
|
direct allocation
|
page read and write
|
||
101BE000
|
stack
|
page read and write
|
||
ACE0000
|
direct allocation
|
page read and write
|
||
107F000
|
heap
|
page read and write
|
||
240189BC000
|
heap
|
page read and write
|
||
4E60000
|
direct allocation
|
page read and write | page no cache
|
||
10A3E000
|
stack
|
page read and write
|
||
16C7E000
|
stack
|
page read and write
|
||
1016000
|
heap
|
page read and write
|
||
13C448A0000
|
heap
|
page read and write
|
||
1263F000
|
stack
|
page read and write
|
||
13C44650000
|
heap
|
page read and write
|
||
F93E000
|
stack
|
page read and write
|
||
F83E000
|
stack
|
page read and write
|
||
6360000
|
direct allocation
|
page read and write | page no cache
|
||
B18F000
|
direct allocation
|
page read and write
|
||
B15F000
|
direct allocation
|
page read and write
|
||
21CB3002000
|
heap
|
page read and write
|
||
FFBE000
|
stack
|
page read and write
|
||
1703E000
|
stack
|
page read and write
|
||
1583E000
|
stack
|
page read and write
|
||
1029000
|
heap
|
page read and write
|
||
4B60000
|
direct allocation
|
page read and write | page no cache
|
||
AFE0000
|
direct allocation
|
page read and write
|
||
21CB3038000
|
heap
|
page read and write
|
||
11BBE000
|
stack
|
page read and write
|
||
CF3E000
|
stack
|
page read and write
|
||
E17E000
|
stack
|
page read and write
|
||
12DFE000
|
stack
|
page read and write
|
||
AC60000
|
direct allocation
|
page read and write
|
||
EFEDA7E000
|
stack
|
page read and write
|
||
1065000
|
heap
|
page read and write
|
||
21CB301F000
|
heap
|
page read and write
|
||
B840000
|
trusted library allocation
|
page read and write
|
||
1026000
|
heap
|
page read and write
|
||
1026000
|
heap
|
page read and write
|
||
2EEB1C13000
|
heap
|
page read and write
|
||
5960000
|
direct allocation
|
page read and write | page no cache
|
||
13CBF000
|
stack
|
page read and write
|
||
C6E77FE000
|
stack
|
page read and write
|
||
15BFE000
|
stack
|
page read and write
|
||
107D000
|
heap
|
page read and write
|
||
C76E000
|
stack
|
page read and write
|
||
D2BE000
|
stack
|
page read and write
|
||
1044000
|
heap
|
page read and write
|
||
6160000
|
direct allocation
|
page read and write | page no cache
|
||
21A8944A000
|
heap
|
page read and write
|
||
11DFE000
|
unkown
|
page read and write
|
||
2C60000
|
direct allocation
|
page read and write
|
||
BA5E000
|
stack
|
page read and write
|
||
AF70000
|
direct allocation
|
page read and write
|
||
BB5E000
|
stack
|
page read and write
|
||
13F7E000
|
stack
|
page read and write
|
||
B816000
|
trusted library allocation
|
page read and write
|
||
2C10000
|
heap
|
page read and write
|
||
13C49FC0000
|
remote allocation
|
page read and write
|
||
BF0000
|
unkown
|
page read and write
|
||
13C44890000
|
heap
|
page read and write
|
||
6960000
|
direct allocation
|
page read and write | page no cache
|
||
5460000
|
direct allocation
|
page read and write | page no cache
|
||
131BE000
|
stack
|
page read and write
|
||
B7E0000
|
trusted library allocation
|
page read and write
|
||
1018000
|
heap
|
page read and write
|
||
1047E000
|
stack
|
page read and write
|
||
2EEB1C5A000
|
heap
|
page read and write
|
||
AF10000
|
direct allocation
|
page read and write
|
||
B6E0000
|
trusted library allocation
|
page read and write
|
||
AEC0000
|
direct allocation
|
page read and write
|
||
19F37041000
|
heap
|
page read and write
|
||
BB9E000
|
stack
|
page read and write
|
||
239D3902000
|
heap
|
page read and write
|
||
137FE000
|
stack
|
page read and write
|
||
95561FE000
|
stack
|
page read and write
|
||
AEB0000
|
direct allocation
|
page read and write
|
||
B6DE000
|
stack
|
page read and write
|
||
2EEB1C5F000
|
heap
|
page read and write
|
||
1587E000
|
stack
|
page read and write
|
||
FBBE000
|
stack
|
page read and write
|
||
B836000
|
trusted library allocation
|
page read and write
|
||
ADA0000
|
direct allocation
|
page read and write
|
||
778A3FE000
|
stack
|
page read and write
|
||
7B295FF000
|
stack
|
page read and write
|
||
9555BFA000
|
stack
|
page read and write
|
||
105A000
|
heap
|
page read and write
|
||
1067000
|
heap
|
page read and write
|
||
10E7E000
|
stack
|
page read and write
|
||
1277F000
|
stack
|
page read and write
|
||
1087000
|
heap
|
page read and write
|
||
22C4CFF000
|
stack
|
page read and write
|
||
AE80000
|
direct allocation
|
page read and write
|
||
1047E000
|
stack
|
page read and write
|
||
2C60000
|
direct allocation
|
page read and write
|
||
13C45118000
|
heap
|
page read and write
|
||
1026000
|
heap
|
page read and write
|
||
1065000
|
heap
|
page read and write
|
||
1123E000
|
stack
|
page read and write
|
||
FD7000
|
heap
|
page read and write
|
||
107D000
|
heap
|
page read and write
|
||
13C49FC0000
|
remote allocation
|
page read and write
|
||
13C49FA0000
|
trusted library allocation
|
page read and write
|
||
13CBF000
|
stack
|
page read and write
|
||
21A89220000
|
heap
|
page read and write
|
||
B84E000
|
trusted library allocation
|
page read and write
|
||
21CB3013000
|
heap
|
page read and write
|
||
3DF0000
|
direct allocation
|
page read and write
|
||
24017E8C000
|
heap
|
page read and write
|
||
239D387C000
|
heap
|
page read and write
|
||
239D3891000
|
heap
|
page read and write
|
||
2EEB1C5C000
|
heap
|
page read and write
|
||
F93E000
|
stack
|
page read and write
|
||
E43E000
|
stack
|
page read and write
|
||
11850000
|
direct allocation
|
page read and write
|
||
FD4000
|
heap
|
page read and write
|
||
C215000
|
stack
|
page read and write
|
||
1467000
|
heap
|
page read and write
|
||
AF60000
|
direct allocation
|
page read and write
|
||
24017F13000
|
heap
|
page read and write
|
||
4860000
|
direct allocation
|
page read and write | page no cache
|
||
1467000
|
heap
|
page read and write
|
||
3B0000
|
unkown
|
page readonly
|
||
21CB3000000
|
heap
|
page read and write
|
||
1069000
|
heap
|
page read and write
|
||
13C49FC0000
|
trusted library allocation
|
page read and write
|
||
239D3FC0000
|
trusted library allocation
|
page read and write
|
||
12C7F000
|
stack
|
page read and write
|
||
CEEE000
|
stack
|
page read and write
|
||
C82E000
|
stack
|
page read and write
|
||
E7BE000
|
stack
|
page read and write
|
||
106D000
|
heap
|
page read and write
|
||
E7FE000
|
stack
|
page read and write
|
||
16EFE000
|
stack
|
page read and write
|
||
11B7F000
|
stack
|
page read and write
|
||
DC7E000
|
stack
|
page read and write
|
||
EDFE000
|
stack
|
page read and write
|
||
111FE000
|
stack
|
page read and write
|
||
1367F000
|
stack
|
page read and write
|
||
C6E7AF9000
|
stack
|
page read and write
|
||
27C4E257000
|
heap
|
page read and write
|
||
21CB3029000
|
heap
|
page read and write
|
||
1187E000
|
stack
|
page read and write
|
||
BF0000
|
unkown
|
page read and write
|
||
2EEB1C7A000
|
heap
|
page read and write
|
||
B16F000
|
direct allocation
|
page read and write
|
||
105A000
|
heap
|
page read and write
|
||
13C4487C000
|
heap
|
page read and write
|
||
17B3E000
|
stack
|
page read and write
|
||
4A60000
|
direct allocation
|
page read and write | page no cache
|
||
F7FE000
|
stack
|
page read and write
|
||
F59000
|
stack
|
page read and write
|
||
ADD0000
|
direct allocation
|
page read and write
|
||
6E60000
|
direct allocation
|
page read and write | page no cache
|
||
9555FFD000
|
stack
|
page read and write
|
||
C6E7BFF000
|
stack
|
page read and write
|
||
95562FE000
|
stack
|
page read and write
|
||
AF00000
|
direct allocation
|
page read and write
|
||
E1BE000
|
stack
|
page read and write
|
||
B843000
|
trusted library allocation
|
page read and write
|
||
FF9000
|
heap
|
page read and write
|
||
1493F000
|
stack
|
page read and write
|
||
4C60000
|
direct allocation
|
page read and write | page no cache
|
||
141FD000
|
stack
|
page read and write
|
||
108FF000
|
stack
|
page read and write
|
||
2A925020000
|
heap
|
page read and write
|
||
10FE000
|
stack
|
page read and write
|
||
C45E000
|
stack
|
page read and write
|
||
1048000
|
heap
|
page read and write
|
||
21A89448000
|
unkown
|
page read and write
|
||
10E7E000
|
stack
|
page read and write
|
||
14FBE000
|
stack
|
page read and write
|
||
108B000
|
heap
|
page read and write
|
||
15C3E000
|
stack
|
page read and write
|
||
FB0000
|
heap
|
page read and write
|
||
95563FF000
|
stack
|
page read and write
|
||
1467000
|
heap
|
page read and write
|
||
2D12000
|
direct allocation
|
page read and write
|
||
115FE000
|
stack
|
page read and write
|
||
13C4A0FD000
|
heap
|
page read and write
|
||
27C4E150000
|
heap
|
page read and write
|
||
B81C000
|
trusted library allocation
|
page read and write
|
||
AF20000
|
direct allocation
|
page read and write
|
||
AF60000
|
direct allocation
|
page read and write
|
||
5760000
|
direct allocation
|
page read and write | page no cache
|
||
11B7F000
|
stack
|
page read and write
|
||
13C49E81000
|
trusted library allocation
|
page read and write
|
||
B030000
|
direct allocation
|
page read and write
|
||
21A89713000
|
heap
|
page read and write
|
||
B49E000
|
stack
|
page read and write
|
||
6760000
|
direct allocation
|
page read and write | page no cache
|
||
9555DFD000
|
stack
|
page read and write
|
||
B010000
|
direct allocation
|
page read and write
|
||
EB7E000
|
stack
|
page read and write
|
||
1093000
|
heap
|
page read and write
|
||
AC90000
|
direct allocation
|
page read and write
|
||
AF90000
|
direct allocation
|
page read and write
|
||
346B000
|
direct allocation
|
page read and write
|
||
FF9000
|
heap
|
page read and write
|
||
105A000
|
heap
|
page read and write
|
||
B80A000
|
trusted library allocation
|
page read and write
|
||
F59000
|
stack
|
page read and write
|
||
12EFF000
|
stack
|
page read and write
|
||
B0B0000
|
direct allocation
|
page read and write
|
||
F2FE000
|
stack
|
page read and write
|
||
B12F000
|
direct allocation
|
page read and write
|
||
11870000
|
direct allocation
|
page read and write
|
||
2C10000
|
direct allocation
|
page read and write
|
||
109B000
|
heap
|
page read and write
|
||
C86E000
|
stack
|
page read and write
|
||
239D3827000
|
heap
|
page read and write
|
||
D6E4B7D000
|
stack
|
page read and write
|
||
1317F000
|
stack
|
page read and write
|
||
AF40000
|
direct allocation
|
page read and write
|
||
1433E000
|
stack
|
page read and write
|
||
109F000
|
heap
|
page read and write
|
||
C6E7A7B000
|
stack
|
page read and write
|
||
106B000
|
heap
|
page read and write
|
||
11EFE000
|
stack
|
page read and write
|
||
778A97E000
|
stack
|
page read and write
|
||
AFB0000
|
direct allocation
|
page read and write
|
||
1497E000
|
stack
|
page read and write
|
||
AF50000
|
direct allocation
|
page read and write
|
||
AC70000
|
direct allocation
|
page read and write
|
||
10E3E000
|
stack
|
page read and write
|
||
118BE000
|
stack
|
page read and write
|
||
B0EF000
|
direct allocation
|
page read and write
|
||
3B0000
|
unkown
|
page readonly
|
||
10FBE000
|
stack
|
page read and write
|
||
156FE000
|
stack
|
page read and write
|
||
ACF0000
|
direct allocation
|
page read and write
|
||
ADF0000
|
direct allocation
|
page read and write
|
||
6960000
|
direct allocation
|
page read and write | page no cache
|
||
1067000
|
heap
|
page read and write
|
||
24018A23000
|
heap
|
page read and write
|
||
21CB304F000
|
heap
|
page read and write
|
||
4060000
|
direct allocation
|
page read and write | page no cache
|
||
FE9000
|
heap
|
page read and write
|
||
4360000
|
direct allocation
|
page read and write | page no cache
|
||
B824000
|
trusted library allocation
|
page read and write
|
||
1067000
|
heap
|
page read and write
|
||
1183E000
|
stack
|
page read and write
|
||
B19F000
|
direct allocation
|
page read and write
|
||
ECFE000
|
stack
|
page read and write
|
||
16FFE000
|
stack
|
page read and write
|
||
239D3900000
|
heap
|
page read and write
|
||
ADF0000
|
direct allocation
|
page read and write
|
||
EE7E000
|
stack
|
page read and write
|
||
2C10000
|
direct allocation
|
page read and write
|
||
1430000
|
direct allocation
|
page read and write | page no cache
|
||
13C49E6E000
|
trusted library allocation
|
page read and write
|
||
6660000
|
direct allocation
|
page read and write | page no cache
|
||
1073000
|
heap
|
page read and write
|
||
2C60000
|
direct allocation
|
page read and write
|
||
FD4000
|
heap
|
page read and write
|
||
ADD0000
|
direct allocation
|
page read and write
|
||
21A89436000
|
heap
|
page read and write
|
||
24017E5B000
|
heap
|
page read and write
|
||
239D36B0000
|
heap
|
page read and write
|
||
B0A0000
|
direct allocation
|
page read and write
|
||
1033E000
|
stack
|
page read and write
|
||
BBB0000
|
direct allocation
|
page read and write
|
||
13DFF000
|
stack
|
page read and write
|
||
5360000
|
direct allocation
|
page read and write | page no cache
|
||
B847000
|
trusted library allocation
|
page read and write
|
||
13C49E90000
|
trusted library allocation
|
page read and write
|
||
2EEB1AA0000
|
heap
|
page read and write
|
||
7B2957B000
|
stack
|
page read and write
|
||
16FFE000
|
stack
|
page read and write
|
||
2C60000
|
direct allocation
|
page read and write
|
||
3060000
|
direct allocation
|
page read and write | page no cache
|
||
151FF000
|
stack
|
page read and write
|
||
2EEB1C3A000
|
heap
|
page read and write
|
||
B5DE000
|
stack
|
page read and write
|
||
1047000
|
heap
|
page read and write
|
||
10B0000
|
trusted library allocation
|
page read and write
|
||
10ABD000
|
stack
|
page read and write
|
||
DDBE000
|
stack
|
page read and write
|
||
1091000
|
heap
|
page read and write
|
||
102C000
|
heap
|
page read and write
|
||
2A925229000
|
heap
|
page read and write
|
||
13C4A063000
|
heap
|
page read and write
|
||
24017E71000
|
heap
|
page read and write
|
||
1430000
|
direct allocation
|
page read and write
|
||
7260000
|
direct allocation
|
page read and write | page no cache
|
||
3DE000
|
unkown
|
page readonly
|
||
132FE000
|
stack
|
page read and write
|
||
AF10000
|
direct allocation
|
page read and write
|
||
AC80000
|
direct allocation
|
page read and write
|
||
B000000
|
direct allocation
|
page read and write
|
||
1077000
|
heap
|
page read and write
|
||
133FF000
|
stack
|
page read and write
|
||
F6BE000
|
stack
|
page read and write
|
||
21A89413000
|
unkown
|
page read and write
|
||
105A000
|
heap
|
page read and write
|
||
239D385F000
|
heap
|
page read and write
|
||
7060000
|
direct allocation
|
page read and write | page no cache
|
||
109F000
|
heap
|
page read and write
|
||
121FF000
|
stack
|
page read and write
|
||
B82E000
|
trusted library allocation
|
page read and write
|
||
11A7E000
|
stack
|
page read and write
|
||
F59000
|
stack
|
page read and write
|
||
BBD0000
|
direct allocation
|
page read and write
|
||
5460000
|
direct allocation
|
page read and write | page no cache
|
||
13BBE000
|
stack
|
page read and write
|
||
13C447D0000
|
trusted library section
|
page read and write
|
||
C72E000
|
stack
|
page read and write
|
||
2A925213000
|
heap
|
page read and write
|
||
2EEB1C30000
|
heap
|
page read and write
|
||
D4FE000
|
stack
|
page read and write
|
||
10BBE000
|
stack
|
page read and write
|
||
1068000
|
heap
|
page read and write
|
||
17A3E000
|
stack
|
page read and write
|
||
3D4000
|
unkown
|
page readonly
|
||
2C60000
|
direct allocation
|
page read and write
|
||
128BF000
|
stack
|
page read and write
|
||
24017E66000
|
heap
|
page read and write
|
||
10D3E000
|
stack
|
page read and write
|
||
21CB2FD0000
|
trusted library allocation
|
page read and write
|
||
2A925255000
|
heap
|
page read and write
|
||
1067000
|
heap
|
page read and write
|
||
10AB000
|
heap
|
page read and write
|
||
2C60000
|
direct allocation
|
page read and write
|
||
1163D000
|
stack
|
page read and write
|
||
1303F000
|
stack
|
page read and write
|
||
2EEB1C46000
|
heap
|
page read and write
|
||
1042000
|
heap
|
page read and write
|
||
B843000
|
trusted library allocation
|
page read and write
|
||
2C60000
|
direct allocation
|
page read and write
|
||
118FE000
|
stack
|
page read and write
|
||
D3FE000
|
stack
|
page read and write
|
||
7160000
|
direct allocation
|
page read and write | page no cache
|
||
108B000
|
heap
|
page read and write
|
||
5160000
|
direct allocation
|
page read and write | page no cache
|
||
C890000
|
direct allocation
|
page read and write
|
||
C8EE000
|
stack
|
page read and write
|
||
3B60000
|
direct allocation
|
page read and write | page no cache
|
||
B840000
|
trusted library allocation
|
page read and write
|
||
C460000
|
direct allocation
|
page read and write
|
||
3960000
|
direct allocation
|
page read and write | page no cache
|
||
FE3E000
|
stack
|
page read and write
|
||
BBB0000
|
direct allocation
|
page read and write
|
||
B836000
|
trusted library allocation
|
page read and write
|
||
B84C000
|
trusted library allocation
|
page read and write
|
||
13C448FE000
|
heap
|
page read and write
|
||
3B0000
|
unkown
|
page readonly
|
||
B83C000
|
trusted library allocation
|
page read and write
|
||
1450000
|
direct allocation
|
page read and write
|
||
178BE000
|
stack
|
page read and write
|
||
AD80000
|
direct allocation
|
page read and write
|
||
B852000
|
trusted library allocation
|
page read and write
|
||
110BF000
|
stack
|
page read and write
|
||
7C4519C000
|
stack
|
page read and write
|
||
2C10000
|
heap
|
page read and write
|
||
B6DE000
|
stack
|
page read and write
|
||
2EEB1C02000
|
heap
|
page read and write
|
||
4260000
|
direct allocation
|
page read and write | page no cache
|
||
B843000
|
trusted library allocation
|
page read and write
|
||
5D60000
|
direct allocation
|
page read and write | page no cache
|
||
107D000
|
heap
|
page read and write
|
||
AF80000
|
direct allocation
|
page read and write
|
||
B030000
|
direct allocation
|
page read and write
|
||
1173D000
|
stack
|
page read and write
|
||
107FF000
|
stack
|
page read and write
|
||
1026000
|
heap
|
page read and write
|
||
BBB0000
|
direct allocation
|
page read and write
|
||
B0FF000
|
direct allocation
|
page read and write
|
||
B847000
|
trusted library allocation
|
page read and write
|
||
11FFF000
|
stack
|
page read and write
|
||
27C4E1B0000
|
remote allocation
|
page read and write
|
||
B13F000
|
direct allocation
|
page read and write
|
||
2A924FB0000
|
heap
|
page read and write
|
||
127BE000
|
stack
|
page read and write
|
||
239D3869000
|
heap
|
page read and write
|
||
13B7F000
|
stack
|
page read and write
|
||
B11F000
|
direct allocation
|
page read and write
|
||
AD20000
|
direct allocation
|
page read and write
|
||
2C60000
|
direct allocation
|
page read and write
|
||
137BF000
|
stack
|
page read and write
|
||
24018A30000
|
heap
|
page read and write
|
||
F0BE000
|
stack
|
page read and write
|
||
239D3908000
|
heap
|
page read and write
|
||
24018911000
|
heap
|
page read and write
|
||
1303F000
|
stack
|
page read and write
|
||
109D000
|
heap
|
page read and write
|
||
BF9E000
|
stack
|
page read and write
|
||
1460000
|
heap
|
page read and write
|
||
E3FE000
|
stack
|
page read and write
|
||
106BE000
|
stack
|
page read and write
|
||
B12F000
|
direct allocation
|
page read and write
|
||
1016000
|
heap
|
page read and write
|
||
B838000
|
trusted library allocation
|
page read and write
|
||
1044000
|
heap
|
page read and write
|
||
24017D90000
|
trusted library allocation
|
page read and write
|
||
5660000
|
direct allocation
|
page read and write | page no cache
|
||
E1BE000
|
stack
|
page read and write
|
There are 1698 hidden memdumps, click here to show them.