Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
magicline4nx_setup.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
initial sample
|
||
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\CertManager.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\MagicLine4NX.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\MagicLine4NX.exe.hmac
|
data
|
dropped
|
||
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\MagicLine4NXServices.exe
|
PE32 executable (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\cert\certmgr.exe
|
PE32 executable (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\cert\certutil.exe
|
PE32 executable (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\kc1pur8x.default\cert8.db
|
Berkeley DB 1.85 (Hash, version 2, native byte-order)
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\kc1pur8x.default\key3.db
|
Berkeley DB 1.85 (Hash, version 2, native byte-order)
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\kc1pur8x.default\secmod.db
|
Berkeley DB 1.85 (Hash, version 2, native byte-order)
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\tjbwzv1u.default-release\cert9.db
|
SQLite 3.x database, last written using SQLite version 3010002, page size 32768, file counter 7, database pages 7, cookie
0x5, schema 4, UTF-8, version-valid-for 7
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\tjbwzv1u.default-release\cert9.db-journal
|
SQLite Rollback Journal
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\tjbwzv1u.default-release\key4.db
|
SQLite 3.x database, last written using SQLite version 3010002, page size 32768, file counter 3, database pages 9, cookie
0x6, schema 4, UTF-8, version-valid-for 3
|
modified
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\tjbwzv1u.default-release\key4.db-journal
|
SQLite Rollback Journal
|
dropped
|
||
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\DSCToolkitV30-v3.4.2.20.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\ENG.ini
|
ISO-8859 text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\Images\Logo.bmp
|
PC bitmap, Windows 3.x format, 369 x 73 x 16, image size 54022, resolution 3779 x 3779 px/m, cbSize 54076, bits offset 54
|
dropped
|
||
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\IssuerOid.conf
|
ISO-8859 text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\IssuerOid_Eng.conf
|
ASCII text
|
dropped
|
||
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\KOR.ini
|
Generic INItialization configuration [Message]
|
dropped
|
||
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\MagicCrypto32V21.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\MagicLine4NX_Uninstall.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\cert\ImportCAtoFirefox.vbs
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\cert\ImportCAtoFirefoxCheck.vbs
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\cert\dreamsecurity-rootca.der
|
Certificate, Version=3 Certificate, Version=01
|
dropped
|
||
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\cert\dreamsecurity.com.der
|
Certificate, Version=3, Serial=009e5343085f93b442, not-valid-before=2015-09-03 04:11:52 GMT, not-valid-after=2035-08-28 04:11:52
GMT
|
dropped
|
||
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\cert\freebl3.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\cert\libnspr4.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\cert\libplc4.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\cert\libplds4.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\cert\nspr4.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\cert\nss3.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\cert\nssdbm3.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\cert\nssutil3.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\cert\plc4.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\cert\plds4.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\cert\smime3.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\cert\softokn3.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\cert\sqlite3.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\httptx.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\libeay32.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\mlnp_dreamsecurity_com.ca-bundle
|
PEM certificate
|
dropped
|
||
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\nsldap32v50.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\ssleay32.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\DreamSecurity\MagicLine4NX\logs\install-202211281523.log
|
ISO-8859 text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nst78C0.tmp\DumpLog.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nst78C0.tmp\KillProcDLL.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nst78C0.tmp\NsisUtil.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nst78C0.tmp\System.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nst78C0.tmp\nsExec.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nst78C0.tmp\nsProcess.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nst78C0.tmp\version.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\MagicLine4NX\MagicLine4NX.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Icon number=0,
Archive, ctime=Mon Mar 29 10:06:58 2021, mtime=Mon Nov 28 13:22:36 2022, atime=Mon Mar 29 10:06:58 2021, length=3753952, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\MagicLine4NX\Uninstall.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Icon number=0,
Archive, ctime=Mon Nov 28 13:22:36 2022, mtime=Mon Nov 28 13:22:36 2022, atime=Mon Nov 28 13:22:36 2022, length=113488, window=hide
|
dropped
|
||
C:\Windows\Logs\waasmedic\waasmedic.20221128_142248_759.etl
|
data
|
dropped
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\ConnectedDevicesPlatform\CDPGlobalSettings.cdp
|
Unicode text, UTF-8 (with BOM) text
|
dropped
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\ConnectedDevicesPlatform\L.user.cdp
|
Unicode text, UTF-8 (with BOM) text
|
modified
|
||
\Device\ConDrv
|
ASCII text, with CRLF line terminators
|
dropped
|
There are 48 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\magicline4nx_setup.exe
|
C:\Users\user\Desktop\magicline4nx_setup.exe
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im NTSMagicLineNP.exe
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im MagicLine4NX.exe
|
||
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\cert\certmgr.exe
|
"C:\Program Files (x86)\DreamSecurity\MagicLine4NX\cert\certmgr.exe" -add dreamsecurity-rootca.der -c -s -r localMachine Root
|
||
C:\Windows\SysWOW64\cscript.exe
|
cscript" "C:\Program Files (x86)\DreamSecurity\MagicLine4NX\cert\ImportCAtoFirefoxCheck.vbs" "MagicLine4NX
|
||
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\cert\certutil.exe
|
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\cert\certutil.exe" -L -d "C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\kc1pur8x.default"
-n "Dreamsecurity ROOT CA
|
||
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\cert\certutil.exe
|
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\cert\certutil.exe" -L -d sql:"C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\tjbwzv1u.default-release"
-n "Dreamsecurity ROOT CA
|
||
C:\Windows\SysWOW64\cscript.exe
|
cscript" "C:\Program Files (x86)\DreamSecurity\MagicLine4NX\cert\ImportCAtoFirefox.vbs" "MagicLine4NX
|
||
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\cert\certutil.exe
|
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\cert\certutil.exe" -A -n "Dreamsecurity ROOT CA" -i "C:\Program Files (x86)\DreamSecurity\MagicLine4NX\cert\dreamsecurity-rootca.der"
-t "CT,c,C" -d "C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\kc1pur8x.default
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k NetworkService -p -s DoSvc
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k NetworkService -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc
|
||
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\cert\certutil.exe
|
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\cert\certutil.exe" -A -n "Dreamsecurity ROOT CA" -i "C:\Program Files (x86)\DreamSecurity\MagicLine4NX\cert\dreamsecurity-rootca.der"
-t "CT,c,C" -d sql:"C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\tjbwzv1u.default-release
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s wscsvc
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\system32\svchost.exe -k wusvcs -p -s WaaSMedicSvc
|
||
C:\Windows\SysWOW64\netsh.exe
|
netsh advfirewall firewall delete rule name="MagicLine4NX" program="C:\Program Files (x86)\DreamSecurity\MagicLine4NX\MagicLine4NX.exe"
|
||
C:\Windows\SysWOW64\netsh.exe
|
netsh advfirewall firewall add rule name="MagicLine4NX" dir=in action=allow program="C:\Program Files (x86)\DreamSecurity\MagicLine4NX\MagicLine4NX.exe"
enable=yes
|
||
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\MagicLine4NX.exe
|
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\MagicLine4NX.exe
|
||
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\MagicLine4NXServices.exe
|
"C:\Program Files (x86)\DreamSecurity\MagicLine4NX\MagicLine4NXServices.exe" -install
|
||
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\MagicLine4NXServices.exe
|
C:\Program Files (x86)\DreamSecurity\MagicLine4NX\MagicLine4NXServices.exe
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C taskkill /f /im NTSMagicLineNP.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\sc.exe
|
sc stop MagicLine4NXSVC
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\sc.exe
|
sc delete MagicLine4NXSVC
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C taskkill /f /im MagicLine4NX.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\SgrmBroker.exe
|
C:\Windows\system32\SgrmBroker.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\CheckNetIsolation.exe
|
CheckNetIsolation LoopbackExempt -a -n="Microsoft.MicrosoftEdge_8wekyb3d8bbwe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\CheckNetIsolation.exe
|
CheckNetIsolation LoopbackExempt -a -n="Microsoft.Windows.Spartan_cw5n1h2txyewy"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\sc.exe
|
sc start MagicLine4NXSVC
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 36 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://www.openssl.org/support/faq.html....................rbwb.rndC:HOMERANDFILEPRNG
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/Routes/
|
unknown
|
||
http://rootca.kisa.or.kr/kor/hsm/hsm.jsp
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Routes/Driving
|
unknown
|
||
http://www.openssl.org/V
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/Traffic/Incidents/
|
unknown
|
||
https://t0.tiles.ditu.live.com/tiles/gen
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Routes/Walking
|
unknown
|
||
https://mobi.yessign.or.kr/mobisignInstall.htm
|
unknown
|
||
http://ids.smartcert.kr
|
unknown
|
||
http://www.openssl.org/support/faq.html
|
unknown
|
||
https://dev.ditu.live.com/mapcontrol/logging.ashx
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
|
unknown
|
||
http://pcro.mobilesign.net/mini_cert_install.html
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Transit/Schedules/
|
unknown
|
||
http://crl.thawte.com/ThawteTimestampingCA.crl0
|
unknown
|
||
https://activity.windows.comds
|
unknown
|
||
http://www.ubikey.co.kr/infovine/download.html1.4.0.2609100003www.dreamsecurity.comcenter.smartcert.
|
unknown
|
||
https://ecn.dev.virtualearth.net/mapcontrol/roadshield.ashx?bucket=
|
unknown
|
||
http://www.bingmapsportal.com
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Imagery/Copyright/
|
unknown
|
||
https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
|
unknown
|
||
http://cps.root-x1.letsencrypt.org0
|
unknown
|
||
http://rootca.kisa.or.kr/kor/hsm/hsm.jspPKCS#11.DriverDriver
|
unknown
|
||
https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
|
unknown
|
||
https://mobi.yessign.or.kr/mobisignInstall.htmsiteCode6070059serviceOptubikeyUbikeylParamUbikeyWPara
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/Transit/Stops/
|
unknown
|
||
http://ocsp.thawte.com0
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Routes/
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Traffic/Incidents/
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Transit/Stops/
|
unknown
|
||
https://dynamic.api.tiles.ditu.live.com/odvs/gri?pv=1&r=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
|
unknown
|
||
https://ecn.dev.virtualearth.net/REST/V1/MapControlConfiguration/native/
|
unknown
|
||
https://%s.xboxlive.com
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Locations
|
unknown
|
||
https://dev.ditu.live.com/REST/V1/MapControlConfiguration/native/
|
unknown
|
||
https://dev.virtualearth.net/mapcontrol/logging.ashx
|
unknown
|
||
https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/JsonFilter/VenueMaps/data/
|
unknown
|
||
http://nsis.sf.net/NSIS_Error
|
unknown
|
||
https://dynamic.t
|
unknown
|
||
https://www.thawte.com/cps0/
|
unknown
|
||
http://www.ubikey.co.kr/infovine/download.html
|
unknown
|
||
https://www.thawte.com/repository0W
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Routes/Transit
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/Transit/Schedules/
|
unknown
|
||
https://tiles.virtualearth.net/tiles/cmd/StreetSideBubbleMetaData?north=
|
unknown
|
||
https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
|
unknown
|
||
https://activity.windows.com
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/Locations
|
unknown
|
||
http://pcro.mobilesign.net/mini_cert_install.html679865F99D3C364AE1795B826BF546FAB3AC7343
|
unknown
|
||
https://%s.dnet.xboxlive.com
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/
|
unknown
|
||
https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
|
unknown
|
There are 54 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
192.168.2.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2
|
1406
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2
|
1607
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2
|
CurrentLevel
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3
|
1406
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3
|
1607
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3
|
CurrentLevel
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2
|
1406
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2
|
1607
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2
|
CurrentLevel
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3
|
1406
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3
|
1607
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3
|
CurrentLevel
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\0BAFEC00CC085C92F94FD1F2DECA2374C72EFFDA
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
|
cval
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
|
cval
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\MagicLine4NX
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\MagicLine4NX
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\MagicLine4NX
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\MagicLine4NX
|
DisplayIcon
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\MagicLine4NX
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\MagicLine4NX
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\NTSMagicLineNP
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\NTSMagicLineNP
|
DefaultIcon
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\NTSMagicLineNP
|
URL Protocol
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\NTSMagicLineNP\shell\open\command
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ProtocolExecute\NTSMagicLineNP
|
WarnOnOpen
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\NTSMagicLineNP
|
WarnOnOpen
|
||
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{D03745B1-EF05-4128-81FE-4EA062A6C468}
|
AppName
|
||
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{D03745B1-EF05-4128-81FE-4EA062A6C468}
|
AppPath
|
||
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{D03745B1-EF05-4128-81FE-4EA062A6C468}
|
Policy
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{D03745B1-EF05-4128-81FE-4EA062A6C468}
|
AppName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{D03745B1-EF05-4128-81FE-4EA062A6C468}
|
AppPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{D03745B1-EF05-4128-81FE-4EA062A6C468}
|
Policy
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
|
MagicLine4NX
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
|
PendingFileRenameOperations
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
|
PendingFileRenameOperations
|
||
HKEY_USERSS-1-5-20\Software\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage
|
MonthID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Orchestrator\Scheduler
|
UsoCrmScan
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Orchestrator\Scheduler
|
CleanupUsoLogs
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Orchestrator\Scheduler
|
SmartSchedulerValidationTask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Provider\Av\{D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
|
STATE
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Provider\Av\{D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
|
STATE
|
There are 32 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
501000
|
heap
|
page read and write
|
||
6E10E000
|
unkown
|
page readonly
|
||
5DFB000
|
trusted library allocation
|
page read and write
|
||
918000
|
unkown
|
page execute and read and write
|
||
58B0000
|
direct allocation
|
page read and write
|
||
553000
|
heap
|
page read and write
|
||
542000
|
heap
|
page read and write
|
||
61AF000
|
trusted library allocation
|
page read and write
|
||
565000
|
heap
|
page read and write
|
||
156F000
|
heap
|
page read and write
|
||
A52000
|
unkown
|
page execute and read and write
|
||
E5B000
|
heap
|
page read and write
|
||
1134000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
61F9000
|
trusted library allocation
|
page read and write
|
||
980E000
|
stack
|
page read and write
|
||
806000
|
unkown
|
page execute and read and write
|
||
E19000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
55F9000
|
direct allocation
|
page read and write
|
||
5650000
|
direct allocation
|
page execute and read and write
|
||
1F5000
|
heap
|
page read and write
|
||
2682B2C0000
|
heap
|
page read and write
|
||
6E190000
|
unkown
|
page readonly
|
||
1707000
|
heap
|
page read and write
|
||
55C0000
|
direct allocation
|
page execute and read and write
|
||
1F4000
|
heap
|
page read and write
|
||
61B7000
|
trusted library allocation
|
page read and write
|
||
E13000
|
heap
|
page read and write
|
||
1592000
|
heap
|
page read and write
|
||
1F5000
|
heap
|
page read and write
|
||
15593440000
|
heap
|
page read and write
|
||
17535658000
|
heap
|
page read and write
|
||
4450000
|
heap
|
page read and write
|
||
FAE000
|
unkown
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
A2D000
|
unkown
|
page execute and read and write
|
||
39FE000
|
stack
|
page read and write
|
||
ACF000
|
unkown
|
page execute and read and write
|
||
6E328000
|
unkown
|
page read and write
|
||
5840000
|
direct allocation
|
page execute and read and write
|
||
4130000
|
direct allocation
|
page execute and read and write
|
||
DF4000
|
heap
|
page read and write
|
||
168B1E80000
|
heap
|
page read and write
|
||
A1B000
|
heap
|
page read and write
|
||
1F4F000
|
stack
|
page read and write
|
||
2500000
|
heap
|
page read and write
|
||
155B000
|
heap
|
page read and write
|
||
3B0E000
|
stack
|
page read and write
|
||
10000000
|
unkown
|
page readonly
|
||
5870000
|
direct allocation
|
page execute and read and write
|
||
1F4000
|
heap
|
page read and write
|
||
F70000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
10001000
|
unkown
|
page execute read
|
||
1F4000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
5310000
|
direct allocation
|
page execute and read and write
|
||
9979DF8000
|
stack
|
page read and write
|
||
AD4F000
|
stack
|
page read and write
|
||
54F0000
|
direct allocation
|
page execute and read and write
|
||
E56000
|
heap
|
page read and write
|
||
35CF000
|
stack
|
page read and write
|
||
2DFE000
|
stack
|
page read and write
|
||
44BE000
|
stack
|
page read and write
|
||
15D7000
|
heap
|
page read and write
|
||
9FE000
|
heap
|
page read and write
|
||
771000
|
unkown
|
page execute and read and write
|
||
1F5000
|
heap
|
page read and write
|
||
168B2078000
|
heap
|
page read and write
|
||
5990000
|
direct allocation
|
page execute and read and write
|
||
1F4000
|
heap
|
page read and write
|
||
545000
|
heap
|
page read and write
|
||
5881000
|
trusted library allocation
|
page read and write
|
||
32F5000
|
heap
|
page read and write
|
||
52C0000
|
direct allocation
|
page execute and read and write
|
||
5DF8000
|
trusted library allocation
|
page read and write
|
||
5590000
|
direct allocation
|
page execute and read and write
|
||
1563000
|
heap
|
page read and write
|
||
117E000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
C8D000
|
stack
|
page read and write
|
||
52C0000
|
direct allocation
|
page execute and read and write
|
||
135E000
|
stack
|
page read and write
|
||
997A27D000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
A34E000
|
stack
|
page read and write
|
||
4520000
|
trusted library allocation
|
page read and write
|
||
4ED0000
|
direct allocation
|
page read and write
|
||
1310000
|
trusted library allocation
|
page read and write
|
||
6E318000
|
unkown
|
page readonly
|
||
2FA0000
|
unkown
|
page readonly
|
||
31D1000
|
heap
|
page read and write
|
||
6DF70000
|
unkown
|
page readonly
|
||
5E42000
|
direct allocation
|
page read and write
|
||
360E000
|
stack
|
page read and write
|
||
109D000
|
heap
|
page read and write
|
||
168B205C000
|
heap
|
page read and write
|
||
B4C000
|
unkown
|
page write copy
|
||
3E8F000
|
stack
|
page read and write
|
||
5A80000
|
direct allocation
|
page execute and read and write
|
||
6178000
|
trusted library allocation
|
page read and write
|
||
96E000
|
stack
|
page read and write
|
||
29B7000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
15EC000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1310000
|
trusted library allocation
|
page read and write
|
||
4454000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
58D0000
|
direct allocation
|
page execute and read and write
|
||
1F4000
|
heap
|
page read and write
|
||
384F000
|
stack
|
page read and write
|
||
395287B000
|
stack
|
page read and write
|
||
EDA000
|
heap
|
page read and write
|
||
C3C000
|
stack
|
page read and write
|
||
241FCC02000
|
trusted library allocation
|
page read and write
|
||
A10E000
|
stack
|
page read and write
|
||
160000
|
heap
|
page read and write
|
||
1F5000
|
heap
|
page read and write
|
||
1F5000
|
heap
|
page read and write
|
||
15C6000
|
heap
|
page read and write
|
||
5620000
|
direct allocation
|
page execute and read and write
|
||
1F4000
|
heap
|
page read and write
|
||
667E000
|
stack
|
page read and write
|
||
168B2061000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
52C0000
|
direct allocation
|
page execute and read and write
|
||
55B0000
|
direct allocation
|
page execute and read and write
|
||
62BE000
|
stack
|
page read and write
|
||
680000
|
heap
|
page read and write
|
||
E83000
|
heap
|
page read and write
|
||
1616000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
663E000
|
stack
|
page read and write
|
||
6E0F1000
|
unkown
|
page execute read
|
||
168B204A000
|
heap
|
page read and write
|
||
4EE1000
|
heap
|
page read and write
|
||
4EE1000
|
heap
|
page read and write
|
||
5670000
|
direct allocation
|
page execute and read and write
|
||
5C4E000
|
stack
|
page read and write
|
||
9FB000
|
heap
|
page read and write
|
||
DDC000
|
heap
|
page read and write
|
||
1324000
|
trusted library allocation
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
155932D0000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
6051000
|
unkown
|
page execute read
|
||
52C0000
|
direct allocation
|
page execute and read and write
|
||
4220000
|
direct allocation
|
page execute and read and write
|
||
1322000
|
trusted library allocation
|
page read and write
|
||
3150000
|
heap
|
page read and write
|
||
C166A7F000
|
stack
|
page read and write
|
||
154E000
|
heap
|
page read and write
|
||
2682B455000
|
heap
|
page read and write
|
||
6E4F6000
|
unkown
|
page read and write
|
||
A88E000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
346E000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1D1EF3B0000
|
heap
|
page read and write
|
||
52C0000
|
direct allocation
|
page execute and read and write
|
||
1411000
|
heap
|
page read and write
|
||
22E4000
|
trusted library allocation
|
page read and write
|
||
90CE000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
144F000
|
stack
|
page read and write
|
||
5C84000
|
heap
|
page read and write
|
||
1D1EF613000
|
heap
|
page read and write
|
||
55D000
|
heap
|
page read and write
|
||
175356F3000
|
heap
|
page read and write
|
||
1C18EFE000
|
stack
|
page read and write
|
||
4EE1000
|
heap
|
page read and write
|
||
43F0000
|
direct allocation
|
page execute and read and write
|
||
A24E000
|
stack
|
page read and write
|
||
DEB000
|
heap
|
page read and write
|
||
EB0000
|
heap
|
page read and write
|
||
5320000
|
direct allocation
|
page execute and read and write
|
||
8D6000
|
unkown
|
page execute and read and write
|
||
5143000
|
direct allocation
|
page read and write
|
||
29B0000
|
heap
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
C166F7C000
|
stack
|
page read and write
|
||
A1D000
|
heap
|
page read and write
|
||
29B3000
|
heap
|
page read and write
|
||
5640000
|
direct allocation
|
page execute and read and write
|
||
3851000
|
heap
|
page read and write
|
||
1368000
|
heap
|
page read and write
|
||
5929000
|
trusted library allocation
|
page read and write
|
||
5C88000
|
heap
|
page read and write
|
||
1150000
|
direct allocation
|
page read and write
|
||
E2A000
|
heap
|
page read and write
|
||
6A3E000
|
stack
|
page read and write
|
||
6E1BC000
|
unkown
|
page readonly
|
||
15ED000
|
heap
|
page read and write
|
||
DD8000
|
heap
|
page read and write
|
||
56E0000
|
direct allocation
|
page execute and read and write
|
||
DF4000
|
heap
|
page read and write
|
||
413F000
|
stack
|
page read and write
|
||
94D97C000
|
stack
|
page read and write
|
||
58EF000
|
trusted library allocation
|
page read and write
|
||
548F000
|
stack
|
page read and write
|
||
15F0000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
9FD000
|
heap
|
page read and write
|
||
31C3000
|
heap
|
page read and write
|
||
4D90000
|
direct allocation
|
page read and write
|
||
3229000
|
heap
|
page read and write
|
||
8E0000
|
heap
|
page read and write
|
||
6E1F4000
|
unkown
|
page readonly
|
||
1371000
|
heap
|
page read and write
|
||
DF4000
|
heap
|
page read and write
|
||
2A4E000
|
stack
|
page read and write
|
||
374E000
|
stack
|
page read and write
|
||
8D6000
|
unkown
|
page execute and read and write
|
||
1F4000
|
heap
|
page read and write
|
||
20000
|
trusted library allocation
|
page read and write
|
||
553000
|
heap
|
page read and write
|
||
8E4E000
|
stack
|
page read and write
|
||
100E000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
3209000
|
heap
|
page read and write
|
||
3666000
|
heap
|
page read and write
|
||
39CE000
|
stack
|
page read and write
|
||
A6D000
|
unkown
|
page execute and read and write
|
||
9FCE000
|
stack
|
page read and write
|
||
10FF000
|
stack
|
page read and write
|
||
4520000
|
trusted library allocation
|
page read and write
|
||
58CC000
|
trusted library allocation
|
page read and write
|
||
15D5000
|
heap
|
page read and write
|
||
5442000
|
unkown
|
page readonly
|
||
1120000
|
trusted library allocation
|
page read and write
|
||
6DF71000
|
unkown
|
page execute read
|
||
10002000
|
unkown
|
page readonly
|
||
5690000
|
direct allocation
|
page execute and read and write
|
||
2C2E000
|
stack
|
page read and write
|
||
6E19A000
|
unkown
|
page readonly
|
||
1033000
|
trusted library allocation
|
page read and write
|
||
56A000
|
heap
|
page read and write
|
||
6E1B1000
|
unkown
|
page execute read
|
||
1382000
|
heap
|
page read and write
|
||
10C000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
4ED0000
|
direct allocation
|
page read and write
|
||
15AE000
|
heap
|
page read and write
|
||
31E8000
|
heap
|
page read and write
|
||
4496000
|
trusted library allocation
|
page read and write
|
||
5295000
|
direct allocation
|
page read and write
|
||
858F000
|
stack
|
page read and write
|
||
168B2036000
|
heap
|
page read and write
|
||
54F000
|
stack
|
page read and write
|
||
4480000
|
trusted library allocation
|
page read and write
|
||
15D2000
|
heap
|
page read and write
|
||
944E000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
A75000
|
heap
|
page read and write
|
||
5780000
|
direct allocation
|
page execute and read and write
|
||
587000
|
heap
|
page read and write
|
||
4D95000
|
direct allocation
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
4120000
|
direct allocation
|
page execute and read and write
|
||
A06000
|
heap
|
page read and write
|
||
6E121000
|
unkown
|
page readonly
|
||
31B8000
|
heap
|
page read and write
|
||
616E000
|
unkown
|
page readonly
|
||
16CE000
|
heap
|
page read and write
|
||
9E4F000
|
stack
|
page read and write
|
||
ACD000
|
unkown
|
page execute and read and write
|
||
AFCE000
|
stack
|
page read and write
|
||
BA5000
|
unkown
|
page write copy
|
||
6050000
|
unkown
|
page readonly
|
||
15D1000
|
heap
|
page read and write
|
||
AD8E000
|
stack
|
page read and write
|
||
4350000
|
direct allocation
|
page execute and read and write
|
||
820000
|
unkown
|
page readonly
|
||
4534000
|
trusted library allocation
|
page read and write
|
||
140A000
|
heap
|
page read and write
|
||
8CD000
|
unkown
|
page execute and read and write
|
||
1F4000
|
heap
|
page read and write
|
||
5290000
|
trusted library allocation
|
page read and write
|
||
2510000
|
trusted library allocation
|
page read and write
|
||
4B0F000
|
stack
|
page read and write
|
||
2F9C000
|
stack
|
page read and write
|
||
4EE1000
|
heap
|
page read and write
|
||
414E000
|
stack
|
page read and write
|
||
F3B000
|
stack
|
page read and write
|
||
6112000
|
unkown
|
page readonly
|
||
1F4000
|
heap
|
page read and write
|
||
2682B502000
|
heap
|
page read and write
|
||
1408000
|
heap
|
page read and write
|
||
168B2062000
|
heap
|
page read and write
|
||
43D0000
|
direct allocation
|
page execute and read and write
|
||
2FB0000
|
heap
|
page read and write
|
||
F0E000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1530000
|
heap
|
page read and write
|
||
1753570F000
|
heap
|
page read and write
|
||
6E1C3000
|
unkown
|
page read and write
|
||
A47000
|
unkown
|
page execute and read and write
|
||
1F9B000
|
trusted library allocation
|
page read and write
|
||
13AB000
|
heap
|
page read and write
|
||
4D95000
|
direct allocation
|
page read and write
|
||
4C91000
|
heap
|
page read and write
|
||
3280000
|
heap
|
page read and write
|
||
2A3D000
|
stack
|
page read and write
|
||
1120000
|
heap
|
page read and write
|
||
54A0000
|
trusted library allocation
|
page read and write
|
||
17535840000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
EC0000
|
trusted library allocation
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
156F000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
15E1000
|
heap
|
page read and write
|
||
4480000
|
trusted library allocation
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
15CE000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
E0B000
|
heap
|
page read and write
|
||
4100000
|
direct allocation
|
page execute and read and write
|
||
5670000
|
direct allocation
|
page execute and read and write
|
||
2991000
|
heap
|
page read and write
|
||
915000
|
heap
|
page read and write
|
||
94D37C000
|
stack
|
page read and write
|
||
E62000
|
heap
|
page read and write
|
||
1324000
|
trusted library allocation
|
page read and write
|
||
A81000
|
heap
|
page read and write
|
||
167A000
|
heap
|
page read and write
|
||
8E8000
|
heap
|
page read and write
|
||
A3F000
|
heap
|
page read and write
|
||
4EE1000
|
heap
|
page read and write
|
||
10A84C90000
|
heap
|
page read and write
|
||
156C000
|
heap
|
page read and write
|
||
168B205B000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
170E000
|
stack
|
page read and write
|
||
A49000
|
heap
|
page read and write
|
||
5660000
|
direct allocation
|
page execute and read and write
|
||
1670000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
BDCE000
|
stack
|
page read and write
|
||
1528000
|
heap
|
page read and write
|
||
4480000
|
trusted library allocation
|
page read and write
|
||
C94E000
|
stack
|
page read and write
|
||
61A4000
|
trusted library allocation
|
page read and write
|
||
6E140000
|
unkown
|
page readonly
|
||
DF4000
|
heap
|
page read and write
|
||
3E4C000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
410F000
|
stack
|
page read and write
|
||
160C000
|
stack
|
page read and write
|
||
1470000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
4D99000
|
direct allocation
|
page read and write
|
||
15EF000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
10A84C41000
|
heap
|
page read and write
|
||
1377000
|
heap
|
page read and write
|
||
9D0E000
|
stack
|
page read and write
|
||
58A0000
|
heap
|
page read and write
|
||
1430000
|
heap
|
page read and write
|
||
5C80000
|
heap
|
page read and write
|
||
2682B45B000
|
heap
|
page read and write
|
||
6E1F8000
|
unkown
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
6E1FA000
|
unkown
|
page execute read
|
||
D8D000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
2D8E000
|
stack
|
page read and write
|
||
6E4E4000
|
unkown
|
page read and write
|
||
A58000
|
heap
|
page read and write
|
||
5E38000
|
trusted library allocation
|
page read and write
|
||
4ED5000
|
direct allocation
|
page read and write
|
||
DF4000
|
heap
|
page read and write
|
||
538000
|
heap
|
page read and write
|
||
4494000
|
trusted library allocation
|
page read and write
|
||
4EE1000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
371F6FE000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
168B2044000
|
heap
|
page read and write
|
||
31F7000
|
heap
|
page read and write
|
||
793E000
|
stack
|
page read and write
|
||
4EE1000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
241FC47B000
|
heap
|
page read and write
|
||
5700000
|
direct allocation
|
page execute and read and write
|
||
1F4000
|
heap
|
page read and write
|
||
2CFF000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
208F000
|
stack
|
page read and write
|
||
4B4E000
|
stack
|
page read and write
|
||
DCA000
|
heap
|
page read and write
|
||
AECE000
|
stack
|
page read and write
|
||
54CE000
|
stack
|
page read and write
|
||
56C0000
|
direct allocation
|
page execute and read and write
|
||
323D000
|
heap
|
page read and write
|
||
42E4000
|
heap
|
page read and write
|
||
4260000
|
trusted library allocation
|
page read and write
|
||
527F000
|
stack
|
page read and write
|
||
4EE1000
|
heap
|
page read and write
|
||
13E3000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
2B0F000
|
unkown
|
page read and write
|
||
2682B445000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
59D000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
474F000
|
stack
|
page read and write
|
||
94DAFF000
|
stack
|
page read and write
|
||
568000
|
heap
|
page read and write
|
||
589000
|
heap
|
page read and write
|
||
371EFDC000
|
stack
|
page read and write
|
||
4495000
|
trusted library allocation
|
page read and write
|
||
2790000
|
trusted library allocation
|
page read and write
|
||
12ED000
|
stack
|
page read and write
|
||
8F4000
|
unkown
|
page execute and read and write
|
||
934E000
|
stack
|
page read and write
|
||
A60E000
|
stack
|
page read and write
|
||
2450000
|
heap
|
page read and write
|
||
994E000
|
stack
|
page read and write
|
||
6E201000
|
unkown
|
page execute read
|
||
1F4000
|
heap
|
page read and write
|
||
52C0000
|
direct allocation
|
page execute and read and write
|
||
181C000
|
stack
|
page read and write
|
||
1247000
|
heap
|
page read and write
|
||
4110000
|
direct allocation
|
page execute and read and write
|
||
2E51000
|
trusted library allocation
|
page read and write
|
||
374E000
|
stack
|
page read and write
|
||
5B0E000
|
stack
|
page read and write
|
||
168B206D000
|
heap
|
page read and write
|
||
4ED5000
|
direct allocation
|
page read and write
|
||
6E0F0000
|
unkown
|
page readonly
|
||
A58000
|
heap
|
page read and write
|
||
1C81000
|
trusted library allocation
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
6E1D1000
|
unkown
|
page execute read
|
||
76BE000
|
stack
|
page read and write
|
||
40A0000
|
direct allocation
|
page execute and read and write
|
||
6E2F1000
|
unkown
|
page execute read
|
||
B33000
|
unkown
|
page write copy
|
||
5110000
|
heap
|
page read and write
|
||
107E000
|
stack
|
page read and write
|
||
B1C000
|
unkown
|
page execute and read and write
|
||
53F0000
|
direct allocation
|
page execute and read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1365000
|
heap
|
page read and write
|
||
F70000
|
trusted library allocation
|
page read and write
|
||
1D1EF650000
|
heap
|
page read and write
|
||
77FE000
|
stack
|
page read and write
|
||
1559343E000
|
heap
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
A3D000
|
heap
|
page read and write
|
||
54E000
|
heap
|
page read and write
|
||
3198000
|
heap
|
page read and write
|
||
10000000
|
unkown
|
page readonly
|
||
1F4000
|
heap
|
page read and write
|
||
525F000
|
stack
|
page read and write
|
||
58A6000
|
heap
|
page read and write
|
||
6DFF9000
|
unkown
|
page read and write
|
||
2682B500000
|
heap
|
page read and write
|
||
8CA000
|
unkown
|
page execute and read and write
|
||
73FE000
|
stack
|
page read and write
|
||
6E1C3000
|
unkown
|
page read and write
|
||
653E000
|
stack
|
page read and write
|
||
5E8C000
|
stack
|
page read and write
|
||
168B2093000
|
heap
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
E2F000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
59F0000
|
direct allocation
|
page execute and read and write
|
||
1F4000
|
heap
|
page read and write
|
||
3D4F000
|
stack
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
22CC000
|
trusted library allocation
|
page read and write
|
||
596000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
E62000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
31EC000
|
heap
|
page read and write
|
||
52C000
|
heap
|
page read and write
|
||
5760000
|
direct allocation
|
page execute and read and write
|
||
52C0000
|
direct allocation
|
page execute and read and write
|
||
4EE1000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1251000
|
heap
|
page read and write
|
||
5800000
|
direct allocation
|
page execute and read and write
|
||
30CF000
|
stack
|
page read and write
|
||
6E03D000
|
unkown
|
page read and write
|
||
6DFF9000
|
unkown
|
page read and write
|
||
1D1EF655000
|
heap
|
page read and write
|
||
830E000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
337F000
|
stack
|
page read and write
|
||
2ACE000
|
stack
|
page read and write
|
||
26CF000
|
stack
|
page read and write
|
||
5A40000
|
direct allocation
|
page execute and read and write
|
||
155F000
|
heap
|
page read and write
|
||
10A0000
|
trusted library allocation
|
page read and write
|
||
A59000
|
heap
|
page read and write
|
||
13E1000
|
heap
|
page read and write
|
||
1606000
|
heap
|
page read and write
|
||
8F8E000
|
stack
|
page read and write
|
||
1043000
|
trusted library allocation
|
page read and write
|
||
463F000
|
stack
|
page read and write
|
||
AC4000
|
unkown
|
page execute and read and write
|
||
6F3E000
|
stack
|
page read and write
|
||
AC4E000
|
stack
|
page read and write
|
||
371FBFD000
|
stack
|
page read and write
|
||
F0E000
|
heap
|
page read and write
|
||
A1D000
|
heap
|
page read and write
|
||
460F000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
10004000
|
unkown
|
page readonly
|
||
707E000
|
stack
|
page read and write
|
||
1134000
|
heap
|
page read and write
|
||
A76000
|
unkown
|
page execute and read and write
|
||
DDD000
|
heap
|
page read and write
|
||
71BE000
|
stack
|
page read and write
|
||
20CE000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
15593413000
|
heap
|
page read and write
|
||
15593C02000
|
trusted library allocation
|
page read and write
|
||
22DC000
|
trusted library allocation
|
page read and write
|
||
1F5000
|
heap
|
page read and write
|
||
CD0E000
|
stack
|
page read and write
|
||
A25000
|
unkown
|
page execute and read and write
|
||
5917000
|
trusted library allocation
|
page read and write
|
||
31BC000
|
heap
|
page read and write
|
||
591D000
|
trusted library allocation
|
page read and write
|
||
5890000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1134000
|
heap
|
page read and write
|
||
168B2063000
|
heap
|
page read and write
|
||
15593400000
|
heap
|
page read and write
|
||
B59000
|
unkown
|
page write copy
|
||
1F4000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
156D000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
52E000
|
heap
|
page read and write
|
||
94DBFF000
|
stack
|
page read and write
|
||
984E000
|
stack
|
page read and write
|
||
6C7E000
|
stack
|
page read and write
|
||
F50000
|
unkown
|
page readonly
|
||
31FC000
|
heap
|
page read and write
|
||
43B0000
|
direct allocation
|
page execute and read and write
|
||
90E000
|
stack
|
page read and write
|
||
86CE000
|
stack
|
page read and write
|
||
1BD0000
|
trusted library allocation
|
page read and write
|
||
4C91000
|
heap
|
page read and write
|
||
2AB0000
|
trusted library allocation
|
page read and write
|
||
2C0E000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
6000000
|
unkown
|
page readonly
|
||
1435000
|
heap
|
page read and write
|
||
10001000
|
unkown
|
page execute read
|
||
5D3C000
|
stack
|
page read and write
|
||
5A60000
|
direct allocation
|
page execute and read and write
|
||
6E1BD000
|
unkown
|
page readonly
|
||
1F4000
|
heap
|
page read and write
|
||
757D000
|
stack
|
page read and write
|
||
4480000
|
trusted library allocation
|
page read and write
|
||
C16707F000
|
stack
|
page read and write
|
||
27BD000
|
stack
|
page read and write
|
||
17535ED9000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
9979B7F000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
3AFF000
|
stack
|
page read and write
|
||
589000
|
heap
|
page read and write
|
||
49FF000
|
stack
|
page read and write
|
||
168B203F000
|
heap
|
page read and write
|
||
56A0000
|
direct allocation
|
page execute and read and write
|
||
55E0000
|
trusted library allocation
|
page read and write
|
||
103E000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
15AA000
|
heap
|
page read and write
|
||
4C8E000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
A9CE000
|
stack
|
page read and write
|
||
290000
|
trusted library allocation
|
page read and write
|
||
B0A000
|
unkown
|
page write copy
|
||
1446000
|
heap
|
page read and write
|
||
2B8E000
|
stack
|
page read and write
|
||
767F000
|
stack
|
page read and write
|
||
2F8F000
|
stack
|
page read and write
|
||
2DB0000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
58C0000
|
direct allocation
|
page execute and read and write
|
||
5600000
|
direct allocation
|
page execute and read and write
|
||
1F4000
|
heap
|
page read and write
|
||
4D90000
|
direct allocation
|
page read and write
|
||
1550000
|
heap
|
page read and write
|
||
2991000
|
heap
|
page read and write
|
||
A09000
|
heap
|
page read and write
|
||
327E000
|
stack
|
page read and write
|
||
162E000
|
stack
|
page read and write
|
||
6E32A000
|
unkown
|
page readonly
|
||
4EE1000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
541000
|
heap
|
page read and write
|
||
305B000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
4080000
|
direct allocation
|
page execute and read and write
|
||
1C88000
|
trusted library allocation
|
page read and write
|
||
A5B000
|
heap
|
page read and write
|
||
2614000
|
trusted library allocation
|
page read and write
|
||
1569000
|
heap
|
page read and write
|
||
6EFE000
|
stack
|
page read and write
|
||
56D0000
|
direct allocation
|
page execute and read and write
|
||
5430000
|
direct allocation
|
page execute and read and write
|
||
5B10000
|
direct allocation
|
page execute and read and write
|
||
A30000
|
heap
|
page read and write
|
||
168B208D000
|
heap
|
page read and write
|
||
371F3FF000
|
stack
|
page read and write
|
||
6E191000
|
unkown
|
page execute read
|
||
1D1EF700000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1F5000
|
heap
|
page read and write
|
||
6E261000
|
unkown
|
page execute read
|
||
477F000
|
stack
|
page read and write
|
||
5540000
|
direct allocation
|
page execute and read and write
|
||
156D000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
6194000
|
trusted library allocation
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1088000
|
unkown
|
page execute and read and write
|
||
9979F78000
|
stack
|
page read and write
|
||
168B206A000
|
heap
|
page read and write
|
||
54D000
|
heap
|
page read and write
|
||
17535EB6000
|
heap
|
page read and write
|
||
31B0000
|
heap
|
page read and write
|
||
2255000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
387F000
|
stack
|
page read and write
|
||
19AE000
|
stack
|
page read and write
|
||
6E1BD000
|
unkown
|
page readonly
|
||
17535EB9000
|
heap
|
page read and write
|
||
241FC42B000
|
heap
|
page read and write
|
||
428E000
|
stack
|
page read and write
|
||
52A000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
2430000
|
trusted library allocation
|
page read and write
|
||
4480000
|
trusted library allocation
|
page read and write
|
||
22C000
|
unkown
|
page readonly
|
||
1440000
|
heap
|
page read and write
|
||
4300000
|
heap
|
page read and write
|
||
4A0E000
|
stack
|
page read and write
|
||
42D0000
|
direct allocation
|
page execute and read and write
|
||
49CF000
|
stack
|
page read and write
|
||
DE8000
|
heap
|
page read and write
|
||
4494000
|
trusted library allocation
|
page read and write
|
||
A56000
|
unkown
|
page execute and read and write
|
||
6E1D1000
|
unkown
|
page execute read
|
||
2E10000
|
heap
|
page read and write
|
||
DBC000
|
stack
|
page read and write
|
||
15E4000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
B4C000
|
unkown
|
page read and write
|
||
1375000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
CB0000
|
heap
|
page read and write
|
||
6E2C1000
|
unkown
|
page execute read
|
||
2E40000
|
trusted library allocation
|
page read and write
|
||
6E12E000
|
unkown
|
page readonly
|
||
1380000
|
trusted library allocation
|
page read and write
|
||
22B4000
|
trusted library allocation
|
page read and write
|
||
B10000
|
heap
|
page read and write
|
||
334F000
|
stack
|
page read and write
|
||
2A8F000
|
stack
|
page read and write
|
||
4C80000
|
trusted library allocation
|
page read and write
|
||
10A8551A000
|
heap
|
page read and write
|
||
28FC000
|
stack
|
page read and write
|
||
DF4000
|
heap
|
page read and write
|
||
4060000
|
direct allocation
|
page execute and read and write
|
||
6E152000
|
unkown
|
page read and write
|
||
DF4000
|
heap
|
page read and write
|
||
3249000
|
heap
|
page read and write
|
||
34CE000
|
stack
|
page read and write
|
||
50D000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
5670000
|
direct allocation
|
page execute and read and write
|
||
3C3F000
|
stack
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
52B0000
|
direct allocation
|
page execute and read and write
|
||
4160000
|
direct allocation
|
page execute and read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
22EC000
|
trusted library allocation
|
page read and write
|
||
880E000
|
stack
|
page read and write
|
||
1591000
|
heap
|
page read and write
|
||
4EE2000
|
heap
|
page read and write
|
||
241FC45B000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
341E000
|
stack
|
page read and write
|
||
15593502000
|
heap
|
page read and write
|
||
4260000
|
trusted library allocation
|
page read and write
|
||
338E000
|
stack
|
page read and write
|
||
423E000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
2B946F9000
|
stack
|
page read and write
|
||
1374000
|
heap
|
page read and write
|
||
52C0000
|
direct allocation
|
page execute and read and write
|
||
1F4000
|
heap
|
page read and write
|
||
5470000
|
trusted library allocation
|
page read and write
|
||
6E1A8000
|
unkown
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
1592000
|
heap
|
page read and write
|
||
54D000
|
heap
|
page read and write
|
||
57FF000
|
stack
|
page read and write
|
||
17535DD0000
|
heap
|
page read and write
|
||
168B206E000
|
heap
|
page read and write
|
||
4D98000
|
direct allocation
|
page read and write
|
||
894E000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
3D8E000
|
stack
|
page read and write
|
||
F23000
|
heap
|
page read and write
|
||
9D8000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
6E1C5000
|
unkown
|
page readonly
|
||
4D93000
|
direct allocation
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
DB1000
|
heap
|
page read and write
|
||
DF4000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
17535717000
|
heap
|
page read and write
|
||
6E31D000
|
unkown
|
page readonly
|
||
158F000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
C00000
|
heap
|
page read and write
|
||
8A8E000
|
stack
|
page read and write
|
||
A0D000
|
heap
|
page read and write
|
||
3660000
|
heap
|
page read and write
|
||
15AA000
|
heap
|
page read and write
|
||
5140000
|
direct allocation
|
page read and write
|
||
29B0000
|
heap
|
page read and write
|
||
468E000
|
stack
|
page read and write
|
||
5913000
|
trusted library allocation
|
page read and write
|
||
310E000
|
stack
|
page read and write
|
||
4D95000
|
direct allocation
|
page read and write
|
||
4EE1000
|
heap
|
page read and write
|
||
3662000
|
heap
|
page read and write
|
||
168B2000000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
43A0000
|
direct allocation
|
page execute and read and write
|
||
2991000
|
heap
|
page read and write
|
||
2D36000
|
heap
|
page read and write
|
||
453E000
|
stack
|
page read and write
|
||
6030000
|
unkown
|
page readonly
|
||
883000
|
unkown
|
page execute and read and write
|
||
220E000
|
stack
|
page read and write
|
||
4480000
|
trusted library allocation
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
55CF000
|
stack
|
page read and write
|
||
22A000
|
unkown
|
page read and write
|
||
15C7000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
4EE1000
|
heap
|
page read and write
|
||
155C000
|
heap
|
page read and write
|
||
3FFF000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
A01000
|
heap
|
page read and write
|
||
52C0000
|
direct allocation
|
page execute and read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1F5000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
2BFE000
|
stack
|
page read and write
|
||
A77000
|
heap
|
page read and write
|
||
C70E000
|
stack
|
page read and write
|
||
BB4E000
|
stack
|
page read and write
|
||
A32000
|
unkown
|
page execute and read and write
|
||
59D0000
|
direct allocation
|
page execute and read and write
|
||
587000
|
heap
|
page read and write
|
||
6E4D4000
|
unkown
|
page write copy
|
||
326E000
|
stack
|
page read and write
|
||
4EE1000
|
heap
|
page read and write
|
||
15E3000
|
heap
|
page read and write
|
||
1324000
|
trusted library allocation
|
page read and write
|
||
1322000
|
trusted library allocation
|
page read and write
|
||
371F87F000
|
stack
|
page read and write
|
||
AEA000
|
unkown
|
page execute and read and write
|
||
884E000
|
stack
|
page read and write
|
||
5E7F000
|
trusted library allocation
|
page read and write
|
||
1A20000
|
heap
|
page read and write
|
||
9C0E000
|
stack
|
page read and write
|
||
338E000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
527000
|
heap
|
page read and write
|
||
D78E000
|
stack
|
page read and write
|
||
53B0000
|
direct allocation
|
page execute and read and write
|
||
413C000
|
stack
|
page read and write
|
||
4EE1000
|
heap
|
page read and write
|
||
3C0F000
|
stack
|
page read and write
|
||
1399000
|
heap
|
page read and write
|
||
A5CE000
|
stack
|
page read and write
|
||
241FC513000
|
heap
|
page read and write
|
||
562000
|
heap
|
page read and write
|
||
85CE000
|
stack
|
page read and write
|
||
5450000
|
direct allocation
|
page execute and read and write
|
||
1F4000
|
heap
|
page read and write
|
||
96CE000
|
stack
|
page read and write
|
||
5A50000
|
direct allocation
|
page execute and read and write
|
||
538E000
|
stack
|
page read and write
|
||
2B74000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
DCC000
|
heap
|
page read and write
|
||
2991000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
10020000
|
unkown
|
page read and write
|
||
3F90000
|
direct allocation
|
page execute and read and write
|
||
5416000
|
direct allocation
|
page read and write
|
||
31E5000
|
heap
|
page read and write
|
||
44D6000
|
heap
|
page read and write
|
||
6E010000
|
unkown
|
page readonly
|
||
1F5000
|
heap
|
page read and write
|
||
5370000
|
direct allocation
|
page execute and read and write
|
||
241FC470000
|
heap
|
page read and write
|
||
770000
|
unkown
|
page readonly
|
||
1F4000
|
heap
|
page read and write
|
||
5A90000
|
direct allocation
|
page execute and read and write
|
||
6E188000
|
unkown
|
page read and write
|
||
1134000
|
heap
|
page read and write
|
||
166C000
|
stack
|
page read and write
|
||
158F000
|
heap
|
page read and write
|
||
15B6000
|
heap
|
page read and write
|
||
2B75000
|
heap
|
page read and write
|
||
168B2067000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
A9E000
|
stack
|
page read and write
|
||
417E000
|
stack
|
page read and write
|
||
717E000
|
stack
|
page read and write
|
||
15C6000
|
heap
|
page read and write
|
||
2B941DD000
|
stack
|
page read and write
|
||
4ED3000
|
direct allocation
|
page read and write
|
||
1551000
|
heap
|
page read and write
|
||
D54E000
|
stack
|
page read and write
|
||
2991000
|
heap
|
page read and write
|
||
4520000
|
trusted library allocation
|
page read and write
|
||
80CE000
|
stack
|
page read and write
|
||
31DF000
|
heap
|
page read and write
|
||
1558000
|
heap
|
page read and write
|
||
808E000
|
stack
|
page read and write
|
||
543B000
|
unkown
|
page readonly
|
||
43C000
|
unkown
|
page readonly
|
||
44D3000
|
heap
|
page read and write
|
||
4D93000
|
direct allocation
|
page read and write
|
||
2B94A79000
|
stack
|
page read and write
|
||
29B0000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
54B0000
|
trusted library allocation
|
page read and write
|
||
17535E38000
|
heap
|
page read and write
|
||
5B50000
|
direct allocation
|
page execute and read and write
|
||
5BA0000
|
direct allocation
|
page execute and read and write
|
||
59A0000
|
direct allocation
|
page execute and read and write
|
||
15D8000
|
heap
|
page read and write
|
||
1538000
|
heap
|
page read and write
|
||
C166E7E000
|
stack
|
page read and write
|
||
1F8E000
|
stack
|
page read and write
|
||
168B2076000
|
heap
|
page read and write
|
||
55F6000
|
direct allocation
|
page read and write
|
||
35CF000
|
stack
|
page read and write
|
||
C166D7F000
|
stack
|
page read and write
|
||
4260000
|
trusted library allocation
|
page read and write
|
||
6E191000
|
unkown
|
page execute read
|
||
A9F000
|
unkown
|
page execute and read and write
|
||
5AC0000
|
direct allocation
|
page execute and read and write
|
||
8CD000
|
unkown
|
page execute and read and write
|
||
1591000
|
heap
|
page read and write
|
||
DE4000
|
heap
|
page read and write
|
||
4EE1000
|
heap
|
page read and write
|
||
A36000
|
unkown
|
page execute and read and write
|
||
BED0000
|
trusted library allocation
|
page read and write
|
||
2B948FE000
|
stack
|
page read and write
|
||
551000
|
heap
|
page read and write
|
||
13E6000
|
heap
|
page read and write
|
||
1358000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
427F000
|
stack
|
page read and write
|
||
6F5000
|
unkown
|
page readonly
|
||
67BE000
|
stack
|
page read and write
|
||
52C0000
|
trusted library allocation
|
page read and write
|
||
50E000
|
stack
|
page read and write
|
||
1447000
|
heap
|
page read and write
|
||
52C0000
|
direct allocation
|
page execute and read and write
|
||
7AF000
|
stack
|
page read and write
|
||
156F000
|
heap
|
page read and write
|
||
5AF0000
|
direct allocation
|
page execute and read and write
|
||
168B206B000
|
heap
|
page read and write
|
||
4EE1000
|
heap
|
page read and write
|
||
E34000
|
heap
|
page read and write
|
||
19F0000
|
trusted library allocation
|
page read and write
|
||
41B0000
|
direct allocation
|
page execute and read and write
|
||
43C0000
|
direct allocation
|
page execute and read and write
|
||
241FC3E0000
|
trusted library allocation
|
page read and write
|
||
4ED5000
|
direct allocation
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
B12000
|
unkown
|
page execute and read and write
|
||
A1E000
|
stack
|
page read and write
|
||
1324000
|
trusted library allocation
|
page read and write
|
||
1F5000
|
heap
|
page read and write
|
||
1F5000
|
heap
|
page read and write
|
||
844E000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
294F000
|
stack
|
page read and write
|
||
7A0000
|
trusted library allocation
|
page read and write
|
||
1627000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
168F000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
2E3F000
|
stack
|
page read and write
|
||
2682B413000
|
heap
|
page read and write
|
||
1310000
|
trusted library allocation
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
B41000
|
unkown
|
page read and write
|
||
5DE2000
|
direct allocation
|
page read and write
|
||
52E0000
|
heap
|
page read and write
|
||
171E000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
4496000
|
trusted library allocation
|
page read and write
|
||
4304000
|
heap
|
page read and write
|
||
1F5000
|
heap
|
page read and write
|
||
14FB000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
156F000
|
heap
|
page read and write
|
||
41F0000
|
direct allocation
|
page execute and read and write
|
||
6E2BA000
|
unkown
|
page readonly
|
||
DF0000
|
direct allocation
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
15EE000
|
heap
|
page read and write
|
||
D7D000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
5500000
|
direct allocation
|
page execute and read and write
|
||
2B9487C000
|
stack
|
page read and write
|
||
8EE000
|
stack
|
page read and write
|
||
6DFE3000
|
unkown
|
page readonly
|
||
587E000
|
stack
|
page read and write
|
||
56F0000
|
direct allocation
|
page execute and read and write
|
||
997A17E000
|
stack
|
page read and write
|
||
6E2CA000
|
unkown
|
page readonly
|
||
5970000
|
direct allocation
|
page execute and read and write
|
||
13E0000
|
heap
|
page read and write
|
||
790000
|
heap
|
page read and write
|
||
562C000
|
stack
|
page read and write
|
||
4384000
|
heap
|
page read and write
|
||
4480000
|
trusted library allocation
|
page read and write
|
||
143C000
|
heap
|
page read and write
|
||
BB2000
|
unkown
|
page read and write
|
||
870E000
|
stack
|
page read and write
|
||
2A60000
|
heap
|
page read and write
|
||
E34000
|
heap
|
page read and write
|
||
6E1D0000
|
unkown
|
page readonly
|
||
589000
|
heap
|
page read and write
|
||
4EE1000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
CB6000
|
heap
|
page read and write
|
||
3DE0000
|
trusted library allocation
|
page read and write
|
||
DB2000
|
heap
|
page read and write
|
||
2991000
|
heap
|
page read and write
|
||
4364000
|
heap
|
page read and write
|
||
6E0E2000
|
unkown
|
page readonly
|
||
1F4000
|
heap
|
page read and write
|
||
175356B5000
|
heap
|
page read and write
|
||
898E000
|
stack
|
page read and write
|
||
C98E000
|
stack
|
page read and write
|
||
90B000
|
unkown
|
page execute and read and write
|
||
C16727F000
|
stack
|
page read and write
|
||
59D0000
|
heap
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
5BC0000
|
direct allocation
|
page execute and read and write
|
||
A1D000
|
heap
|
page read and write
|
||
175355F0000
|
heap
|
page read and write
|
||
6E4F8000
|
unkown
|
page read and write
|
||
6E035000
|
unkown
|
page readonly
|
||
1F4000
|
heap
|
page read and write
|
||
A07000
|
heap
|
page read and write
|
||
1F5000
|
heap
|
page read and write
|
||
4B7E000
|
stack
|
page read and write
|
||
BC4E000
|
stack
|
page read and write
|
||
168B202B000
|
heap
|
page read and write
|
||
B3D000
|
stack
|
page read and write
|
||
2B50000
|
heap
|
page read and write
|
||
4A3E000
|
stack
|
page read and write
|
||
1D1EF600000
|
heap
|
page read and write
|
||
703E000
|
stack
|
page read and write
|
||
63FE000
|
stack
|
page read and write
|
||
1820000
|
trusted library allocation
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
12DF000
|
stack
|
page read and write
|
||
57AE000
|
stack
|
page read and write
|
||
958E000
|
stack
|
page read and write
|
||
5EF0000
|
trusted library allocation
|
page read and write
|
||
5670000
|
direct allocation
|
page execute and read and write
|
||
17535EBA000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
2BC4000
|
heap
|
page read and write
|
||
6E31D000
|
unkown
|
page readonly
|
||
10A84A90000
|
heap
|
page read and write
|
||
5B60000
|
direct allocation
|
page execute and read and write
|
||
1F4000
|
heap
|
page read and write
|
||
DFC000
|
heap
|
page read and write
|
||
15D1000
|
heap
|
page read and write
|
||
9EF000
|
stack
|
page read and write
|
||
54B000
|
heap
|
page read and write
|
||
4580000
|
heap
|
page read and write
|
||
5520000
|
direct allocation
|
page execute and read and write
|
||
BD8E000
|
stack
|
page read and write
|
||
1AE000
|
stack
|
page read and write
|
||
55F000
|
heap
|
page read and write
|
||
3F8E000
|
stack
|
page read and write
|
||
55F0000
|
direct allocation
|
page execute and read and write
|
||
11C0000
|
heap
|
page read and write
|
||
173C000
|
heap
|
page read and write
|
||
144B000
|
heap
|
page read and write
|
||
5900000
|
direct allocation
|
page execute and read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
15E1000
|
heap
|
page read and write
|
||
57F0000
|
direct allocation
|
page execute and read and write
|
||
15593427000
|
heap
|
page read and write
|
||
158E000
|
stack
|
page read and write
|
||
7E4E000
|
stack
|
page read and write
|
||
31D8000
|
heap
|
page read and write
|
||
6E328000
|
unkown
|
page read and write
|
||
4ED0000
|
direct allocation
|
page read and write
|
||
DBC000
|
stack
|
page read and write
|
||
54E000
|
heap
|
page read and write
|
||
3FE0000
|
direct allocation
|
page execute and read and write
|
||
154F000
|
stack
|
page read and write
|
||
1438000
|
heap
|
page read and write
|
||
17535DAF000
|
heap
|
page read and write
|
||
6E1C3000
|
unkown
|
page read and write
|
||
1E4E000
|
stack
|
page read and write
|
||
15D5000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1F5000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
58FC000
|
trusted library allocation
|
page read and write
|
||
168B2074000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1610000
|
direct allocation
|
page read and write
|
||
3620000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
289F000
|
stack
|
page read and write
|
||
3140000
|
heap
|
page read and write
|
||
4ED0000
|
direct allocation
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
6E2AB000
|
unkown
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
4390000
|
direct allocation
|
page execute and read and write
|
||
6E209000
|
unkown
|
page readonly
|
||
17535E71000
|
heap
|
page read and write
|
||
B3CE000
|
stack
|
page read and write
|
||
4190000
|
direct allocation
|
page execute and read and write
|
||
1603000
|
heap
|
page read and write
|
||
31B8000
|
heap
|
page read and write
|
||
168B2013000
|
heap
|
page read and write
|
||
17535900000
|
heap
|
page read and write
|
||
4260000
|
trusted library allocation
|
page read and write
|
||
15E2000
|
heap
|
page read and write
|
||
6D0000
|
unkown
|
page readonly
|
||
5E3B000
|
direct allocation
|
page read and write
|
||
34FE000
|
stack
|
page read and write
|
||
CBCF000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
4496000
|
trusted library allocation
|
page read and write
|
||
2FCE000
|
stack
|
page read and write
|
||
FA5000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1310000
|
trusted library allocation
|
page read and write
|
||
F03000
|
heap
|
page read and write
|
||
5DF0000
|
trusted library allocation
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1F5000
|
heap
|
page read and write
|
||
5300000
|
direct allocation
|
page execute and read and write
|
||
4330000
|
direct allocation
|
page execute and read and write
|
||
1F4000
|
heap
|
page read and write
|
||
63BE000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
52C0000
|
direct allocation
|
page execute and read and write
|
||
4150000
|
direct allocation
|
page execute and read and write
|
||
6E1A3000
|
unkown
|
page read and write
|
||
4520000
|
trusted library allocation
|
page read and write
|
||
A81000
|
heap
|
page read and write
|
||
1576000
|
heap
|
page read and write
|
||
1430000
|
heap
|
page read and write
|
||
371F57D000
|
stack
|
page read and write
|
||
5400000
|
direct allocation
|
page execute and read and write
|
||
1F4000
|
heap
|
page read and write
|
||
C166BFB000
|
stack
|
page read and write
|
||
A69000
|
heap
|
page read and write
|
||
4260000
|
direct allocation
|
page read and write
|
||
55E000
|
heap
|
page read and write
|
||
44FF000
|
stack
|
page read and write
|
||
DA8000
|
heap
|
page read and write
|
||
13BE000
|
heap
|
page read and write
|
||
4D97000
|
direct allocation
|
page read and write
|
||
323F000
|
stack
|
page read and write
|
||
E1B000
|
unkown
|
page execute and read and write
|
||
546000
|
heap
|
page read and write
|
||
B33000
|
unkown
|
page read and write
|
||
4494000
|
trusted library allocation
|
page read and write
|
||
31D8000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
15AA000
|
heap
|
page read and write
|
||
6E260000
|
unkown
|
page readonly
|
||
1520000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
30FF000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
14A0000
|
trusted library allocation
|
page read and write
|
||
5960000
|
direct allocation
|
page execute and read and write
|
||
575000
|
heap
|
page read and write
|
||
5976000
|
heap
|
page read and write
|
||
580000
|
trusted library allocation
|
page read and write
|
||
F3B000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
22D4000
|
trusted library allocation
|
page read and write
|
||
322E000
|
stack
|
page read and write
|
||
168B2068000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
68FE000
|
stack
|
page read and write
|
||
BAC000
|
unkown
|
page read and write
|
||
58EE000
|
trusted library allocation
|
page read and write
|
||
9ACE000
|
stack
|
page read and write
|
||
59B0000
|
direct allocation
|
page execute and read and write
|
||
BBF000
|
stack
|
page read and write
|
||
4DCE000
|
stack
|
page read and write
|
||
7A7E000
|
stack
|
page read and write
|
||
2B75000
|
heap
|
page read and write
|
||
2D32000
|
heap
|
page read and write
|
||
17535820000
|
heap
|
page read and write
|
||
C14E000
|
stack
|
page read and write
|
||
360E000
|
stack
|
page read and write
|
||
771000
|
unkown
|
page execute and write copy
|
||
35FF000
|
stack
|
page read and write
|
||
235F000
|
stack
|
page read and write
|
||
42E4000
|
heap
|
page read and write
|
||
E72000
|
heap
|
page read and write
|
||
1D1EF702000
|
heap
|
page read and write
|
||
5360000
|
trusted library allocation
|
page read and write
|
||
2BCF000
|
stack
|
page read and write
|
||
1559000
|
heap
|
page read and write
|
||
A4B000
|
unkown
|
page execute and read and write
|
||
221000
|
unkown
|
page execute read
|
||
9FB000
|
heap
|
page read and write
|
||
2991000
|
heap
|
page read and write
|
||
29AE000
|
heap
|
page read and write
|
||
5880000
|
direct allocation
|
page execute and read and write
|
||
D40000
|
trusted library allocation
|
page read and write
|
||
4ED3000
|
direct allocation
|
page read and write
|
||
27FD000
|
stack
|
page read and write
|
||
5130000
|
trusted library allocation
|
page read and write
|
||
17535E95000
|
heap
|
page read and write
|
||
6E160000
|
unkown
|
page readonly
|
||
1365000
|
trusted library allocation
|
page read and write
|
||
1753567A000
|
heap
|
page read and write
|
||
167D000
|
heap
|
page read and write
|
||
55F0000
|
direct allocation
|
page read and write
|
||
59C0000
|
direct allocation
|
page execute and read and write
|
||
5AFE000
|
stack
|
page read and write
|
||
5113000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
53D000
|
heap
|
page read and write
|
||
2FC0000
|
unkown
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
4520000
|
trusted library allocation
|
page read and write
|
||
3952C7E000
|
stack
|
page read and write
|
||
A50000
|
unkown
|
page execute and read and write
|
||
DF4000
|
heap
|
page read and write
|
||
5A00000
|
direct allocation
|
page execute and read and write
|
||
A4B000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1D1EFC02000
|
trusted library allocation
|
page read and write
|
||
4260000
|
direct allocation
|
page read and write
|
||
5400000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
5B20000
|
direct allocation
|
page execute and read and write
|
||
323E000
|
unkown
|
page read and write
|
||
E46000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
95CE000
|
stack
|
page read and write
|
||
DE1000
|
heap
|
page read and write
|
||
2E3F000
|
stack
|
page read and write
|
||
1210000
|
heap
|
page read and write
|
||
241FC43E000
|
heap
|
page read and write
|
||
A77000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
6E210000
|
unkown
|
page readonly
|
||
1322000
|
trusted library allocation
|
page read and write
|
||
1090000
|
heap
|
page read and write
|
||
13E0000
|
heap
|
page read and write
|
||
8D4000
|
unkown
|
page write copy
|
||
15FC000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
15593431000
|
heap
|
page read and write
|
||
5DF9000
|
direct allocation
|
page read and write
|
||
39BF000
|
stack
|
page read and write
|
||
261C000
|
trusted library allocation
|
page read and write
|
||
4370000
|
direct allocation
|
page execute and read and write
|
||
2682BA80000
|
trusted library allocation
|
page read and write
|
||
A7F000
|
heap
|
page read and write
|
||
4EE1000
|
heap
|
page read and write
|
||
6E17A000
|
unkown
|
page readonly
|
||
15EC000
|
heap
|
page read and write
|
||
4F50000
|
trusted library allocation
|
page read and write
|
||
1C71000
|
trusted library allocation
|
page read and write
|
||
54A0000
|
direct allocation
|
page execute and read and write
|
||
5930000
|
direct allocation
|
page execute and read and write
|
||
52F0000
|
direct allocation
|
page execute and read and write
|
||
1447000
|
heap
|
page read and write
|
||
4EE1000
|
heap
|
page read and write
|
||
7B7E000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1445000
|
heap
|
page read and write
|
||
4EE1000
|
heap
|
page read and write
|
||
43FE000
|
stack
|
page read and write
|
||
359F000
|
unkown
|
page read and write
|
||
1F5000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
2682B440000
|
heap
|
page read and write
|
||
13BF000
|
heap
|
page read and write
|
||
5950000
|
direct allocation
|
page execute and read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1D1EF66B000
|
heap
|
page read and write
|
||
13E4000
|
heap
|
page read and write
|
||
4EE1000
|
heap
|
page read and write
|
||
435000
|
unkown
|
page read and write
|
||
2A00000
|
heap
|
page read and write
|
||
A84E000
|
stack
|
page read and write
|
||
29B0000
|
heap
|
page read and write
|
||
CC0E000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
6E2CA000
|
unkown
|
page readonly
|
||
DF4000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
3770000
|
heap
|
page read and write
|
||
57C0000
|
direct allocation
|
page execute and read and write
|
||
56A0000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
592B000
|
trusted library allocation
|
page read and write
|
||
6E2BF000
|
unkown
|
page readonly
|
||
1F5000
|
heap
|
page read and write
|
||
A7F000
|
heap
|
page read and write
|
||
1E0F000
|
stack
|
page read and write
|
||
A4CE000
|
stack
|
page read and write
|
||
1310000
|
trusted library allocation
|
page read and write
|
||
6E31D000
|
unkown
|
page readonly
|
||
1F4000
|
heap
|
page read and write
|
||
34CE000
|
stack
|
page read and write
|
||
6E19C000
|
unkown
|
page readonly
|
||
5ED000
|
stack
|
page read and write
|
||
A1A000
|
heap
|
page read and write
|
||
6E1A2000
|
unkown
|
page read and write
|
||
1C79000
|
trusted library allocation
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
E83000
|
heap
|
page read and write
|
||
63E000
|
stack
|
page read and write
|
||
6E1D1000
|
unkown
|
page execute read
|
||
1408000
|
heap
|
page read and write
|
||
997A07B000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
241FC400000
|
heap
|
page read and write
|
||
4D90000
|
direct allocation
|
page read and write
|
||
2A68000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
2BDE000
|
stack
|
page read and write
|
||
1F5000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
388E000
|
stack
|
page read and write
|
||
EF0000
|
unkown
|
page execute and read and write
|
||
55D0000
|
direct allocation
|
page execute and read and write
|
||
4480000
|
trusted library allocation
|
page read and write
|
||
BA5000
|
unkown
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
5360000
|
direct allocation
|
page execute and read and write
|
||
F14000
|
heap
|
page read and write
|
||
4EE1000
|
heap
|
page read and write
|
||
1134000
|
heap
|
page read and write
|
||
6E176000
|
unkown
|
page read and write
|
||
5710000
|
direct allocation
|
page execute and read and write
|
||
1F5000
|
heap
|
page read and write
|
||
29B7000
|
heap
|
page read and write
|
||
6E12C000
|
unkown
|
page read and write
|
||
30D000
|
stack
|
page read and write
|
||
4320000
|
direct allocation
|
page execute and read and write
|
||
4340000
|
direct allocation
|
page execute and read and write
|
||
56A7000
|
heap
|
page read and write
|
||
4310000
|
direct allocation
|
page execute and read and write
|
||
40F0000
|
direct allocation
|
page execute and read and write
|
||
4210000
|
direct allocation
|
page execute and read and write
|
||
220000
|
unkown
|
page readonly
|
||
1F4000
|
heap
|
page read and write
|
||
B3A000
|
unkown
|
page write copy
|
||
171E000
|
stack
|
page read and write
|
||
168B2069000
|
heap
|
page read and write
|
||
4480000
|
trusted library allocation
|
page read and write
|
||
10A85518000
|
heap
|
page read and write
|
||
5860000
|
direct allocation
|
page execute and read and write
|
||
52C0000
|
direct allocation
|
page execute and read and write
|
||
5720000
|
direct allocation
|
page execute and read and write
|
||
1F4000
|
heap
|
page read and write
|
||
32F4000
|
heap
|
page read and write
|
||
4270000
|
direct allocation
|
page execute and read and write
|
||
E0B000
|
heap
|
page read and write
|
||
6E1A2000
|
unkown
|
page read and write
|
||
284E000
|
stack
|
page read and write
|
||
15D1000
|
heap
|
page read and write
|
||
2BE0000
|
heap
|
page read and write
|
||
32E3000
|
heap
|
page read and write
|
||
1610000
|
direct allocation
|
page read and write
|
||
17535702000
|
heap
|
page read and write
|
||
22BC000
|
trusted library allocation
|
page read and write
|
||
3666000
|
heap
|
page read and write
|
||
5C0E000
|
stack
|
page read and write
|
||
A70E000
|
stack
|
page read and write
|
||
3233000
|
heap
|
page read and write
|
||
530000
|
heap
|
page read and write
|
||
15D8000
|
heap
|
page read and write
|
||
19EE000
|
stack
|
page read and write
|
||
4494000
|
trusted library allocation
|
page read and write
|
||
72FE000
|
stack
|
page read and write
|
||
43A000
|
unkown
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
2BEF000
|
stack
|
page read and write
|
||
58B0000
|
direct allocation
|
page execute and read and write
|
||
110E000
|
stack
|
page read and write
|
||
5320000
|
trusted library allocation
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
A05000
|
heap
|
page read and write
|
||
13A7000
|
heap
|
page read and write
|
||
B63000
|
unkown
|
page read and write
|
||
E15000
|
heap
|
page read and write
|
||
4480000
|
trusted library allocation
|
page read and write
|
||
4230000
|
direct allocation
|
page execute and read and write
|
||
1F4000
|
heap
|
page read and write
|
||
4536000
|
trusted library allocation
|
page read and write
|
||
10A84C00000
|
heap
|
page read and write
|
||
29B3000
|
heap
|
page read and write
|
||
A1D000
|
heap
|
page read and write
|
||
E16000
|
heap
|
page read and write
|
||
54D000
|
heap
|
page read and write
|
||
43BF000
|
stack
|
page read and write
|
||
9D4E000
|
stack
|
page read and write
|
||
241FC290000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
4360000
|
heap
|
page read and write
|
||
3740000
|
trusted library allocation
|
page read and write
|
||
D28000
|
unkown
|
page execute and read and write
|
||
168B2802000
|
trusted library allocation
|
page read and write
|
||
33BE000
|
stack
|
page read and write
|
||
F2A000
|
heap
|
page read and write
|
||
A80000
|
unkown
|
page execute and read and write
|
||
6E0E0000
|
unkown
|
page read and write
|
||
2520000
|
trusted library allocation
|
page read and write
|
||
55E0000
|
direct allocation
|
page execute and read and write
|
||
168B205D000
|
heap
|
page read and write
|
||
6E1F4000
|
unkown
|
page readonly
|
||
C16717D000
|
stack
|
page read and write
|
||
371FAFE000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
168B2060000
|
heap
|
page read and write
|
||
600E000
|
trusted library allocation
|
page read and write
|
||
4D90000
|
trusted library allocation
|
page read and write
|
||
248E000
|
stack
|
page read and write
|
||
D64E000
|
stack
|
page read and write
|
||
3FD0000
|
direct allocation
|
page execute and read and write
|
||
10A84CEF000
|
heap
|
page read and write
|
||
B5C000
|
unkown
|
page read and write
|
||
2B9F000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
F4B000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1310000
|
trusted library allocation
|
page read and write
|
||
5920000
|
direct allocation
|
page execute and read and write
|
||
5B80000
|
direct allocation
|
page execute and read and write
|
||
1F5000
|
heap
|
page read and write
|
||
6B7E000
|
stack
|
page read and write
|
||
543F000
|
unkown
|
page read and write
|
||
1554000
|
heap
|
page read and write
|
||
430000
|
unkown
|
page read and write
|
||
2F00000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
6DBF000
|
stack
|
page read and write
|
||
591000
|
heap
|
page read and write
|
||
ADD000
|
unkown
|
page execute and read and write
|
||
570000
|
heap
|
page read and write
|
||
155A000
|
heap
|
page read and write
|
||
8C6000
|
unkown
|
page execute and read and write
|
||
E54000
|
heap
|
page read and write
|
||
371F97D000
|
stack
|
page read and write
|
||
5AA0000
|
direct allocation
|
page execute and read and write
|
||
68BE000
|
stack
|
page read and write
|
||
3EFE000
|
stack
|
page read and write
|
||
17535E71000
|
heap
|
page read and write
|
||
321C000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
4380000
|
direct allocation
|
page execute and read and write
|
||
D87000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
168B2102000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
5750000
|
direct allocation
|
page execute and read and write
|
||
1F4000
|
heap
|
page read and write
|
||
3209000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
10FE000
|
stack
|
page read and write
|
||
2DB6000
|
heap
|
page read and write
|
||
4400000
|
trusted library allocation
|
page read and write
|
||
59E0000
|
direct allocation
|
page execute and read and write
|
||
A74E000
|
stack
|
page read and write
|
||
5440000
|
direct allocation
|
page execute and read and write
|
||
1F4000
|
heap
|
page read and write
|
||
6E490000
|
unkown
|
page readonly
|
||
322A000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
6DFE3000
|
unkown
|
page readonly
|
||
DF4000
|
heap
|
page read and write
|
||
587000
|
heap
|
page read and write
|
||
143C000
|
heap
|
page read and write
|
||
FDE000
|
stack
|
page read and write
|
||
C24E000
|
stack
|
page read and write
|
||
BC8E000
|
stack
|
page read and write
|
||
10A84CFE000
|
heap
|
page read and write
|
||
4C7F000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1559344F000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1F5000
|
heap
|
page read and write
|
||
DB0000
|
remote allocation
|
page read and write
|
||
5F00000
|
trusted library allocation
|
page read and write
|
||
4E8000
|
heap
|
page read and write
|
||
677E000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
A1B000
|
heap
|
page read and write
|
||
5390000
|
trusted library allocation
|
page read and write
|
||
6E1C2000
|
unkown
|
page read and write
|
||
A74000
|
heap
|
page read and write
|
||
7DFE000
|
stack
|
page read and write
|
||
2B947FE000
|
stack
|
page read and write
|
||
6B3E000
|
stack
|
page read and write
|
||
AFA000
|
unkown
|
page execute and read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1618000
|
heap
|
page read and write
|
||
17535E7E000
|
heap
|
page read and write
|
||
707000
|
unkown
|
page read and write
|
||
4ED0000
|
direct allocation
|
page read and write
|
||
168B205E000
|
heap
|
page read and write
|
||
525000
|
heap
|
page read and write
|
||
15AC000
|
heap
|
page read and write
|
||
43C4000
|
heap
|
page read and write
|
||
997973B000
|
stack
|
page read and write
|
||
58C2000
|
trusted library allocation
|
page read and write
|
||
1440000
|
heap
|
page read and write
|
||
E73000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1559343A000
|
heap
|
page read and write
|
||
1001C000
|
unkown
|
page readonly
|
||
48E000
|
stack
|
page read and write
|
||
A48E000
|
stack
|
page read and write
|
||
6E1D0000
|
unkown
|
page readonly
|
||
15593455000
|
heap
|
page read and write
|
||
6E188000
|
unkown
|
page read and write
|
||
3850000
|
heap
|
page read and write
|
||
5916000
|
trusted library allocation
|
page read and write
|
||
B38E000
|
stack
|
page read and write
|
||
168B2042000
|
heap
|
page read and write
|
||
A0CE000
|
stack
|
page read and write
|
||
1C193FF000
|
stack
|
page read and write
|
||
3FA0000
|
direct allocation
|
page execute and read and write
|
||
260C000
|
trusted library allocation
|
page read and write
|
||
1D1EF666000
|
heap
|
page read and write
|
||
4EE1000
|
heap
|
page read and write
|
||
1553000
|
heap
|
page read and write
|
||
12F5000
|
stack
|
page read and write
|
||
9EE000
|
stack
|
page read and write
|
||
5740000
|
direct allocation
|
page execute and read and write
|
||
1433000
|
heap
|
page read and write
|
||
A8A000
|
unkown
|
page execute and read and write
|
||
5530000
|
direct allocation
|
page execute and read and write
|
||
1F5000
|
heap
|
page read and write
|
||
80E000
|
stack
|
page read and write
|
||
124C000
|
stack
|
page read and write
|
||
3247000
|
heap
|
page read and write
|
||
1402000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
B10E000
|
stack
|
page read and write
|
||
2780000
|
heap
|
page read and write
|
||
54C0000
|
direct allocation
|
page execute and read and write
|
||
E76000
|
heap
|
page read and write
|
||
E60000
|
heap
|
page read and write
|
||
113E000
|
stack
|
page read and write
|
||
AE8E000
|
stack
|
page read and write
|
||
4280000
|
direct allocation
|
page execute and read and write
|
||
5650000
|
direct allocation
|
page execute and read and write
|
||
2FB0000
|
unkown
|
page readonly
|
||
1F4000
|
heap
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
58E0000
|
direct allocation
|
page execute and read and write
|
||
1385000
|
heap
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
10A85584000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
2991000
|
heap
|
page read and write
|
||
10EF000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
CA8E000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
E60000
|
heap
|
page read and write
|
||
3D7F000
|
stack
|
page read and write
|
||
DE5000
|
heap
|
page read and write
|
||
570000
|
heap
|
page read and write
|
||
848E000
|
stack
|
page read and write
|
||
2C57000
|
heap
|
page read and write
|
||
990000
|
trusted library allocation
|
page read and write
|
||
1134000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
5350000
|
trusted library allocation
|
page read and write
|
||
324E000
|
stack
|
page read and write
|
||
4D90000
|
direct allocation
|
page read and write
|
||
A3F000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
B3A000
|
unkown
|
page read and write
|
||
464E000
|
stack
|
page read and write
|
||
17535688000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
1F4000
|
heap
|
page read and write
|
||
9979CFE000
|
stack
|
page read and write
|
||
241FC47E000
|
heap
|
page read and write
|
||
B64E000
|
stack
|
page read and write
|
||
15D4000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
168B206C000
|
heap
|
page read and write
|
||
220E000
|
stack
|
page read and write
|
||
6E4F4000
|
unkown
|
page read and write
|
||
29B2000
|
heap
|
page read and write
|
||
E60000
|
heap
|
page read and write
|
||
2682B513000
|
heap
|
page read and write
|
||
371F67E000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
B14E000
|
stack
|
page read and write
|
||
4D93000
|
direct allocation
|
page read and write
|
||
521000
|
heap
|
page read and write
|
||
577D000
|
stack
|
page read and write
|
||
E1C000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
A3F000
|
heap
|
page read and write
|
||
6E2E8000
|
unkown
|
page read and write
|
||
81CE000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
234E000
|
stack
|
page read and write
|
||
1442000
|
heap
|
page read and write
|
||
4EE1000
|
heap
|
page read and write
|
||
168B204D000
|
heap
|
page read and write
|
||
4EE1000
|
heap
|
page read and write
|
||
C8E000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
3952B7E000
|
stack
|
page read and write
|
||
478E000
|
stack
|
page read and write
|
||
57D0000
|
direct allocation
|
page execute and read and write
|
||
168B2046000
|
heap
|
page read and write
|
||
376F000
|
stack
|
page read and write
|
||
AACE000
|
stack
|
page read and write
|
||
8BCF000
|
stack
|
page read and write
|
||
4140000
|
direct allocation
|
page execute and read and write
|
||
5893000
|
heap
|
page read and write
|
||
DC9000
|
heap
|
page read and write
|
||
4EE1000
|
heap
|
page read and write
|
||
2BC0000
|
heap
|
page read and write
|
||
6E185000
|
unkown
|
page readonly
|
||
570000
|
heap
|
page read and write
|
||
64FE000
|
stack
|
page read and write
|
||
1F5000
|
heap
|
page read and write
|
||
6280000
|
trusted library allocation
|
page read and write
|
||
31E2000
|
heap
|
page read and write
|
||
5330000
|
direct allocation
|
page execute and read and write
|
||
10A84AA0000
|
heap
|
page read and write
|
||
1610000
|
direct allocation
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
E2B000
|
heap
|
page read and write
|
||
AB0E000
|
stack
|
page read and write
|
||
EB0000
|
heap
|
page read and write
|
||
910000
|
heap
|
page read and write
|
||
4180000
|
direct allocation
|
page execute and read and write
|
||
866000
|
unkown
|
page execute and read and write
|
||
451E000
|
stack
|
page read and write
|
||
50000
|
trusted library allocation
|
page read and write
|
||
21CE000
|
stack
|
page read and write
|
||
31DD000
|
heap
|
page read and write
|
||
E90000
|
heap
|
page read and write
|
||
B25000
|
unkown
|
page write copy
|
||
1F4000
|
heap
|
page read and write
|
||
B5C000
|
unkown
|
page write copy
|
||
5B90000
|
direct allocation
|
page execute and read and write
|
||
1F4000
|
heap
|
page read and write
|
||
4040000
|
direct allocation
|
page execute and read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1180000
|
heap
|
page read and write
|
||
241FC48D000
|
heap
|
page read and write
|
||
51D000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
4290000
|
direct allocation
|
page execute and read and write
|
||
44D0000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
9979E7E000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1548000
|
heap
|
page read and write
|
||
B60E000
|
stack
|
page read and write
|
||
175356AC000
|
heap
|
page read and write
|
||
17535650000
|
heap
|
page read and write
|
||
DD5000
|
heap
|
page read and write
|
||
BB0E000
|
stack
|
page read and write
|
||
1310000
|
trusted library allocation
|
page read and write
|
||
6DFE000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
5830000
|
direct allocation
|
page execute and read and write
|
||
B24F000
|
stack
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
6E1ED000
|
unkown
|
page readonly
|
||
6F5000
|
unkown
|
page readonly
|
||
D68E000
|
stack
|
page read and write
|
||
43C0000
|
heap
|
page read and write
|
||
2E20000
|
trusted library allocation
|
page read and write
|
||
FED000
|
unkown
|
page read and write
|
||
2991000
|
heap
|
page read and write
|
||
143C000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
8C1000
|
unkown
|
page execute and read and write
|
||
F16000
|
heap
|
page read and write
|
||
5DC9000
|
direct allocation
|
page read and write
|
||
A77000
|
heap
|
page read and write
|
||
5D9F000
|
direct allocation
|
page read and write
|
||
1218000
|
heap
|
page read and write
|
||
15C6000
|
heap
|
page read and write
|
||
562000
|
heap
|
page read and write
|
||
A85000
|
unkown
|
page execute and read and write
|
||
1F4000
|
heap
|
page read and write
|
||
C6CE000
|
stack
|
page read and write
|
||
168B208E000
|
heap
|
page read and write
|
||
15C8000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
52C0000
|
direct allocation
|
page execute and read and write
|
||
347B000
|
heap
|
page read and write
|
||
540000
|
heap
|
page read and write
|
||
A81000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
10A84CD5000
|
heap
|
page read and write
|
||
312E000
|
stack
|
page read and write
|
||
320F000
|
stack
|
page read and write
|
||
168B1EE0000
|
heap
|
page read and write
|
||
1C00000
|
heap
|
page read and write
|
||
6CBE000
|
stack
|
page read and write
|
||
2BA0000
|
heap
|
page read and write
|
||
94E07F000
|
stack
|
page read and write
|
||
4EE1000
|
heap
|
page read and write
|
||
52E0000
|
direct allocation
|
page execute and read and write
|
||
5C3C000
|
stack
|
page read and write
|
||
42C0000
|
direct allocation
|
page execute and read and write
|
||
10A84B00000
|
heap
|
page read and write
|
||
83C000
|
stack
|
page read and write
|
||
E33000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
5C50000
|
direct allocation
|
page read and write
|
||
AC0E000
|
stack
|
page read and write
|
||
4250000
|
direct allocation
|
page execute and read and write
|
||
6E2DB000
|
unkown
|
page read and write
|
||
5670000
|
direct allocation
|
page execute and read and write
|
||
E1F000
|
heap
|
page read and write
|
||
4D90000
|
direct allocation
|
page read and write
|
||
2682B42B000
|
heap
|
page read and write
|
||
4EE1000
|
heap
|
page read and write
|
||
A06000
|
heap
|
page read and write
|
||
25CE000
|
stack
|
page read and write
|
||
12FD000
|
stack
|
page read and write
|
||
15B6000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
5560000
|
direct allocation
|
page execute and read and write
|
||
1F4000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
403E000
|
stack
|
page read and write
|
||
2DC7000
|
heap
|
page read and write
|
||
4EE1000
|
heap
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
31EE000
|
heap
|
page read and write
|
||
BAC000
|
unkown
|
page write copy
|
||
47BE000
|
stack
|
page read and write
|
||
1753570B000
|
heap
|
page read and write
|
||
34BF000
|
stack
|
page read and write
|
||
22E4000
|
trusted library allocation
|
page read and write
|
||
41C0000
|
direct allocation
|
page execute and read and write
|
||
BECE000
|
stack
|
page read and write
|
||
13A0000
|
heap
|
page read and write
|
||
8D0E000
|
stack
|
page read and write
|
||
CD10000
|
trusted library allocation
|
page read and write
|
||
241FC502000
|
heap
|
page read and write
|
||
9F5000
|
heap
|
page read and write
|
||
E10000
|
heap
|
page read and write
|
||
1572000
|
heap
|
page read and write
|
||
5D8C000
|
stack
|
page read and write
|
||
E70000
|
heap
|
page read and write
|
||
5390000
|
direct allocation
|
page execute and read and write
|
||
4ED0000
|
direct allocation
|
page read and write
|
||
2CFE000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
6E4E6000
|
unkown
|
page write copy
|
||
A81000
|
heap
|
page read and write
|
||
5B70000
|
direct allocation
|
page execute and read and write
|
||
5B5E000
|
direct allocation
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
A3D000
|
heap
|
page read and write
|
||
15EE000
|
heap
|
page read and write
|
||
4EE1000
|
heap
|
page read and write
|
||
E70000
|
heap
|
page read and write
|
||
7CFE000
|
stack
|
page read and write
|
||
383E000
|
unkown
|
page read and write
|
||
707000
|
unkown
|
page read and write
|
||
6E141000
|
unkown
|
page execute read
|
||
5370000
|
direct allocation
|
page read and write
|
||
5AB0000
|
direct allocation
|
page execute and read and write
|
||
1F4000
|
heap
|
page read and write
|
||
5A10000
|
direct allocation
|
page execute and read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
54E0000
|
direct allocation
|
page execute and read and write
|
||
5A30000
|
direct allocation
|
page execute and read and write
|
||
29AA000
|
heap
|
page read and write
|
||
2E9D000
|
stack
|
page read and write
|
||
5BB0000
|
direct allocation
|
page execute and read and write
|
||
5AE0000
|
direct allocation
|
page execute and read and write
|
||
17535E74000
|
heap
|
page read and write
|
||
168B2085000
|
heap
|
page read and write
|
||
42E0000
|
direct allocation
|
page execute and read and write
|
||
1F4000
|
heap
|
page read and write
|
||
EBD000
|
stack
|
page read and write
|
||
B59000
|
unkown
|
page read and write
|
||
E5B000
|
heap
|
page read and write
|
||
5850000
|
trusted library allocation
|
page read and write
|
||
8D4E000
|
stack
|
page read and write
|
||
1610000
|
direct allocation
|
page read and write
|
||
32CF000
|
stack
|
page read and write
|
||
155932E0000
|
heap
|
page read and write
|
||
6E327000
|
unkown
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
72BE000
|
stack
|
page read and write
|
||
58E2000
|
trusted library allocation
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
920E000
|
stack
|
page read and write
|
||
5510000
|
direct allocation
|
page execute and read and write
|
||
2682B2B0000
|
heap
|
page read and write
|
||
1D1EF644000
|
heap
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
D30000
|
heap
|
page read and write
|
||
AC9000
|
unkown
|
page execute and read and write
|
||
3C7E000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
6E301000
|
unkown
|
page execute read
|
||
4EE1000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
10A85402000
|
heap
|
page read and write
|
||
52C0000
|
direct allocation
|
page execute and read and write
|
||
168B1FE0000
|
trusted library allocation
|
page read and write
|
||
1C192FE000
|
stack
|
page read and write
|
||
2454000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
D5C000
|
stack
|
page read and write
|
||
280F000
|
stack
|
page read and write
|
||
4480000
|
trusted library allocation
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1584000
|
heap
|
page read and write
|
||
6E29A000
|
unkown
|
page readonly
|
||
1F4000
|
heap
|
page read and write
|
||
438F000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
4520000
|
trusted library allocation
|
page read and write
|
||
6E167000
|
unkown
|
page write copy
|
||
2D30000
|
heap
|
page read and write
|
||
743E000
|
stack
|
page read and write
|
||
12FF000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
6E22A000
|
unkown
|
page execute read
|
||
2A7C000
|
stack
|
page read and write
|
||
40D0000
|
direct allocation
|
page execute and read and write
|
||
1D1EF5E0000
|
trusted library allocation
|
page read and write
|
||
6E2EB000
|
unkown
|
page read and write
|
||
11BD000
|
heap
|
page read and write
|
||
1B8F000
|
stack
|
page read and write
|
||
9E8E000
|
stack
|
page read and write
|
||
6E28F000
|
unkown
|
page readonly
|
||
1F4000
|
heap
|
page read and write
|
||
3FF0000
|
direct allocation
|
page execute and read and write
|
||
12FB000
|
stack
|
page read and write
|
||
6E327000
|
unkown
|
page read and write
|
||
4240000
|
direct allocation
|
page execute and read and write
|
||
C10E000
|
stack
|
page read and write
|
||
EF0000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1322000
|
trusted library allocation
|
page read and write
|
||
A2F000
|
stack
|
page read and write
|
||
3FCF000
|
stack
|
page read and write
|
||
C84E000
|
stack
|
page read and write
|
||
13E0000
|
heap
|
page read and write
|
||
A75000
|
heap
|
page read and write
|
||
230F000
|
stack
|
page read and write
|
||
A15000
|
heap
|
page read and write
|
||
9AE000
|
stack
|
page read and write
|
||
4200000
|
direct allocation
|
page execute and read and write
|
||
5910000
|
direct allocation
|
page execute and read and write
|
||
1F4000
|
heap
|
page read and write
|
||
4430000
|
heap
|
page read and write
|
||
94DF7B000
|
stack
|
page read and write
|
||
371F9FE000
|
stack
|
page read and write
|
||
DC7000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
519E000
|
stack
|
page read and write
|
||
570000
|
heap
|
page read and write
|
||
31B4000
|
heap
|
page read and write
|
||
43E0000
|
direct allocation
|
page execute and read and write
|
||
17535E70000
|
heap
|
page read and write
|
||
6E140000
|
unkown
|
page readonly
|
||
E57000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
998E000
|
stack
|
page read and write
|
||
930E000
|
stack
|
page read and write
|
||
168B2087000
|
heap
|
page read and write
|
||
4380000
|
heap
|
page read and write
|
||
4C4F000
|
stack
|
page read and write
|
||
5570000
|
direct allocation
|
page execute and read and write
|
||
58ED000
|
trusted library allocation
|
page read and write
|
||
9A8E000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
298E000
|
stack
|
page read and write
|
||
4520000
|
trusted library allocation
|
page read and write
|
||
A76000
|
unkown
|
page execute and read and write
|
||
1322000
|
trusted library allocation
|
page read and write
|
||
54D0000
|
direct allocation
|
page execute and read and write
|
||
17535EB9000
|
heap
|
page read and write
|
||
109A000
|
heap
|
page read and write
|
||
4EE1000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
348F000
|
stack
|
page read and write
|
||
3A3D000
|
stack
|
page read and write
|
||
35CF000
|
stack
|
page read and write
|
||
CD0000
|
heap
|
page read and write
|
||
548000
|
heap
|
page read and write
|
||
4170000
|
direct allocation
|
page execute and read and write
|
||
19A000
|
stack
|
page read and write
|
||
15D2000
|
heap
|
page read and write
|
||
1FAB000
|
trusted library allocation
|
page read and write
|
||
48BF000
|
stack
|
page read and write
|
||
258D000
|
stack
|
page read and write
|
||
700000
|
trusted library allocation
|
page read and write
|
||
7F4E000
|
stack
|
page read and write
|
||
1134000
|
heap
|
page read and write
|
||
5D0000
|
trusted library allocation
|
page read and write
|
||
3155000
|
heap
|
page read and write
|
||
6F5000
|
unkown
|
page readonly
|
||
1F4000
|
heap
|
page read and write
|
||
17535EA6000
|
heap
|
page read and write
|
||
EC0000
|
trusted library allocation
|
page read and write
|
||
10A84D13000
|
heap
|
page read and write
|
||
6002000
|
trusted library allocation
|
page read and write
|
||
DF9000
|
heap
|
page read and write
|
||
DDC000
|
heap
|
page read and write
|
||
168B204A000
|
heap
|
page read and write
|
||
56B0000
|
direct allocation
|
page execute and read and write
|
||
22CA000
|
trusted library allocation
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
118D000
|
heap
|
page read and write
|
||
13C0000
|
heap
|
page read and write
|
||
5810000
|
direct allocation
|
page execute and read and write
|
||
4D95000
|
direct allocation
|
page read and write
|
||
1583000
|
heap
|
page read and write
|
||
1C18E7B000
|
stack
|
page read and write
|
||
821000
|
unkown
|
page execute and write copy
|
||
3DBE000
|
stack
|
page read and write
|
||
1D1EF410000
|
heap
|
page read and write
|
||
A74000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1310000
|
trusted library allocation
|
page read and write
|
||
6E200000
|
unkown
|
page readonly
|
||
1F5000
|
heap
|
page read and write
|
||
5470000
|
direct allocation
|
page execute and read and write
|
||
6E28A000
|
unkown
|
page readonly
|
||
1134000
|
heap
|
page read and write
|
||
1950000
|
heap
|
page read and write
|
||
12FB000
|
stack
|
page read and write
|
||
5ACF000
|
stack
|
page read and write
|
||
5DD0000
|
direct allocation
|
page read and write
|
||
53D000
|
heap
|
page read and write
|
||
6E0DF000
|
unkown
|
page write copy
|
||
1F4000
|
heap
|
page read and write
|
||
2B94AFF000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
DBC000
|
stack
|
page read and write
|
||
6001000
|
unkown
|
page execute read
|
||
A7F000
|
heap
|
page read and write
|
||
DD7000
|
heap
|
page read and write
|
||
535000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
38BE000
|
stack
|
page read and write
|
||
5B30000
|
direct allocation
|
page execute and read and write
|
||
6E2EE000
|
unkown
|
page readonly
|
||
4520000
|
trusted library allocation
|
page read and write
|
||
17535ED9000
|
heap
|
page read and write
|
||
8C6000
|
unkown
|
page execute and read and write
|
||
400E000
|
stack
|
page read and write
|
||
4494000
|
trusted library allocation
|
page read and write
|
||
1438000
|
heap
|
page read and write
|
||
4260000
|
trusted library allocation
|
page read and write
|
||
5430000
|
unkown
|
page readonly
|
||
94DDFF000
|
stack
|
page read and write
|
||
B99000
|
unkown
|
page execute and read and write
|
||
5550000
|
direct allocation
|
page execute and read and write
|
||
2613000
|
trusted library allocation
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
8ACE000
|
stack
|
page read and write
|
||
1160000
|
heap
|
page read and write
|
||
241FC480000
|
heap
|
page read and write
|
||
E49000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
7E00000
|
trusted library allocation
|
page read and write
|
||
506000
|
heap
|
page read and write
|
||
1119000
|
stack
|
page read and write
|
||
C00E000
|
stack
|
page read and write
|
||
241FC477000
|
heap
|
page read and write
|
||
8C0E000
|
stack
|
page read and write
|
||
59C0000
|
heap
|
page read and write
|
||
2682BA90000
|
trusted library allocation
|
page read and write
|
||
5BD0000
|
direct allocation
|
page execute and read and write
|
||
E56000
|
heap
|
page read and write
|
||
1557000
|
heap
|
page read and write
|
||
1D1EF66D000
|
heap
|
page read and write
|
||
6E2EB000
|
unkown
|
page read and write
|
||
1610000
|
direct allocation
|
page read and write
|
||
336E000
|
stack
|
page read and write
|
||
820E000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
11B0000
|
heap
|
page read and write
|
||
5A20000
|
direct allocation
|
page execute and read and write
|
||
1F4000
|
heap
|
page read and write
|
||
3190000
|
heap
|
page read and write
|
||
D30000
|
heap
|
page read and write
|
||
559000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
BFE000
|
stack
|
page read and write
|
||
B63000
|
unkown
|
page write copy
|
||
4496000
|
trusted library allocation
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
5880000
|
trusted library allocation
|
page read and write
|
||
31C2000
|
heap
|
page read and write
|
||
25FE000
|
unkown
|
page read and write
|
||
2E4F000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
4EE2000
|
heap
|
page read and write
|
||
C250000
|
trusted library allocation
|
page read and write
|
||
15DE000
|
heap
|
page read and write
|
||
A5E000
|
stack
|
page read and write
|
||
2FAF000
|
stack
|
page read and write
|
||
53C0000
|
direct allocation
|
page execute and read and write
|
||
589000
|
heap
|
page read and write
|
||
241FC413000
|
heap
|
page read and write
|
||
2B63000
|
heap
|
page read and write
|
||
16D3000
|
heap
|
page read and write
|
||
1700000
|
heap
|
page read and write
|
||
B4CE000
|
stack
|
page read and write
|
||
584F000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
E6F000
|
heap
|
page read and write
|
||
377E000
|
stack
|
page read and write
|
||
A6C000
|
heap
|
page read and write
|
||
42B0000
|
direct allocation
|
page execute and read and write
|
||
566000
|
heap
|
page read and write
|
||
11B9000
|
heap
|
page read and write
|
||
17535D70000
|
heap
|
page read and write
|
||
142E000
|
stack
|
page read and write
|
||
22BC000
|
trusted library allocation
|
page read and write
|
||
1F5000
|
heap
|
page read and write
|
||
241FC468000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
221000
|
unkown
|
page execute read
|
||
1D0F000
|
stack
|
page read and write
|
||
2991000
|
heap
|
page read and write
|
||
A77000
|
heap
|
page read and write
|
||
EF5000
|
heap
|
page read and write
|
||
EDE000
|
heap
|
page read and write
|
||
55A0000
|
direct allocation
|
page execute and read and write
|
||
DF8000
|
heap
|
page read and write
|
||
6E207000
|
unkown
|
page read and write
|
||
A5B000
|
heap
|
page read and write
|
||
2E8E000
|
stack
|
page read and write
|
||
10A84C98000
|
heap
|
page read and write
|
||
17535726000
|
heap
|
page read and write
|
||
4EE1000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
348F000
|
stack
|
page read and write
|
||
3F60000
|
direct allocation
|
page execute and read and write
|
||
52C000
|
heap
|
page read and write
|
||
555000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
17535EDB000
|
heap
|
page read and write
|
||
393E000
|
stack
|
page read and write
|
||
6E4F5000
|
unkown
|
page write copy
|
||
5690000
|
direct allocation
|
page execute and read and write
|
||
BE0000
|
trusted library allocation
|
page read and write
|
||
770000
|
unkown
|
page read and write
|
||
1EF000
|
stack
|
page read and write
|
||
423B000
|
stack
|
page read and write
|
||
280000
|
heap
|
page read and write
|
||
1310000
|
trusted library allocation
|
page read and write
|
||
A38E000
|
stack
|
page read and write
|
||
1389000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
54E0000
|
heap
|
page read and write
|
||
DCF000
|
heap
|
page read and write
|
||
4050000
|
direct allocation
|
page execute and read and write
|
||
241FC280000
|
heap
|
page read and write
|
||
9F8000
|
heap
|
page read and write
|
||
E08000
|
heap
|
page read and write
|
||
4C93000
|
heap
|
page read and write
|
||
373F000
|
stack
|
page read and write
|
||
69FE000
|
stack
|
page read and write
|
||
D3B000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
DF4000
|
heap
|
page read and write
|
||
E62000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
6E011000
|
unkown
|
page execute read
|
||
5680000
|
direct allocation
|
page execute and read and write
|
||
146E000
|
stack
|
page read and write
|
||
2C50000
|
heap
|
page read and write
|
||
1F5000
|
heap
|
page read and write
|
||
29B3000
|
heap
|
page read and write
|
||
4ECF000
|
stack
|
page read and write
|
||
B28E000
|
stack
|
page read and write
|
||
4EE1000
|
heap
|
page read and write
|
||
1610000
|
direct allocation
|
page read and write
|
||
23B0000
|
trusted library allocation
|
page read and write
|
||
5E0000
|
trusted library allocation
|
page read and write
|
||
168B2070000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
4EE1000
|
heap
|
page read and write
|
||
5660000
|
direct allocation
|
page execute and read and write
|
||
4EE0000
|
heap
|
page read and write
|
||
3C4E000
|
stack
|
page read and write
|
||
10A84C6D000
|
heap
|
page read and write
|
||
B00E000
|
stack
|
page read and write
|
||
533000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
3ECE000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
6E188000
|
unkown
|
page read and write
|
||
54B0000
|
direct allocation
|
page execute and read and write
|
||
1F4000
|
heap
|
page read and write
|
||
8E1000
|
unkown
|
page execute and read and write
|
||
85D000
|
stack
|
page read and write
|
||
4520000
|
trusted library allocation
|
page read and write
|
||
B28000
|
unkown
|
page execute and read and write
|
||
29B0000
|
heap
|
page read and write
|
||
6E2CA000
|
unkown
|
page readonly
|
||
1F4000
|
heap
|
page read and write
|
||
6E314000
|
unkown
|
page readonly
|
||
A75000
|
heap
|
page read and write
|
||
1D1EF3C0000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
E0F000
|
heap
|
page read and write
|
||
4ED3000
|
direct allocation
|
page read and write
|
||
2991000
|
heap
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
42E0000
|
heap
|
page read and write
|
||
5670000
|
direct allocation
|
page execute and read and write
|
||
A58000
|
heap
|
page read and write
|
||
A17000
|
heap
|
page read and write
|
||
4EE1000
|
heap
|
page read and write
|
||
D9C000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
17535DB4000
|
heap
|
page read and write
|
||
6E1B0000
|
unkown
|
page readonly
|
||
4EE1000
|
heap
|
page read and write
|
||
B16000
|
heap
|
page read and write
|
||
52C0000
|
direct allocation
|
page execute and read and write
|
||
B50E000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
32D0000
|
heap
|
page read and write
|
||
6DF91000
|
unkown
|
page execute read
|
||
5680000
|
direct allocation
|
page execute and read and write
|
||
CE0000
|
trusted library allocation
|
page read and write
|
||
31E4000
|
heap
|
page read and write
|
||
42BE000
|
stack
|
page read and write
|
||
488F000
|
stack
|
page read and write
|
||
29B3000
|
heap
|
page read and write
|
||
1130000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
A7F000
|
heap
|
page read and write
|
||
A3D000
|
stack
|
page read and write
|
||
521000
|
heap
|
page read and write
|
||
A28000
|
unkown
|
page execute and read and write
|
||
52A000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
59CE000
|
stack
|
page read and write
|
||
5B00000
|
direct allocation
|
page execute and read and write
|
||
1F4000
|
heap
|
page read and write
|
||
BB5000
|
unkown
|
page read and write
|
||
5630000
|
direct allocation
|
page execute and read and write
|
||
2682B320000
|
heap
|
page read and write
|
||
1F5000
|
heap
|
page read and write
|
||
707000
|
unkown
|
page read and write
|
||
1D1EF602000
|
heap
|
page read and write
|
||
31D3000
|
heap
|
page read and write
|
||
61A0000
|
trusted library allocation
|
page read and write
|
||
F00000
|
heap
|
page read and write
|
||
31EA000
|
heap
|
page read and write
|
||
5850000
|
direct allocation
|
page execute and read and write
|
||
58FF000
|
trusted library allocation
|
page read and write
|
||
58C0000
|
trusted library allocation
|
page read and write
|
||
58F0000
|
direct allocation
|
page execute and read and write
|
||
48CE000
|
stack
|
page read and write
|
||
22DC000
|
trusted library allocation
|
page read and write
|
||
5431000
|
unkown
|
page execute read
|
||
618E000
|
trusted library allocation
|
page read and write
|
||
4010000
|
direct allocation
|
page execute and read and write
|
||
1F4000
|
heap
|
page read and write
|
||
A9D000
|
unkown
|
page execute and read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
17535ED9000
|
heap
|
page read and write
|
||
6D1000
|
unkown
|
page execute read
|
||
241FC479000
|
heap
|
page read and write
|
||
2B949F9000
|
stack
|
page read and write
|
||
40A000
|
unkown
|
page read and write
|
||
1134000
|
heap
|
page read and write
|
||
6187000
|
trusted library allocation
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
F0A000
|
heap
|
page read and write
|
||
570000
|
trusted library allocation
|
page read and write
|
||
A32000
|
heap
|
page read and write
|
||
5790000
|
trusted library allocation
|
page read and write
|
||
22A000
|
unkown
|
page write copy
|
||
144E000
|
heap
|
page read and write
|
||
A81000
|
heap
|
page read and write
|
||
2682B400000
|
heap
|
page read and write
|
||
10A84CDA000
|
heap
|
page read and write
|
||
55F0000
|
direct allocation
|
page read and write
|
||
370F000
|
stack
|
page read and write
|
||
9BCE000
|
stack
|
page read and write
|
||
1F5000
|
heap
|
page read and write
|
||
6E154000
|
unkown
|
page readonly
|
||
5340000
|
direct allocation
|
page execute and read and write
|
||
43CE000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1310000
|
trusted library allocation
|
page read and write
|
||
1A27000
|
heap
|
page read and write
|
||
6E17D000
|
unkown
|
page readonly
|
||
52C0000
|
direct allocation
|
page execute and read and write
|
||
3EBF000
|
stack
|
page read and write
|
||
2682B402000
|
heap
|
page read and write
|
||
488F000
|
stack
|
page read and write
|
||
C90000
|
heap
|
page read and write
|
||
1616000
|
heap
|
page read and write
|
||
15D1000
|
heap
|
page read and write
|
||
1A00000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
4D20000
|
heap
|
page read and write
|
||
3851000
|
heap
|
page read and write
|
||
2960000
|
heap
|
page read and write
|
||
15593402000
|
heap
|
page read and write
|
||
424F000
|
stack
|
page read and write
|
||
1BCE000
|
stack
|
page read and write
|
||
6E2C0000
|
unkown
|
page readonly
|
||
1134000
|
heap
|
page read and write
|
||
5770000
|
direct allocation
|
page execute and read and write
|
||
821000
|
unkown
|
page execute and read and write
|
||
1F4000
|
heap
|
page read and write
|
||
41A0000
|
direct allocation
|
page execute and read and write
|
||
5420000
|
direct allocation
|
page execute and read and write
|
||
6F5000
|
unkown
|
page readonly
|
||
1F4000
|
heap
|
page read and write
|
||
4020000
|
direct allocation
|
page execute and read and write
|
||
C16679B000
|
stack
|
page read and write
|
||
8D5000
|
unkown
|
page read and write
|
||
40B0000
|
direct allocation
|
page execute and read and write
|
||
6E141000
|
unkown
|
page execute read
|
||
5DF1000
|
direct allocation
|
page read and write
|
||
6E19D000
|
unkown
|
page readonly
|
||
B8CE000
|
stack
|
page read and write
|
||
15F2000
|
heap
|
page read and write
|
||
1324000
|
trusted library allocation
|
page read and write
|
||
15B6000
|
heap
|
page read and write
|
||
2B9477F000
|
stack
|
page read and write
|
||
4B3F000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
DFE000
|
stack
|
page read and write
|
||
707000
|
unkown
|
page read and write
|
||
B88E000
|
stack
|
page read and write
|
||
31ED000
|
heap
|
page read and write
|
||
A58000
|
heap
|
page read and write
|
||
5460000
|
direct allocation
|
page execute and read and write
|
||
42A0000
|
direct allocation
|
page execute and read and write
|
||
1FA3000
|
trusted library allocation
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
168B2097000
|
heap
|
page read and write
|
||
4CE000
|
stack
|
page read and write
|
||
1FB3000
|
trusted library allocation
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
2D0F000
|
stack
|
page read and write
|
||
EF0000
|
unkown
|
page execute and write copy
|
||
4ED0000
|
direct allocation
|
page read and write
|
||
5F05000
|
trusted library allocation
|
page read and write
|
||
1554000
|
heap
|
page read and write
|
||
17535905000
|
heap
|
page read and write
|
||
E56000
|
heap
|
page read and write
|
||
11D1000
|
heap
|
page read and write
|
||
4C90000
|
heap
|
page read and write
|
||
3F70000
|
direct allocation
|
page execute and read and write
|
||
DC0000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
10A84D02000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
4EE1000
|
heap
|
page read and write
|
||
3470000
|
heap
|
page read and write
|
||
A17000
|
heap
|
page read and write
|
||
A15000
|
heap
|
page read and write
|
||
1C190FE000
|
stack
|
page read and write
|
||
5350000
|
direct allocation
|
page execute and read and write
|
||
2B5A000
|
heap
|
page read and write
|
||
A74000
|
heap
|
page read and write
|
||
154F000
|
heap
|
page read and write
|
||
1C18F7E000
|
stack
|
page read and write
|
||
31F9000
|
heap
|
page read and write
|
||
CD000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1615000
|
heap
|
page read and write
|
||
6DFFC000
|
unkown
|
page read and write
|
||
B02000
|
unkown
|
page execute and read and write
|
||
DF0000
|
heap
|
page read and write
|
||
3FB0000
|
direct allocation
|
page execute and read and write
|
||
3B3E000
|
stack
|
page read and write
|
||
1379000
|
heap
|
page read and write
|
||
7BBE000
|
stack
|
page read and write
|
||
D28000
|
unkown
|
page execute and read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
58A0000
|
trusted library allocation
|
page read and write
|
||
BAC000
|
unkown
|
page execute and read and write
|
||
1F4000
|
heap
|
page read and write
|
||
22C4000
|
trusted library allocation
|
page read and write
|
||
ECD000
|
stack
|
page read and write
|
||
143C000
|
heap
|
page read and write
|
||
15C6000
|
heap
|
page read and write
|
||
820000
|
unkown
|
page read and write
|
||
2991000
|
heap
|
page read and write
|
||
5980000
|
direct allocation
|
page execute and read and write
|
||
154B000
|
heap
|
page read and write
|
||
241FC402000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
FED000
|
stack
|
page read and write
|
||
5940000
|
direct allocation
|
page execute and read and write
|
||
A98E000
|
stack
|
page read and write
|
||
4260000
|
trusted library allocation
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
4EE1000
|
heap
|
page read and write
|
||
10A85512000
|
heap
|
page read and write
|
||
4434000
|
heap
|
page read and write
|
||
5DBA000
|
direct allocation
|
page read and write
|
||
E34000
|
heap
|
page read and write
|
||
5730000
|
direct allocation
|
page execute and read and write
|
||
6E2DD000
|
unkown
|
page readonly
|
||
29B0000
|
heap
|
page read and write
|
||
2B9467E000
|
stack
|
page read and write
|
||
3781000
|
trusted library allocation
|
page read and write
|
||
270E000
|
stack
|
page read and write
|
||
37A0000
|
heap
|
page read and write
|
||
2B945FE000
|
stack
|
page read and write
|
||
2C5F000
|
stack
|
page read and write
|
||
57E0000
|
direct allocation
|
page execute and read and write
|
||
168B2080000
|
heap
|
page read and write
|
||
E5B000
|
stack
|
page read and write
|
||
2FFE000
|
stack
|
page read and write
|
||
6E050000
|
unkown
|
page readonly
|
||
1134000
|
heap
|
page read and write
|
||
3770000
|
trusted library allocation
|
page read and write
|
||
10A85260000
|
trusted library allocation
|
page read and write
|
||
E83000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
EDB000
|
unkown
|
page execute and read and write
|
||
C4D000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
AFF000
|
unkown
|
page execute and read and write
|
||
6180000
|
trusted library allocation
|
page read and write
|
||
4EE1000
|
heap
|
page read and write
|
||
52D0000
|
direct allocation
|
page execute and read and write
|
||
168B207C000
|
heap
|
page read and write
|
||
568000
|
heap
|
page read and write
|
||
970E000
|
stack
|
page read and write
|
||
78FE000
|
stack
|
page read and write
|
||
2E30000
|
trusted library allocation
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
22C4000
|
trusted library allocation
|
page read and write
|
||
4480000
|
trusted library allocation
|
page read and write
|
||
B78E000
|
stack
|
page read and write
|
||
58FB000
|
trusted library allocation
|
page read and write
|
||
D40000
|
trusted library allocation
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
560000
|
heap
|
page read and write
|
||
23A0000
|
trusted library allocation
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
A20E000
|
stack
|
page read and write
|
||
5970000
|
heap
|
page read and write
|
||
2682BC02000
|
trusted library allocation
|
page read and write
|
||
371F77A000
|
stack
|
page read and write
|
||
834E000
|
stack
|
page read and write
|
||
41E0000
|
direct allocation
|
page execute and read and write
|
||
241FC2E0000
|
heap
|
page read and write
|
||
168B2053000
|
heap
|
page read and write
|
||
2B9497E000
|
stack
|
page read and write
|
||
6E1B1000
|
unkown
|
page execute read
|
||
770000
|
unkown
|
page read and write
|
||
A7F000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
53E0000
|
direct allocation
|
page execute and read and write
|
||
168B2045000
|
heap
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
6E14C000
|
unkown
|
page readonly
|
||
1561000
|
heap
|
page read and write
|
||
5B40000
|
direct allocation
|
page execute and read and write
|
||
5AD0000
|
direct allocation
|
page execute and read and write
|
||
4EE1000
|
heap
|
page read and write
|
||
32F5000
|
heap
|
page read and write
|
||
99000
|
stack
|
page read and write
|
||
10A8558E000
|
heap
|
page read and write
|
||
4090000
|
direct allocation
|
page execute and read and write
|
||
1324000
|
trusted library allocation
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
D10000
|
heap
|
page read and write
|
||
878000
|
unkown
|
page execute and read and write
|
||
7CBF000
|
stack
|
page read and write
|
||
37A7000
|
heap
|
page read and write
|
||
15D5000
|
heap
|
page read and write
|
||
17535860000
|
trusted library allocation
|
page read and write
|
||
590D000
|
trusted library allocation
|
page read and write
|
||
6E211000
|
unkown
|
page execute read
|
||
40000
|
heap
|
page read and write
|
||
BCC000
|
stack
|
page read and write
|
||
5DD6000
|
direct allocation
|
page read and write
|
||
15D5000
|
heap
|
page read and write
|
||
370F000
|
stack
|
page read and write
|
||
B99000
|
unkown
|
page execute and read and write
|
||
12FF000
|
stack
|
page read and write
|
||
545000
|
heap
|
page read and write
|
||
114E000
|
stack
|
page read and write
|
||
4000000
|
direct allocation
|
page execute and read and write
|
||
534000
|
heap
|
page read and write
|
||
2D4E000
|
stack
|
page read and write
|
||
BB6000
|
unkown
|
page execute and read and write
|
||
31D5000
|
heap
|
page read and write
|
||
8E50000
|
trusted library allocation
|
page read and write
|
||
E1E000
|
heap
|
page read and write
|
||
4ED3000
|
direct allocation
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1F5000
|
heap
|
page read and write
|
||
B0A000
|
unkown
|
page read and write
|
||
4496000
|
trusted library allocation
|
page read and write
|
||
1610000
|
direct allocation
|
page read and write
|
||
29AA000
|
heap
|
page read and write
|
||
C58E000
|
stack
|
page read and write
|
||
53A0000
|
direct allocation
|
page execute and read and write
|
||
58BB000
|
trusted library allocation
|
page read and write
|
||
1620000
|
heap
|
page read and write
|
||
B25000
|
unkown
|
page read and write
|
||
86F000
|
unkown
|
page execute and read and write
|
||
4D8F000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
4480000
|
trusted library allocation
|
page read and write
|
||
244F000
|
stack
|
page read and write
|
||
2990000
|
heap
|
page read and write
|
||
910000
|
unkown
|
page execute and read and write
|
||
1F4000
|
heap
|
page read and write
|
||
175356F0000
|
heap
|
page read and write
|
||
575000
|
heap
|
page read and write
|
||
91CE000
|
stack
|
page read and write
|
||
FEE000
|
stack
|
page read and write
|
||
4520000
|
trusted library allocation
|
page read and write
|
||
1310000
|
trusted library allocation
|
page read and write
|
||
58C5000
|
trusted library allocation
|
page read and write
|
||
A58000
|
heap
|
page read and write
|
||
4030000
|
direct allocation
|
page execute and read and write
|
||
54D0000
|
trusted library allocation
|
page read and write
|
||
E2D000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
52A000
|
heap
|
page read and write
|
||
15E5000
|
heap
|
page read and write
|
||
58BE000
|
stack
|
page read and write
|
||
168B2091000
|
heap
|
page read and write
|
||
52C0000
|
direct allocation
|
page execute and read and write
|
||
E5B000
|
heap
|
page read and write
|
||
33C0000
|
heap
|
page read and write
|
||
51C000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
31F1000
|
heap
|
page read and write
|
||
363E000
|
stack
|
page read and write
|
||
B41000
|
unkown
|
page write copy
|
||
545000
|
heap
|
page read and write
|
||
94D8FF000
|
stack
|
page read and write
|
||
5290000
|
direct allocation
|
page execute and read and write
|
||
1F4000
|
heap
|
page read and write
|
||
5410000
|
direct allocation
|
page execute and read and write
|
||
5820000
|
direct allocation
|
page execute and read and write
|
||
9979EFE000
|
stack
|
page read and write
|
||
58D3000
|
trusted library allocation
|
page read and write
|
||
1690000
|
direct allocation
|
page read and write
|
||
10A84C2B000
|
heap
|
page read and write
|
||
17535684000
|
heap
|
page read and write
|
||
70A000
|
unkown
|
page readonly
|
||
103A000
|
trusted library allocation
|
page read and write
|
||
B74E000
|
stack
|
page read and write
|
||
241FC442000
|
heap
|
page read and write
|
||
1561000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
40E0000
|
direct allocation
|
page execute and read and write
|
||
A81000
|
heap
|
page read and write
|
||
34CF000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
A49000
|
heap
|
page read and write
|
||
12EE000
|
stack
|
page read and write
|
||
A78000
|
unkown
|
page execute and read and write
|
||
4260000
|
direct allocation
|
page execute and read and write
|
||
6E1D0000
|
unkown
|
page readonly
|
||
6E4FB000
|
unkown
|
page readonly
|
||
1F5000
|
heap
|
page read and write
|
||
53D0000
|
direct allocation
|
page execute and read and write
|
||
29B3000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
6E1AB000
|
unkown
|
page readonly
|
||
1567000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
771000
|
unkown
|
page execute and read and write
|
||
40C0000
|
direct allocation
|
page execute and read and write
|
||
4D93000
|
direct allocation
|
page read and write
|
||
591E000
|
trusted library allocation
|
page read and write
|
||
3670000
|
heap
|
page read and write
|
||
4C93000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
DED000
|
heap
|
page read and write
|
||
168B2041000
|
heap
|
page read and write
|
||
41D0000
|
direct allocation
|
page execute and read and write
|
||
1F4000
|
heap
|
page read and write
|
||
168B2072000
|
heap
|
page read and write
|
||
ED0000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
5580000
|
direct allocation
|
page execute and read and write
|
||
6200000
|
trusted library allocation
|
page read and write
|
||
1134000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
583000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
10A84C13000
|
heap
|
page read and write
|
||
6E2F0000
|
unkown
|
page readonly
|
||
EB0000
|
heap
|
page read and write
|
||
4070000
|
direct allocation
|
page execute and read and write
|
||
313E000
|
stack
|
page read and write
|
||
541000
|
heap
|
page read and write
|
||
94DE7C000
|
stack
|
page read and write
|
||
4EE1000
|
heap
|
page read and write
|
||
E17000
|
heap
|
page read and write
|
||
10A84CC9000
|
heap
|
page read and write
|
||
5DF0000
|
trusted library allocation
|
page read and write
|
||
5610000
|
direct allocation
|
page execute and read and write
|
||
384F000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
6E161000
|
unkown
|
page execute read
|
||
321C000
|
heap
|
page read and write
|
||
6F5000
|
unkown
|
page readonly
|
||
4E0000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
603B000
|
unkown
|
page read and write
|
||
33CF000
|
stack
|
page read and write
|
||
6E207000
|
unkown
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
371F37E000
|
stack
|
page read and write
|
||
3FC0000
|
direct allocation
|
page execute and read and write
|
||
4C91000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1134000
|
heap
|
page read and write
|
||
5480000
|
direct allocation
|
page execute and read and write
|
||
42E0000
|
heap
|
page read and write
|
||
29B3000
|
heap
|
page read and write
|
||
603E000
|
unkown
|
page readonly
|
||
4480000
|
trusted library allocation
|
page read and write
|
||
168B2065000
|
heap
|
page read and write
|
||
159B000
|
heap
|
page read and write
|
||
1322000
|
trusted library allocation
|
page read and write
|
||
1310000
|
trusted library allocation
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
FA0000
|
heap
|
page read and write
|
||
6E1B0000
|
unkown
|
page readonly
|
||
5910000
|
trusted library allocation
|
page read and write
|
||
12F5000
|
stack
|
page read and write
|
||
1545000
|
heap
|
page read and write
|
||
F18000
|
heap
|
page read and write
|
||
5D4F000
|
stack
|
page read and write
|
||
948E000
|
stack
|
page read and write
|
||
4360000
|
direct allocation
|
page execute and read and write
|
||
136D000
|
trusted library allocation
|
page read and write
|
||
4ED2000
|
direct allocation
|
page read and write
|
||
1559000
|
heap
|
page read and write
|
||
17535DAD000
|
heap
|
page read and write
|
||
AA0000
|
heap
|
page read and write
|
||
10022000
|
unkown
|
page readonly
|
||
DE0000
|
heap
|
page read and write
|
||
17535694000
|
heap
|
page read and write
|
||
15AA000
|
heap
|
page read and write
|
||
C5CE000
|
stack
|
page read and write
|
||
13C5000
|
heap
|
page read and write
|
||
6E300000
|
unkown
|
page readonly
|
||
10A85500000
|
heap
|
page read and write
|
||
58ED000
|
trusted library allocation
|
page read and write
|
||
17535EB3000
|
heap
|
page read and write
|
||
C80E000
|
stack
|
page read and write
|
||
44CF000
|
stack
|
page read and write
|
||
15593330000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
467E000
|
stack
|
page read and write
|
||
E46000
|
heap
|
page read and write
|
||
94D77C000
|
stack
|
page read and write
|
||
5F07000
|
trusted library allocation
|
page read and write
|
||
1310000
|
trusted library allocation
|
page read and write
|
||
E62000
|
heap
|
page read and write
|
||
1090000
|
heap
|
page read and write
|
||
48FE000
|
stack
|
page read and write
|
||
B9CE000
|
stack
|
page read and write
|
||
1371000
|
heap
|
page read and write
|
||
753E000
|
stack
|
page read and write
|
||
77BE000
|
stack
|
page read and write
|
||
1310000
|
trusted library allocation
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
13BE000
|
heap
|
page read and write
|
||
6DFFC000
|
unkown
|
page read and write
|
||
DDD000
|
heap
|
page read and write
|
||
3F4F000
|
stack
|
page read and write
|
||
17535ED9000
|
heap
|
page read and write
|
||
3952D7A000
|
stack
|
page read and write
|
||
4ED2000
|
direct allocation
|
page read and write
|
||
1558000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
15E1000
|
heap
|
page read and write
|
||
168B1E70000
|
heap
|
page read and write
|
||
4520000
|
trusted library allocation
|
page read and write
|
||
168B2047000
|
heap
|
page read and write
|
||
E33000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1F4000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
707000
|
unkown
|
page write copy
|
||
1397000
|
heap
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
52C0000
|
direct allocation
|
page execute and read and write
|
||
535F000
|
stack
|
page read and write
|
||
6DF90000
|
unkown
|
page readonly
|
||
1551000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
2D36000
|
heap
|
page read and write
|
||
13A3000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1591000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
29B0000
|
heap
|
page read and write
|
||
58C0000
|
trusted library allocation
|
page read and write
|
||
4EE1000
|
heap
|
page read and write
|
||
22D2000
|
trusted library allocation
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
15FD000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
5670000
|
direct allocation
|
page execute and read and write
|
||
32DA000
|
heap
|
page read and write
|
||
1D1EF62B000
|
heap
|
page read and write
|
||
156F000
|
heap
|
page read and write
|
||
A39000
|
unkown
|
page execute and read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
58FE000
|
trusted library allocation
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
58CC000
|
trusted library allocation
|
page read and write
|
||
6F0000
|
heap
|
page read and write
|
||
571000
|
heap
|
page read and write
|
||
7F8E000
|
stack
|
page read and write
|
||
2D30000
|
heap
|
page read and write
|
||
6E03F000
|
unkown
|
page readonly
|
||
67E000
|
stack
|
page read and write
|
||
21CF000
|
stack
|
page read and write
|
||
DC2000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
51B0000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
2250000
|
heap
|
page read and write
|
||
BAC000
|
unkown
|
page execute and write copy
|
||
4EE1000
|
heap
|
page read and write
|
||
E20000
|
heap
|
page read and write
|
||
3ACF000
|
stack
|
page read and write
|
||
590E000
|
trusted library allocation
|
page read and write
|
||
5A70000
|
direct allocation
|
page execute and read and write
|
||
4ED3000
|
direct allocation
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
9F8E000
|
stack
|
page read and write
|
||
94DCFB000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
DEB000
|
heap
|
page read and write
|
||
13A0000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
57B0000
|
direct allocation
|
page execute and read and write
|
||
4536000
|
trusted library allocation
|
page read and write
|
||
161D000
|
unkown
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
BA0E000
|
stack
|
page read and write
|
||
16D2000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
59BE000
|
stack
|
page read and write
|
||
58CE000
|
trusted library allocation
|
page read and write
|
||
570000
|
heap
|
page read and write
|
||
6E051000
|
unkown
|
page execute read
|
||
367B000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
F60000
|
heap
|
page read and write
|
||
C48E000
|
stack
|
page read and write
|
||
1548000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1C191FF000
|
stack
|
page read and write
|
||
4EE1000
|
heap
|
page read and write
|
||
4300000
|
direct allocation
|
page execute and read and write
|
||
1447000
|
heap
|
page read and write
|
||
52A0000
|
direct allocation
|
page execute and read and write
|
||
29B7000
|
heap
|
page read and write
|
||
6E0CF000
|
unkown
|
page readonly
|
||
1300000
|
heap
|
page read and write
|
||
4520000
|
trusted library allocation
|
page read and write
|
||
6166000
|
unkown
|
page read and write
|
||
16FE000
|
stack
|
page read and write
|
||
2B4E000
|
stack
|
page read and write
|
||
DF4000
|
heap
|
page read and write
|
||
7A3F000
|
stack
|
page read and write
|
||
118A000
|
heap
|
page read and write
|
||
15D8000
|
heap
|
page read and write
|
||
DC4000
|
heap
|
page read and write
|
||
1F5000
|
heap
|
page read and write
|
||
31DA000
|
heap
|
page read and write
|
||
5490000
|
direct allocation
|
page execute and read and write
|
||
31E4000
|
heap
|
page read and write
|
||
CACE000
|
stack
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
1350000
|
heap
|
page read and write
|
||
15593360000
|
trusted library allocation
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
A81000
|
heap
|
page read and write
|
||
1D1EF65E000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
908F000
|
stack
|
page read and write
|
||
3952A7F000
|
stack
|
page read and write
|
||
2DC0000
|
heap
|
page read and write
|
||
517E000
|
stack
|
page read and write
|
||
DD2000
|
heap
|
page read and write
|
||
89C000
|
stack
|
page read and write
|
||
6DFFF000
|
unkown
|
page readonly
|
||
8AF000
|
stack
|
page read and write
|
||
4480000
|
trusted library allocation
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
6E190000
|
unkown
|
page readonly
|
||
53A000
|
heap
|
page read and write
|
||
54E6000
|
heap
|
page read and write
|
||
42F0000
|
direct allocation
|
page execute and read and write
|
||
C10000
|
trusted library allocation
|
page read and write
|
||
A0A000
|
heap
|
page read and write
|
||
133E000
|
stack
|
page read and write
|
||
258F000
|
stack
|
page read and write
|
||
4D90000
|
direct allocation
|
page read and write
|
||
168B208B000
|
heap
|
page read and write
|
||
478F000
|
stack
|
page read and write
|
||
5380000
|
direct allocation
|
page execute and read and write
|
||
327E000
|
stack
|
page read and write
|
||
450E000
|
stack
|
page read and write
|
||
398F000
|
stack
|
page read and write
|
||
5BFF000
|
stack
|
page read and write
|
||
E34000
|
heap
|
page read and write
|
There are 2725 hidden memdumps, click here to show them.