Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
1CMweaqlKp.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\MPGPH131\MPGPH131.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\freebl3.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\1000021002\ac861238af.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\5LzADXbR9e1baIzvWufsCa70.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\5W1aDm1vpFLN4gyrIiISMc4h.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\8sXk5E4IG9n4ZHu2M9Littnp.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\9SmQs0R4T5RJUISklvcv02zp.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\9WrQ2c2u5fxH1pcvCwwjGhdd.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Aghrmi42Lz5QvS8u8U6BiVXQ.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Bkg8NSHXvizTVBsjT3dzRvci.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\C893DEcM3dAA247WrHBz1SDW.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\CmCQsbfi77SnYQWckHTzUjRg.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\GIz2DLitsyoTn14REJti2nqN.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\H3bqnZf96LFIOlogieo3h5K9.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\KHojJ9v7XtNSHZfW6gAnnH23.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\LIdx8BlqmZTW07MQOtXboF4f.exe
|
MS-DOS executable PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows, MZ for MS-DOS
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\4767d2e713f2021e8fe856e3ea638b58[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\NewB[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\amert[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\file300un[1].exe
|
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\jfesawdr[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\sarra[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\alexxxxxxxx[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\cred64[1].dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\random[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\swiiiii[1].exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\clip64[1].dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\freebl3[1].dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\install[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\swiiii[1].exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\toolspub1[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\ISetup8[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\gold[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\jok[1].exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\random[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\NN7y6Ml4QHJBCfpeCmt1XQq3.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Osh3JGbyB69u4I6NltayynfD.exe
|
MS-DOS executable PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows, MZ for MS-DOS
|
dropped
|
||
C:\Users\user\AppData\Local\PHoZl3WswCZ1lCRWCJPBFZtN.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\QbkKvIT5uJj3Cx8h0ECIsmUK.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000019001\amert.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000066001\swiiiii.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000069001\NewB.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000071001\jok.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000073001\swiiii.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000075001\file300un.exe
|
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000077001\jfesawdr.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000079001\gold.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000080001\alexxxxxxxx.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000081001\install.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000234001\ISetup8.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000235001\toolspub1.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000236001\4767d2e713f2021e8fe856e3ea638b58.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\246122658369_Desktop.zip
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\u6po.0.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\u6po.2\ASUS_WMI.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\u6po.2\ATKEX.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\u6po.2\AsIO.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\ULDq5mjQ4b5aNI3V4eIJfMVS.exe
|
MS-DOS executable PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows, MZ for MS-DOS
|
dropped
|
||
C:\Users\user\AppData\Local\Z0V3bHdPFsglc9f9uLbxOZFN.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\aYtr3HT3BUqjK6QB6WYpwCcm.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\dmmb0z6yJ22pC75a4y49Nfob.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\evHtDP9yDvs3XYDQg8lqEVoH.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\f2NBhcBIObRGHagt6xPQoMa2.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\gKIISy7hixfPFGDeeM7cQzit.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\gPQjkT7jjoMSIv7cXyWMW1C4.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\gzxs1MlpU5tnMfkC7kzgvR1h.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\i8dOWYOLtbNAxDJGOQ8Wt9el.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\iFyHzFXRkeOppMlu3FtGrLYy.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\iO9tAKw78L31Wsbvnq5kt5m1.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\laQhqKepZhfkS5rQoYOvKJAy.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\leqbtljZtxj2WxVvdmpHiNsI.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\mBoc1pbzy7gOQT20pyEZL3en.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\oqwWhViccQzmDvkS751EZRiG.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\xF7m0A44x6KodDxbhAtiDsub.exe
|
MS-DOS executable PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows, MZ for MS-DOS
|
dropped
|
||
C:\Users\user\AppData\Roaming\a091ec0a6e2227\clip64.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\a091ec0a6e2227\cred64.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\0co9idnjzay1KSn3DMfCsBSw.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\11xbcpylNeYY4tZ39QN34xGC.exe
|
MS-DOS executable PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows, MZ for MS-DOS
|
dropped
|
||
C:\Users\user\Pictures\1NXbTL9dcUCk55eVv5KRJhmL.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\3N5jWnvXHqfYUsxTijnW3Uc5.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\5nFKWr1EKUheiDEHo671vxm8.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\7iI5SUAnqRGyB1YdSAO06W1v.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\D7t23m0X26bEkZqkCQtNwK5Y.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\JcuJCrKoIRAAJIb94uRnhVjr.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\Jr1vIs8XqAmt0RT7bHMte8ts.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\M4OBi0ywNcuUZRFLcfJ70nUH.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\MtYY7PxoMVCDp1NJbYQga2LV.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\QcyIEuk7gD7wTlhElB94jgu9.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\S41vy8IsPU7Iudry37c4uNtg.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\STUD4CnDuvZtXsKBuBkO31id.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\SjGlviky3CjPwV1vWXl2gdhJ.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\X53t1QSznpDGsvX2qLbdQFD1.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\de4IGlGSbV9c3J4m0qZtBGm8.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\g81RdhkO8Pp47pz1l8siHWuN.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\gX4d2ArXDOHTjofk9CfRb7Jz.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\gjVUxsTFUgOAjApkeCU52nGD.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\gmHwlMZnGawtAwStcAU6D1RM.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\jzMGE9Xb2Ny8jtCWlXWAk3ap.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\oXA3lyE6zGyLyvw1CwVKpLsf.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\pScZMSZH0uu2OkUDvWpN2tuz.exe
|
MS-DOS executable PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows, MZ for MS-DOS
|
dropped
|
||
C:\Users\user\Pictures\pl49PSFkcWVTQqBe8TA2VhRW.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\ppcQqLgPI8Dyy7YykX33fm5x.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\qPQ3lJ1fN9DRgfiXtyMpf1ll.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\rVg8HtIzXa4xhJHL7Pn8A6d2.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\s8YO7ScTlLADC9Vt6wr10aY4.exe
|
MS-DOS executable PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows, MZ for MS-DOS
|
dropped
|
||
C:\Users\user\Pictures\tAKreBGDuozTwXSZfhU7cFT3.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\v3efLAgS1BVue6uNuzFECLaH.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\v6zcDFD3cRDhmr34kNKDn8tX.exe
|
MS-DOS executable PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows, MZ for MS-DOS
|
dropped
|
||
C:\Users\user\Pictures\zWIy5Pdf1kgq9YulaqIKrGGy.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\CGDHDHJEBGHJKFIECBGCBGCAFI
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 12, database pages 7, cookie 0x3, schema 4, UTF-8,
version-valid-for 12
|
dropped
|
||
C:\ProgramData\EHCBAAAF
|
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie
0x24, schema 4, UTF-8, version-valid-for 2
|
dropped
|
||
C:\ProgramData\FHCGCFHDHIIIDGCAAEGD
|
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie
0xe, schema 4, UTF-8, version-valid-for 1
|
dropped
|
||
C:\ProgramData\FHIIEHJK
|
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie
0x21, schema 4, UTF-8, version-valid-for 3
|
dropped
|
||
C:\ProgramData\IDAEHCFHJJJJECAAFBKJ
|
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie
0xb, schema 4, UTF-8, version-valid-for 1
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_swiiiii.exe_4644a13ebcdb6e10e65a72b8ec8bc0b0ff32d1fa_6563360f_17591cc2-a55d-4452-b105-c15cda38f159\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA6A7.tmp.dmp
|
Mini DuMP crash report, 15 streams, Sat May 4 03:52:27 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA8AC.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAF92.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\Public\Desktop\Google Chrome.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working
directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:41 2023, mtime=Wed Oct 4 11:02:28 2023,
atime=Wed Sep 27 04:28:27 2023, length=3242272, window=hide
|
dropped
|
||
C:\Users\user\AppData\Local\5aIar1h6imWjPJZYPL4QSqoe.exe
|
HTML document, Unicode text, UTF-8 text, with very long lines (1460)
|
dropped
|
||
C:\Users\user\AppData\Local\EUl5mGPccm3Ux8yn4fNnNA26.exe
|
HTML document, Unicode text, UTF-8 text, with very long lines (1460)
|
dropped
|
||
C:\Users\user\AppData\Local\EubzUqqfLmBbNiHWxubQa6s2.exe
|
HTML document, Unicode text, UTF-8 text, with very long lines (1460)
|
dropped
|
||
C:\Users\user\AppData\Local\K7e4fpNGO8JkAsFxVXguIAcd.exe
|
HTML document, Unicode text, UTF-8 text, with very long lines (1460)
|
dropped
|
||
C:\Users\user\AppData\Local\MTc4G09Eq4noHZ0G091uBZf1.exe
|
HTML document, Unicode text, UTF-8 text, with very long lines (1460)
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\swiiii.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000069001\0IBzoJsP8q1QzBlpBtW6hkNk.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000069001\0eaFHVS20CPdU1bF3IvLrmew.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000069001\0weAxDqiNFog13cyvmb9Iyll.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000069001\1J39WMgHBH6ItCI7tnNb3DFI.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000069001\4ZdK877cZbgGnfbGZHyuFY5m.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000069001\5DX860qivAPKkFbfHPe3xXFZ.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000069001\6w06slvDOvn8Kv4AS6TmhE6x.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000069001\7fZ1uuzdpesnTJbK2s7zlM0T.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000069001\AMnvZ4ecVgVRTE0GaWFw3wMb.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000069001\C7O60cUu4nXNRuUr2Vq7LUKM.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000069001\CEi1OlllqXZaH8FOP7kkjSW1.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000069001\CtSGaLtWyp0hUfQ1Mn5nKSxw.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000069001\K1t0QXCCtmkM5YCAHaUaNQEx.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000069001\LioNgAcDbpgwvVAUIoPFcNK4.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000069001\MyDBZp3IqdDcWtv8eGvAA3yE.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000069001\NUZEoHqBL3r3M5uP65Rh5TDR.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000069001\RQGmLZ5AzfXq1HUlOGzzOt3b.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000069001\Uyz5k2kN9MDeUVxUSGfpoV1o.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000069001\XCIhnAqijGuHPoBEIyjPsLIo.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000069001\XGvWFa4NAosMbjAjuZzpyUWI.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000069001\Xcr6QUTPDnWRF6G2JMTKKHjm.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000069001\Y0b3PMbIThLKVdtccagUfXB5.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000069001\anXwSKXwykesHSKjlumxtR63.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000069001\bQJ9ItXP3EFD6151o3yv3g6N.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000069001\bWZJ6scgd0eSfqwO4Q8ocnSc.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000069001\c32Iri3au0EiVWLS2ox14DKF.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000069001\eGPF8nDHc6rmBKFNiAj03m4Z.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000069001\euMrYI7tgBOIHiqrgsMTTI6h.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000069001\fyWMllEKNnCV3KnF26H5P8Pi.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000069001\ggoGWZNyClVERCc8pHLm4D2v.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000069001\kx5yxW4nZQm8bvIQ8Fe3Qu97.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000069001\lp9PoQVyE6a6huBcuai11cbh.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000069001\nfeTS4Rh5UD3omGvdDZWTKCN.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000069001\pyu6hRrie1pHZfKipPCmJSug.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000069001\qlZvaL5K8IumKQuIGtiAWDLI.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000069001\rBAqm0StsqXtrceFRG9w8nUF.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000069001\stqvxRyhXo0Pkc7tcdNkDx8h.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000069001\y57AURiv2nc7k9hjcXOto2G1.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000069001\yNsCD42nmHDMZzaqdVWeCTVI.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\TmpC1FF.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\TmpC21F.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_Files_\AIXACVYBSB.docx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_Files_\DTBZGIOOSO.docx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_Files_\DTBZGIOOSO.xlsx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_Files_\HTAGVDFUIE.xlsx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_Files_\ONBQCLYSPU.docx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_Files_\ONBQCLYSPU.xlsx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_Files_\UMMBDNEQBN.xlsx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_Files_\XZXHAVGRAG.docx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0n0kxdye.exj.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_c2cdvbso.iiy.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_faqa5sid.x1v.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hacltfzh.3t5.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_m4sv2bmu.qzt.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mggzngrg.kch.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mxxysqh0.g11.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zmzbhjpe.hng.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\rage131MP.tmp
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\u6po.1.zip
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1002\76b53b3ec448f7ccdda2063b15d2bfc3_9e146be9-c76a-4720-bcdb-53011b87bd06
|
data
|
modified
|
||
C:\Users\user\Pictures\AN3CiEs9vHs3cPsEPcJxdtOY.exe
|
HTML document, Unicode text, UTF-8 text, with very long lines (1460)
|
dropped
|
||
C:\Users\user\Pictures\dq1f6mXIBjMzMXMQVeg2fNsL.exe
|
HTML document, Unicode text, UTF-8 text, with very long lines (1460)
|
dropped
|
||
C:\Users\user\Pictures\qhzSo7WKfB79QVVeIp5fAbeL.exe
|
HTML document, Unicode text, UTF-8 text, with very long lines (1460)
|
dropped
|
||
C:\Users\user\Pictures\r5kIpAOOvnafOvgnH4OtxIFK.exe
|
HTML document, Unicode text, UTF-8 text, with very long lines (1460)
|
dropped
|
||
C:\Users\user\Pictures\s0yoB0FX6GRQugk063ujbi4o.exe
|
HTML document, Unicode text, UTF-8 text, with very long lines (1460)
|
dropped
|
||
C:\Windows\Tasks\explorha.job
|
data
|
dropped
|
||
C:\Windows\Tasks\explorta.job
|
data
|
dropped
|
There are 190 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\1CMweaqlKp.exe
|
"C:\Users\user\Desktop\1CMweaqlKp.exe"
|
||
C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exe
|
"C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exe"
|
||
C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exe
|
C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exe
|
||
C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exe
|
"C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exe"
|
||
C:\Users\user\AppData\Local\Temp\1000019001\amert.exe
|
"C:\Users\user\AppData\Local\Temp\1000019001\amert.exe"
|
||
C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exe
|
"C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exe"
|
||
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
|
"C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe"
|
||
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
|
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
|
||
C:\Windows\SysWOW64\schtasks.exe
|
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
|
||
C:\Users\user\1000021002\ac861238af.exe
|
"C:\Users\user\1000021002\ac861238af.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
|
||
C:\Windows\SysWOW64\rundll32.exe
|
"C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
|
||
C:\Windows\System32\rundll32.exe
|
"C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
|
||
C:\Windows\System32\netsh.exe
|
netsh wlan show profiles
|
||
C:\Users\user\AppData\Local\Temp\1000066001\swiiiii.exe
|
"C:\Users\user\AppData\Local\Temp\1000066001\swiiiii.exe"
|
||
C:\Windows\SysWOW64\rundll32.exe
|
"C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
|
||
C:\ProgramData\MPGPH131\MPGPH131.exe
|
C:\ProgramData\MPGPH131\MPGPH131.exe
|
||
C:\ProgramData\MPGPH131\MPGPH131.exe
|
C:\ProgramData\MPGPH131\MPGPH131.exe
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell -Command Compress-Archive -Path 'C:\Users\user\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\user\AppData\Local\Temp\246122658369_Desktop.zip'
-CompressionLevel Optimal
|
||
C:\Users\user\AppData\Local\Temp\1000069001\NewB.exe
|
"C:\Users\user\AppData\Local\Temp\1000069001\NewB.exe"
|
||
C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exe
|
"C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN NewB.exe /TR "C:\Users\user\AppData\Local\Temp\1000069001\NewB.exe"
/F
|
||
C:\Users\user\AppData\Local\Temp\1000069001\NewB.exe
|
C:\Users\user\AppData\Local\Temp\1000069001\NewB.exe
|
||
C:\Users\user\AppData\Local\Temp\1000071001\jok.exe
|
"C:\Users\user\AppData\Local\Temp\1000071001\jok.exe"
|
||
C:\Users\user\AppData\Local\Temp\1000073001\swiiii.exe
|
"C:\Users\user\AppData\Local\Temp\1000073001\swiiii.exe"
|
||
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
|
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
|
||
C:\Users\user\AppData\Local\Temp\1000235001\toolspub1.exe
|
"C:\Users\user\AppData\Local\Temp\1000235001\toolspub1.exe"
|
||
C:\Users\user\AppData\Local\Temp\1000075001\file300un.exe
|
"C:\Users\user\AppData\Local\Temp\1000075001\file300un.exe"
|
||
C:\Users\user\AppData\Local\Temp\u6po.0.exe
|
"C:\Users\user\AppData\Local\Temp\u6po.0.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\1000075001\file300un.exe"
-Force
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://%3cfnc1%3e(79)/
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2656 --field-trial-handle=2296,i,9301016893778941798,11505312185340456869,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 928
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Users\user\AppData\Local\Temp\1000234001\ISetup8.exe
|
"C:\Users\user\AppData\Local\Temp\1000234001\ISetup8.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=3696 --field-trial-handle=2296,i,9301016893778941798,11505312185340456869,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 37 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://trade-inmyus.com/index.php
|
|||
pillowbrocccolipe.shop
|
|||
185.215.113.67:26260
|
|||
http://185.172.128.150/c698e1bc8a2f5e6d.php
|
|||
cleartotalfisherwo.shop
|
|||
http://trad-einmyus.com/index.php
|
|||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
communicationgenerwo.shop
|
|||
worryfillvolcawoi.shop
|
|||
diskretainvigorousiw.shop
|
|||
http://tradein-myus.com/index.php
|
|||
affordcharmcropwo.shop
|
|||
enthusiasimtitleow.shop
|
|||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://junglethomas.com/b3e2dbff31c451a3fa7323ca95e661ba/4767d2e713f2021e8fe856e3ea638b58.exev
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://db-ip.com/
|
unknown
|
||
https://t.me/RiseProSUPPORTo5#
|
unknown
|
||
https://ipinfo.io/widget/demo/81.181.54.104
|
unknown
|
||
https://db-ip.com/demo/home.php?s=81.181.54.1042
|
unknown
|
||
https://db-ip.com/demo/home.php?s=81.181.54.1045
|
unknown
|
||
https://junglethomas.com/b3e2dbff31c451a3fa7323ca95e661ba/4767d2e713f2021e8fe856e3ea638b58.exe
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://t.me/RiseProSUPPORTI
|
unknown
|
||
https://youtube.comVISITOR_INFO1_LIVE/
|
unknown
|
||
https://youtube.comVISITOR_PRIVACY_METADATAv10
|
unknown
|
||
https://ipinfo.io:443/widget/demo/81.181.54.1048
|
unknown
|
||
http://193.233.132.56/cost/lenin.exe1
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://db-ip.com/demo/home.php?s=81.181.54.104
|
unknown
|
||
https://aka.ms/winsvr-2022-pshelp
|
unknown
|
||
https://api.ip.sb/ip
|
unknown
|
||
https://www.youtube.com/account/v/
|
unknown
|
||
https://mozilla.org0/
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://db-ip.com:443/demo/home.php?s=81.181.54.104
|
unknown
|
||
https://affordcharmcropwo.shop/d
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
|
unknown
|
||
http://193.233.132.56/cost/lenin.exe;x
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://193.233.132.56/cost/go.exe4x
|
unknown
|
||
https://t.me/RiseProSUPPORT
|
unknown
|
||
https://affordcharmcropwo.shop/z
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
https://www.youtube.com/account
|
unknown
|
||
https://www.youtube.com/accountkO
|
unknown
|
||
https://yip.su/RNWPd.exeChttps://pastebin.com/raw/E0rY26ni5https://iplogger.com/1lyxz
|
unknown
|
||
https://ipinfo.io/
|
unknown
|
||
https://t.me/risepro_botrisepro4.104
|
unknown
|
||
https://www.maxmind.com/en/locate-my-ip-address
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://ipinfo.io/5
|
unknown
|
||
https://youtube.comYSC/)?
|
unknown
|
||
https://t.me/RiseProSUPPORTxR
|
unknown
|
||
https://junglethomas.com/
|
unknown
|
||
https://ipinfo.io:443/widget/demo/81.181.54.104Uz
|
unknown
|
||
https://db-ip.com/demo/home.php?s=81.181.54.104XNN
|
unknown
|
||
https://ipinfo.io:443/widget/demo/81.181.54.104
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
|
unknown
|
||
http://147.45.47.102:57893/hera/amadka.exe
|
unknown
|
||
http://147.45.47.102:57893/hera/amadka.exer.dbl
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://www.youtube.com/accountYouTube
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
http://193.233.132.56/cost/go.exehCorel.ba
|
unknown
|
||
https://affordcharmcropwo.shop/apitemb
|
unknown
|
||
https://ipinfo.io/widget/demo/81.181.54.104T
|
unknown
|
||
https://t.me/risepro_botP
|
unknown
|
||
http://193.233.132.56/cost/go.exe
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://ipinfo.io/i
|
unknown
|
||
https://ipinfo.io/_
|
unknown
|
||
https://youtube.comVISITOR_PRIVACY_METADATA/(9
|
unknown
|
||
http://193.233.132.56/cost/lenin.exew.s
|
unknown
|
||
http://193.233.132.56/cost/lenin.exea.exe68.0l
|
unknown
|
||
https://db-ip.com:443/demo/home.php?s=81.181.54.104r
|
unknown
|
||
http://193.233.132.56/cost/go.exemadka.ex
|
unknown
|
||
https://t.me/RiseProSUPPORT8
|
unknown
|
||
https://youtube.comYSCv10
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
https://t.me/RiseProSUPPORT3
|
unknown
|
||
https://accounts.googl
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://www.youtube.com/signin?action_handle_signin%3Dtrue%26app%3Ddesktop%26hl%3Den%26next%3Dhttps%
|
unknown
|
||
https://aka.ms/winsvr-2022-pshelpX
|
unknown
|
||
https://affordcharmcropwo.shop:443/apiNAME=userUSERPROFILE=C:
|
unknown
|
||
https://t.me/RiseProSUPPORT&
|
unknown
|
||
https://ipinfo.io/Mozilla/5.0
|
unknown
|
||
https://youtube.comVISITOR_INFO1_LIVEv10%
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://t.me/risepro_bot
|
unknown
|
||
https://t.me/risepro_botl
|
unknown
|
||
https://affordcharmcropwo.shop/api
|
unknown
|
||
https://t.me/risepro_bote
|
unknown
|
||
http://147.45.47.102:57893/hera/amadka.exe.lv
|
unknown
|
There are 90 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.67
|
unknown
|
Portugal
|
||
193.233.132.56
|
unknown
|
Russian Federation
|
||
185.172.128.150
|
unknown
|
Russian Federation
|
||
185.172.128.19
|
unknown
|
Russian Federation
|
||
193.233.132.139
|
unknown
|
Russian Federation
|
||
185.172.128.90
|
unknown
|
Russian Federation
|
||
34.117.186.192
|
unknown
|
United States
|
||
193.233.132.175
|
unknown
|
Russian Federation
|
||
104.26.5.15
|
unknown
|
United States
|
||
176.97.76.106
|
unknown
|
United Kingdom
|
||
142.251.2.84
|
unknown
|
United States
|
||
192.168.2.4
|
unknown
|
unknown
|
||
193.233.132.234
|
unknown
|
Russian Federation
|
||
185.172.128.59
|
unknown
|
Russian Federation
|
||
142.250.68.68
|
unknown
|
United States
|
||
104.21.60.76
|
unknown
|
United States
|
||
8.8.8.8
|
unknown
|
United States
|
||
147.45.47.93
|
unknown
|
Russian Federation
|
||
104.21.67.211
|
unknown
|
United States
|
||
104.21.90.14
|
unknown
|
United States
|
||
77.221.151.47
|
unknown
|
Russian Federation
|
||
189.195.132.134
|
unknown
|
Mexico
|
||
172.67.169.89
|
unknown
|
United States
|
||
185.172.128.228
|
unknown
|
Russian Federation
|
||
104.20.3.235
|
unknown
|
United States
|
||
172.67.176.131
|
unknown
|
United States
|
||
1.1.1.1
|
unknown
|
Australia
|
||
13.89.179.12
|
unknown
|
United States
|
||
172.217.14.67
|
unknown
|
United States
|
||
104.21.84.71
|
unknown
|
United States
|
||
104.21.18.166
|
unknown
|
United States
|
||
31.41.44.147
|
unknown
|
Russian Federation
|
||
172.217.12.131
|
unknown
|
United States
|
||
104.21.92.190
|
unknown
|
United States
|
||
104.20.4.235
|
unknown
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
172.67.19.24
|
unknown
|
United States
|
||
142.250.72.131
|
unknown
|
United States
|
||
142.250.189.14
|
unknown
|
United States
|
There are 29 hidden IPs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
d361f35322.exe
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
ac861238af.exe
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
RageMP131
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064
|
Blob
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
|
Startup
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064
|
Blob
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
|
EnableLUA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
\REGISTRY\A\{4847497d-db2e-be93-996d-f715f8235ece}\Root\InventoryApplicationFile\swiiiii.exe|b5db2c8a646c95c9
|
ProgramId
|
||
\REGISTRY\A\{4847497d-db2e-be93-996d-f715f8235ece}\Root\InventoryApplicationFile\swiiiii.exe|b5db2c8a646c95c9
|
FileId
|
||
\REGISTRY\A\{4847497d-db2e-be93-996d-f715f8235ece}\Root\InventoryApplicationFile\swiiiii.exe|b5db2c8a646c95c9
|
LowerCaseLongPath
|
||
\REGISTRY\A\{4847497d-db2e-be93-996d-f715f8235ece}\Root\InventoryApplicationFile\swiiiii.exe|b5db2c8a646c95c9
|
LongPathHash
|
||
\REGISTRY\A\{4847497d-db2e-be93-996d-f715f8235ece}\Root\InventoryApplicationFile\swiiiii.exe|b5db2c8a646c95c9
|
Name
|
||
\REGISTRY\A\{4847497d-db2e-be93-996d-f715f8235ece}\Root\InventoryApplicationFile\swiiiii.exe|b5db2c8a646c95c9
|
OriginalFileName
|
||
\REGISTRY\A\{4847497d-db2e-be93-996d-f715f8235ece}\Root\InventoryApplicationFile\swiiiii.exe|b5db2c8a646c95c9
|
Publisher
|
||
\REGISTRY\A\{4847497d-db2e-be93-996d-f715f8235ece}\Root\InventoryApplicationFile\swiiiii.exe|b5db2c8a646c95c9
|
Version
|
||
\REGISTRY\A\{4847497d-db2e-be93-996d-f715f8235ece}\Root\InventoryApplicationFile\swiiiii.exe|b5db2c8a646c95c9
|
BinFileVersion
|
||
\REGISTRY\A\{4847497d-db2e-be93-996d-f715f8235ece}\Root\InventoryApplicationFile\swiiiii.exe|b5db2c8a646c95c9
|
BinaryType
|
||
\REGISTRY\A\{4847497d-db2e-be93-996d-f715f8235ece}\Root\InventoryApplicationFile\swiiiii.exe|b5db2c8a646c95c9
|
ProductName
|
||
\REGISTRY\A\{4847497d-db2e-be93-996d-f715f8235ece}\Root\InventoryApplicationFile\swiiiii.exe|b5db2c8a646c95c9
|
ProductVersion
|
||
\REGISTRY\A\{4847497d-db2e-be93-996d-f715f8235ece}\Root\InventoryApplicationFile\swiiiii.exe|b5db2c8a646c95c9
|
LinkDate
|
||
\REGISTRY\A\{4847497d-db2e-be93-996d-f715f8235ece}\Root\InventoryApplicationFile\swiiiii.exe|b5db2c8a646c95c9
|
BinProductVersion
|
||
\REGISTRY\A\{4847497d-db2e-be93-996d-f715f8235ece}\Root\InventoryApplicationFile\swiiiii.exe|b5db2c8a646c95c9
|
AppxPackageFullName
|
||
\REGISTRY\A\{4847497d-db2e-be93-996d-f715f8235ece}\Root\InventoryApplicationFile\swiiiii.exe|b5db2c8a646c95c9
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{4847497d-db2e-be93-996d-f715f8235ece}\Root\InventoryApplicationFile\swiiiii.exe|b5db2c8a646c95c9
|
Size
|
||
\REGISTRY\A\{4847497d-db2e-be93-996d-f715f8235ece}\Root\InventoryApplicationFile\swiiiii.exe|b5db2c8a646c95c9
|
Language
|
||
\REGISTRY\A\{4847497d-db2e-be93-996d-f715f8235ece}\Root\InventoryApplicationFile\swiiiii.exe|b5db2c8a646c95c9
|
Usn
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
TickCount
|
||
HKEY_CURRENT_USER\SOFTWARE\BroomCleaner
|
Installed
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
|
{E88DCCE0-B7B3-11D1-A9F0-00AA0060FA31} {000214E6-0000-0000-C000-000000000046} 0xFFFF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories\{56FFCC30-D398-11D0-B2AE-00A0C908FA49}\Enum
|
Implementing
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories\{56FFCC30-D398-11D0-B2AE-00A0C908FA49}\Enum
|
Implementing
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Notifications\Settings\Windows.SystemToast.SecurityAndMaintenance
|
Enabled
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regasm_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regasm_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regasm_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regasm_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regasm_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regasm_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regasm_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regasm_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regasm_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regasm_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regasm_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regasm_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regasm_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regasm_RASMANCS
|
FileDirectory
|
There are 47 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
11E0000
|
direct allocation
|
page read and write
|
||
3CB5000
|
trusted library allocation
|
page read and write
|
||
E51000
|
unkown
|
page execute read
|
||
7C6E000
|
heap
|
page read and write
|
||
E51000
|
unkown
|
page execute read
|
||
7CE8000
|
heap
|
page read and write
|
||
8152000
|
heap
|
page read and write
|
||
3640000
|
direct allocation
|
page read and write
|
||
14C0000
|
direct allocation
|
page read and write
|
||
4F10000
|
direct allocation
|
page read and write
|
||
7C6E000
|
heap
|
page read and write
|
||
C90000
|
direct allocation
|
page read and write
|
||
611000
|
unkown
|
page execute and read and write
|
||
3661000
|
unclassified section
|
page read and write
|
||
7D70000
|
heap
|
page read and write
|
||
731000
|
unkown
|
page execute read
|
||
4E00000
|
direct allocation
|
page read and write
|
||
7CCF000
|
heap
|
page read and write
|
||
3680000
|
direct allocation
|
page read and write
|
||
E51000
|
unkown
|
page execute read
|
||
701000
|
unkown
|
page execute read
|
||
931000
|
unkown
|
page execute and read and write
|
||
5260000
|
direct allocation
|
page read and write
|
||
7C2000
|
unkown
|
page readonly
|
||
1F380020000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
7C6E000
|
heap
|
page read and write
|
||
7C6E000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
412000
|
unkown
|
page readonly
|
||
751000
|
unkown
|
page execute and read and write
|
||
7C9E000
|
heap
|
page read and write
|
||
14D1000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
101B000
|
heap
|
page read and write
|
||
844000
|
heap
|
page read and write
|
||
CBB000
|
stack
|
page read and write
|
||
7A1000
|
unkown
|
page read and write
|
||
7C90000
|
trusted library allocation
|
page read and write
|
||
3D4E000
|
stack
|
page read and write
|
||
E07000
|
heap
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
7FB9000
|
heap
|
page read and write
|
||
72BF000
|
stack
|
page read and write
|
||
7C68000
|
heap
|
page read and write
|
||
1D41CEF0000
|
trusted library allocation
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
50D0000
|
direct allocation
|
page execute and read and write
|
||
844000
|
heap
|
page read and write
|
||
7C6D000
|
heap
|
page read and write
|
||
284B180D000
|
heap
|
page read and write
|
||
7CD6000
|
heap
|
page read and write
|
||
3DAF000
|
stack
|
page read and write
|
||
7DC0000
|
trusted library allocation
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
844000
|
heap
|
page read and write
|
||
7CB8000
|
heap
|
page read and write
|
||
14D1000
|
heap
|
page read and write
|
||
D00000
|
heap
|
page read and write
|
||
125E000
|
stack
|
page read and write
|
||
1413000
|
heap
|
page read and write
|
||
7DCA000
|
heap
|
page read and write
|
||
142E000
|
heap
|
page read and write
|
||
11AB000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
135F000
|
stack
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
7CE6000
|
heap
|
page read and write
|
||
7D3C000
|
heap
|
page read and write
|
||
818A000
|
heap
|
page read and write
|
||
2EEF000
|
stack
|
page read and write
|
||
7C9E000
|
heap
|
page read and write
|
||
880000
|
heap
|
page read and write
|
||
4FF0000
|
direct allocation
|
page read and write
|
||
338D000
|
heap
|
page read and write
|
||
10F0000
|
direct allocation
|
page read and write
|
||
CEF000
|
stack
|
page read and write
|
||
1030000
|
heap
|
page read and write
|
||
144C000
|
heap
|
page read and write
|
||
1D436DE0000
|
heap
|
page execute and read and write
|
||
5220000
|
direct allocation
|
page execute and read and write
|
||
7D07000
|
heap
|
page read and write
|
||
325E000
|
stack
|
page read and write
|
||
375E000
|
stack
|
page read and write
|
||
844000
|
heap
|
page read and write
|
||
E5E000
|
unkown
|
page execute and write copy
|
||
7CF7000
|
heap
|
page read and write
|
||
1127000
|
heap
|
page read and write
|
||
3399000
|
heap
|
page read and write
|
||
844000
|
heap
|
page read and write
|
||
1D41CF00000
|
heap
|
page readonly
|
||
8164000
|
heap
|
page read and write
|
||
145B000
|
heap
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
82CC000
|
stack
|
page read and write
|
||
7D0F000
|
heap
|
page read and write
|
||
330F000
|
stack
|
page read and write
|
||
47EF000
|
stack
|
page read and write
|
||
8171000
|
heap
|
page read and write
|
||
91A000
|
unkown
|
page execute and read and write
|
||
4981000
|
heap
|
page read and write
|
||
C8554CE000
|
stack
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
1040000
|
heap
|
page read and write
|
||
F11000
|
heap
|
page read and write
|
||
7D27000
|
heap
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
1477000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
3929000
|
heap
|
page read and write
|
||
796E000
|
stack
|
page read and write
|
||
8161000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
8240000
|
trusted library allocation
|
page read and write
|
||
316F000
|
stack
|
page read and write
|
||
7CAA000
|
heap
|
page read and write
|
||
1477000
|
heap
|
page read and write
|
||
7CD7000
|
heap
|
page read and write
|
||
1447000
|
heap
|
page read and write
|
||
335F000
|
stack
|
page read and write
|
||
7DCE000
|
heap
|
page read and write
|
||
88A278E000
|
stack
|
page read and write
|
||
760000
|
unkown
|
page readonly
|
||
11A4000
|
heap
|
page read and write
|
||
7DD3000
|
heap
|
page read and write
|
||
F53000
|
heap
|
page read and write
|
||
53E0000
|
direct allocation
|
page execute and read and write
|
||
967000
|
unkown
|
page read and write
|
||
7CE4000
|
heap
|
page read and write
|
||
C30000
|
unkown
|
page execute and read and write
|
||
E23000
|
heap
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
7DF1000
|
heap
|
page read and write
|
||
220DC000
|
heap
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
4F10000
|
direct allocation
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
776E000
|
stack
|
page read and write
|
||
5120000
|
direct allocation
|
page execute and read and write
|
||
7F2000
|
unkown
|
page readonly
|
||
4981000
|
heap
|
page read and write
|
||
7DBC000
|
heap
|
page read and write
|
||
7CD6000
|
heap
|
page read and write
|
||
8175000
|
heap
|
page read and write
|
||
1417000
|
heap
|
page read and write
|
||
C20000
|
unkown
|
page execute and read and write
|
||
4981000
|
heap
|
page read and write
|
||
1D41EDE1000
|
trusted library allocation
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
40B000
|
unkown
|
page execute read
|
||
C8544FE000
|
stack
|
page read and write
|
||
DAE000
|
unkown
|
page execute and write copy
|
||
2C20000
|
direct allocation
|
page read and write
|
||
8152000
|
heap
|
page read and write
|
||
11CA000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
1D4202DD000
|
trusted library allocation
|
page read and write
|
||
C7C000
|
heap
|
page read and write
|
||
336C000
|
heap
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
7DEC000
|
heap
|
page read and write
|
||
33EE000
|
stack
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
1D41EC5D000
|
heap
|
page read and write
|
||
7CAA000
|
heap
|
page read and write
|
||
C854779000
|
stack
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
CA0000
|
direct allocation
|
page read and write
|
||
7D3C000
|
heap
|
page read and write
|
||
51F4000
|
heap
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
220D3000
|
heap
|
page read and write
|
||
113E000
|
heap
|
page read and write
|
||
14D9000
|
heap
|
page read and write
|
||
95A000
|
unkown
|
page readonly
|
||
401000
|
unkown
|
page execute read
|
||
7CE6000
|
heap
|
page read and write
|
||
8120000
|
heap
|
page read and write
|
||
3900000
|
heap
|
page read and write
|
||
50A0000
|
direct allocation
|
page execute and read and write
|
||
46AE000
|
stack
|
page read and write
|
||
146E000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
10B0000
|
heap
|
page read and write
|
||
14DC000
|
heap
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
F13000
|
heap
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
7D3C000
|
heap
|
page read and write
|
||
40BF000
|
stack
|
page read and write
|
||
4A70000
|
direct allocation
|
page read and write
|
||
7CB4000
|
heap
|
page read and write
|
||
8171000
|
heap
|
page read and write
|
||
CFB000
|
stack
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
E60000
|
heap
|
page read and write
|
||
38D5000
|
heap
|
page read and write
|
||
5240000
|
direct allocation
|
page execute and read and write
|
||
D29000
|
heap
|
page read and write
|
||
1D41E7F0000
|
trusted library allocation
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
2EDB000
|
heap
|
page read and write
|
||
114D000
|
stack
|
page read and write
|
||
675C000
|
stack
|
page read and write
|
||
7CC7000
|
heap
|
page read and write
|
||
3CAF000
|
stack
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
1D41CD40000
|
heap
|
page read and write
|
||
10EE000
|
stack
|
page read and write
|
||
1128000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
793B000
|
heap
|
page read and write
|
||
7CD6000
|
heap
|
page read and write
|
||
7CCE000
|
heap
|
page read and write
|
||
7DF3000
|
heap
|
page read and write
|
||
4F73000
|
direct allocation
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
50A0000
|
direct allocation
|
page execute and read and write
|
||
50C0000
|
direct allocation
|
page execute and read and write
|
||
4981000
|
heap
|
page read and write
|
||
3A6E000
|
stack
|
page read and write
|
||
4D51000
|
heap
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
7D27000
|
heap
|
page read and write
|
||
7939000
|
heap
|
page read and write
|
||
11A7000
|
heap
|
page read and write
|
||
844000
|
heap
|
page read and write
|
||
5320000
|
direct allocation
|
page execute and read and write
|
||
1195000
|
heap
|
page read and write
|
||
1340000
|
direct allocation
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
11E0000
|
direct allocation
|
page read and write
|
||
7E0B000
|
heap
|
page read and write
|
||
328F000
|
heap
|
page read and write
|
||
D9D000
|
heap
|
page read and write
|
||
366E000
|
stack
|
page read and write
|
||
7CF3000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
2DEB000
|
heap
|
page read and write
|
||
4D51000
|
heap
|
page read and write
|
||
4A70000
|
direct allocation
|
page read and write
|
||
7DB1000
|
heap
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
38BD000
|
heap
|
page read and write
|
||
7DC5000
|
heap
|
page read and write
|
||
1447000
|
heap
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
53D0000
|
direct allocation
|
page execute and read and write
|
||
302E000
|
stack
|
page read and write
|
||
14C2000
|
heap
|
page read and write
|
||
4CE1000
|
heap
|
page read and write
|
||
7CDD000
|
heap
|
page read and write
|
||
5460000
|
heap
|
page read and write
|
||
7CD4000
|
heap
|
page read and write
|
||
2819C000
|
heap
|
page read and write
|
||
1140000
|
heap
|
page read and write
|
||
2C30000
|
heap
|
page read and write
|
||
DEA000
|
heap
|
page read and write
|
||
C90000
|
direct allocation
|
page read and write
|
||
108D000
|
trusted library allocation
|
page execute and read and write
|
||
2FDF000
|
stack
|
page read and write
|
||
7D11000
|
heap
|
page read and write
|
||
1438000
|
heap
|
page read and write
|
||
F1E000
|
stack
|
page read and write
|
||
4D51000
|
heap
|
page read and write
|
||
416F000
|
stack
|
page read and write
|
||
8240000
|
trusted library allocation
|
page read and write
|
||
7DC1000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
7CD6000
|
heap
|
page read and write
|
||
1114000
|
heap
|
page read and write
|
||
998000
|
unkown
|
page execute and read and write
|
||
7DF3000
|
heap
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
2DEF000
|
stack
|
page read and write
|
||
394F000
|
stack
|
page read and write
|
||
358F000
|
stack
|
page read and write
|
||
299F000
|
stack
|
page read and write
|
||
7D04000
|
heap
|
page read and write
|
||
5040000
|
direct allocation
|
page execute and read and write
|
||
7CF0000
|
heap
|
page read and write
|
||
931000
|
unkown
|
page execute and write copy
|
||
3C6F000
|
stack
|
page read and write
|
||
8171000
|
heap
|
page read and write
|
||
7CAA000
|
heap
|
page read and write
|
||
492E000
|
stack
|
page read and write
|
||
7FF0000
|
trusted library allocation
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
12C5000
|
heap
|
page read and write
|
||
284B17D7000
|
heap
|
page read and write
|
||
7D0C000
|
heap
|
page read and write
|
||
11BA000
|
heap
|
page read and write
|
||
7650000
|
remote allocation
|
page read and write
|
||
1140000
|
trusted library allocation
|
page read and write
|
||
7CD6000
|
heap
|
page read and write
|
||
1011000
|
heap
|
page read and write
|
||
1D42F051000
|
trusted library allocation
|
page read and write
|
||
8153000
|
heap
|
page read and write
|
||
392F000
|
heap
|
page read and write
|
||
8161000
|
heap
|
page read and write
|
||
3D0F000
|
stack
|
page read and write
|
||
7DC6000
|
heap
|
page read and write
|
||
817D000
|
heap
|
page read and write
|
||
7CE8000
|
heap
|
page read and write
|
||
28184000
|
heap
|
page read and write
|
||
7E05000
|
heap
|
page read and write
|
||
7DC0000
|
trusted library allocation
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
2F30000
|
heap
|
page read and write
|
||
786F000
|
stack
|
page read and write
|
||
B4B000
|
stack
|
page read and write
|
||
7D27000
|
heap
|
page read and write
|
||
4CE1000
|
heap
|
page read and write
|
||
1D41CFA8000
|
heap
|
page read and write
|
||
7C8B000
|
heap
|
page read and write
|
||
AB8000
|
unkown
|
page execute and read and write
|
||
FC0000
|
heap
|
page read and write
|
||
14D0000
|
direct allocation
|
page read and write
|
||
37AE000
|
stack
|
page read and write
|
||
7CB5000
|
heap
|
page read and write
|
||
844000
|
heap
|
page read and write
|
||
4DC0000
|
trusted library allocation
|
page read and write
|
||
3E3F000
|
stack
|
page read and write
|
||
B41000
|
unkown
|
page execute and write copy
|
||
32FF000
|
stack
|
page read and write
|
||
F6E000
|
stack
|
page read and write
|
||
43AE000
|
stack
|
page read and write
|
||
90E000
|
unkown
|
page execute and read and write
|
||
7FF0000
|
trusted library allocation
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
7951000
|
heap
|
page read and write
|
||
8DE000
|
unkown
|
page execute and read and write
|
||
38D5000
|
heap
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
B00000
|
unkown
|
page execute and read and write
|
||
1A10000
|
heap
|
page read and write
|
||
7C9E000
|
heap
|
page read and write
|
||
FE0000
|
heap
|
page read and write
|
||
7CDD000
|
heap
|
page read and write
|
||
2B6B000
|
stack
|
page read and write
|
||
14BF000
|
heap
|
page read and write
|
||
4EB0000
|
heap
|
page read and write
|
||
912000
|
unkown
|
page execute and read and write
|
||
31E9000
|
heap
|
page read and write
|
||
155F000
|
stack
|
page read and write
|
||
C85497D000
|
stack
|
page read and write
|
||
7DB1000
|
heap
|
page read and write
|
||
2A4F000
|
stack
|
page read and write
|
||
5160000
|
direct allocation
|
page execute and read and write
|
||
920000
|
unkown
|
page execute and read and write
|
||
4D50000
|
direct allocation
|
page execute and read and write
|
||
8155000
|
heap
|
page read and write
|
||
145B000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
442E000
|
stack
|
page read and write
|
||
4980000
|
heap
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
818A000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
8240000
|
trusted library allocation
|
page read and write
|
||
7CEA000
|
heap
|
page read and write
|
||
52E0000
|
direct allocation
|
page execute and read and write
|
||
A1C000
|
unkown
|
page read and write
|
||
C2DA5FE000
|
stack
|
page read and write
|
||
7CDE000
|
heap
|
page read and write
|
||
7CD6000
|
heap
|
page read and write
|
||
11C0000
|
heap
|
page read and write
|
||
390C000
|
heap
|
page read and write
|
||
1D4202DB000
|
trusted library allocation
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
8171000
|
heap
|
page read and write
|
||
1340000
|
direct allocation
|
page read and write
|
||
1C4E000
|
stack
|
page read and write
|
||
8153000
|
heap
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
1114000
|
heap
|
page read and write
|
||
7CAB000
|
heap
|
page read and write
|
||
812D000
|
heap
|
page read and write
|
||
47DE000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
8161000
|
heap
|
page read and write
|
||
8161000
|
heap
|
page read and write
|
||
D6E000
|
stack
|
page read and write
|
||
88A2CFE000
|
stack
|
page read and write
|
||
31E7000
|
heap
|
page read and write
|
||
143F000
|
heap
|
page read and write
|
||
8240000
|
trusted library allocation
|
page read and write
|
||
D3A000
|
heap
|
page read and write
|
||
31BD000
|
heap
|
page read and write
|
||
13CE000
|
heap
|
page read and write
|
||
2E44000
|
trusted library allocation
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
113E000
|
heap
|
page read and write
|
||
1100000
|
trusted library allocation
|
page read and write
|
||
7CDD000
|
heap
|
page read and write
|
||
3DB000
|
stack
|
page read and write
|
||
81A9000
|
heap
|
page read and write
|
||
D36000
|
heap
|
page read and write
|
||
2C00000
|
direct allocation
|
page read and write
|
||
113E000
|
heap
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
2CB2000
|
trusted library allocation
|
page execute and read and write
|
||
77FE000
|
stack
|
page read and write
|
||
44CE000
|
stack
|
page read and write
|
||
C2DADFD000
|
stack
|
page read and write
|
||
4DE0000
|
direct allocation
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
7CF4000
|
heap
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
6B2B000
|
stack
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
7DB1000
|
heap
|
page read and write
|
||
112A000
|
heap
|
page read and write
|
||
7CCE000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
7DE5000
|
heap
|
page read and write
|
||
7FC2000
|
heap
|
page read and write
|
||
7D3C000
|
heap
|
page read and write
|
||
762000
|
unkown
|
page write copy
|
||
BC9000
|
unkown
|
page execute and read and write
|
||
45CF000
|
stack
|
page read and write
|
||
700000
|
unkown
|
page readonly
|
||
844000
|
heap
|
page read and write
|
||
7E1C000
|
heap
|
page read and write
|
||
220E0000
|
heap
|
page read and write
|
||
4FB0000
|
heap
|
page read and write
|
||
844000
|
heap
|
page read and write
|
||
7CE7000
|
heap
|
page read and write
|
||
2ACE000
|
stack
|
page read and write
|
||
3E7E000
|
stack
|
page read and write
|
||
4D40000
|
direct allocation
|
page execute and read and write
|
||
284B15E0000
|
heap
|
page read and write
|
||
14DC000
|
heap
|
page read and write
|
||
31BF000
|
stack
|
page read and write
|
||
DB3000
|
unkown
|
page execute and write copy
|
||
5120000
|
direct allocation
|
page execute and read and write
|
||
3384000
|
heap
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
C8547F8000
|
stack
|
page read and write
|
||
47F1000
|
heap
|
page read and write
|
||
999000
|
unkown
|
page write copy
|
||
7FC9000
|
heap
|
page read and write
|
||
1444000
|
heap
|
page read and write
|
||
D5C000
|
heap
|
page read and write
|
||
1D420336000
|
trusted library allocation
|
page read and write
|
||
47F1000
|
heap
|
page read and write
|
||
7AAD000
|
stack
|
page read and write
|
||
5360000
|
heap
|
page read and write
|
||
38BA000
|
heap
|
page read and write
|
||
13BE000
|
stack
|
page read and write
|
||
7CD2000
|
heap
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
7D14000
|
heap
|
page read and write
|
||
8172000
|
heap
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
14D9000
|
heap
|
page read and write
|
||
81A1000
|
heap
|
page read and write
|
||
220D6000
|
heap
|
page read and write
|
||
4DE0000
|
direct allocation
|
page read and write
|
||
4D51000
|
heap
|
page read and write
|
||
11DA000
|
heap
|
page read and write
|
||
814A000
|
heap
|
page read and write
|
||
24AF000
|
stack
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
10CD000
|
heap
|
page read and write
|
||
7E33000
|
heap
|
page read and write
|
||
844000
|
heap
|
page read and write
|
||
1195000
|
heap
|
page read and write
|
||
392B000
|
heap
|
page read and write
|
||
4D51000
|
heap
|
page read and write
|
||
7CC7000
|
heap
|
page read and write
|
||
7DF1000
|
heap
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
1477000
|
heap
|
page read and write
|
||
14DC000
|
heap
|
page read and write
|
||
B40000
|
unkown
|
page execute and write copy
|
||
4F80000
|
direct allocation
|
page execute and read and write
|
||
C3C000
|
stack
|
page read and write
|
||
7DF3000
|
heap
|
page read and write
|
||
7FCA000
|
heap
|
page read and write
|
||
8155000
|
heap
|
page read and write
|
||
390F000
|
heap
|
page read and write
|
||
2C20000
|
direct allocation
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
FD3000
|
heap
|
page read and write
|
||
C26000
|
unkown
|
page execute and read and write
|
||
4A81000
|
heap
|
page read and write
|
||
E63000
|
unkown
|
page execute and write copy
|
||
11A4000
|
heap
|
page read and write
|
||
7CE6000
|
heap
|
page read and write
|
||
7C9E000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
3BAE000
|
stack
|
page read and write
|
||
7DC0000
|
trusted library allocation
|
page read and write
|
||
3905000
|
heap
|
page read and write
|
||
CD6000
|
unkown
|
page execute and write copy
|
||
51D0000
|
direct allocation
|
page execute and read and write
|
||
11A4000
|
heap
|
page read and write
|
||
106E000
|
stack
|
page read and write
|
||
887000
|
unkown
|
page read and write
|
||
4D60000
|
heap
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
C8C000
|
heap
|
page read and write
|
||
8161000
|
heap
|
page read and write
|
||
7CEA000
|
heap
|
page read and write
|
||
7CAA000
|
heap
|
page read and write
|
||
8D8000
|
unkown
|
page execute and read and write
|
||
284B17EF000
|
heap
|
page read and write
|
||
7C6A000
|
heap
|
page read and write
|
||
844000
|
heap
|
page read and write
|
||
5230000
|
direct allocation
|
page execute and read and write
|
||
1140000
|
heap
|
page read and write
|
||
47F1000
|
heap
|
page read and write
|
||
7E0A000
|
heap
|
page read and write
|
||
790000
|
unkown
|
page readonly
|
||
4DC0000
|
direct allocation
|
page read and write
|
||
7DF3000
|
heap
|
page read and write
|
||
51E0000
|
direct allocation
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
7E0B000
|
heap
|
page read and write
|
||
8240000
|
trusted library allocation
|
page read and write
|
||
906000
|
unkown
|
page execute and read and write
|
||
76AE000
|
stack
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
4B0E000
|
stack
|
page read and write
|
||
4C90000
|
direct allocation
|
page execute and read and write
|
||
36BF000
|
stack
|
page read and write
|
||
844000
|
heap
|
page read and write
|
||
924000
|
unkown
|
page execute and read and write
|
||
3BCF000
|
stack
|
page read and write
|
||
914000
|
unkown
|
page execute and read and write
|
||
2EB0000
|
direct allocation
|
page read and write
|
||
390C000
|
heap
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
3355000
|
heap
|
page read and write
|
||
1042000
|
heap
|
page read and write
|
||
7CFD000
|
heap
|
page read and write
|
||
2A80000
|
trusted library allocation
|
page read and write
|
||
391C000
|
heap
|
page read and write
|
||
14BA000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
11B7000
|
heap
|
page read and write
|
||
8050000
|
trusted library allocation
|
page read and write
|
||
7DBC000
|
heap
|
page read and write
|
||
2A67000
|
trusted library allocation
|
page execute and read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
7CED000
|
heap
|
page read and write
|
||
1D4202AF000
|
trusted library allocation
|
page read and write
|
||
700000
|
unkown
|
page read and write
|
||
FA6000
|
heap
|
page read and write
|
||
251F7590000
|
trusted library allocation
|
page read and write
|
||
7CAA000
|
heap
|
page read and write
|
||
A1F000
|
unkown
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
451E000
|
stack
|
page read and write
|
||
71BE000
|
stack
|
page read and write
|
||
2C80000
|
trusted library allocation
|
page read and write
|
||
4D51000
|
heap
|
page read and write
|
||
37AF000
|
stack
|
page read and write
|
||
2B2F000
|
stack
|
page read and write
|
||
E23000
|
heap
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
8161000
|
heap
|
page read and write
|
||
11B2000
|
heap
|
page read and write
|
||
31FE000
|
stack
|
page read and write
|
||
7C8B000
|
heap
|
page read and write
|
||
7CFF000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
7FF0000
|
trusted library allocation
|
page read and write
|
||
5110000
|
direct allocation
|
page execute and read and write
|
||
544E000
|
stack
|
page read and write
|
||
284B1811000
|
heap
|
page read and write
|
||
2B7E000
|
stack
|
page read and write
|
||
679000
|
unkown
|
page write copy
|
||
610000
|
unkown
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
111F000
|
heap
|
page read and write
|
||
7DF1000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
7C8B000
|
heap
|
page read and write
|
||
D0E000
|
heap
|
page read and write
|
||
7DE7000
|
heap
|
page read and write
|
||
844000
|
heap
|
page read and write
|
||
8050000
|
trusted library allocation
|
page read and write
|
||
4C70000
|
direct allocation
|
page read and write
|
||
433F000
|
stack
|
page read and write
|
||
7DC0000
|
trusted library allocation
|
page read and write
|
||
7DBC000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
50A0000
|
direct allocation
|
page execute and read and write
|
||
51D0000
|
direct allocation
|
page execute and read and write
|
||
13B4000
|
heap
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
284B17B8000
|
heap
|
page read and write
|
||
7CCF000
|
heap
|
page read and write
|
||
1D41CE40000
|
heap
|
page read and write
|
||
2FCF000
|
stack
|
page read and write
|
||
118F000
|
stack
|
page read and write
|
||
1396000
|
heap
|
page read and write
|
||
F1C000
|
heap
|
page read and write
|
||
11D6000
|
heap
|
page read and write
|
||
220D6000
|
heap
|
page read and write
|
||
220E0000
|
heap
|
page read and write
|
||
5140000
|
direct allocation
|
page execute and read and write
|
||
13A4000
|
heap
|
page read and write
|
||
13D6000
|
heap
|
page read and write
|
||
7D3C000
|
heap
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
7DE5000
|
heap
|
page read and write
|
||
DDD000
|
stack
|
page read and write
|
||
930000
|
unkown
|
page read and write
|
||
1050000
|
heap
|
page read and write
|
||
1159000
|
stack
|
page read and write
|
||
391E000
|
heap
|
page read and write
|
||
7CE6000
|
heap
|
page read and write
|
||
4C70000
|
trusted library allocation
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
7DC8000
|
heap
|
page read and write
|
||
419000
|
unkown
|
page read and write
|
||
7FB1000
|
heap
|
page read and write
|
||
1457000
|
heap
|
page read and write
|
||
10A6000
|
heap
|
page read and write
|
||
383E000
|
stack
|
page read and write
|
||
100E000
|
heap
|
page read and write
|
||
90A000
|
unkown
|
page execute and read and write
|
||
7E12000
|
heap
|
page read and write
|
||
472F000
|
stack
|
page read and write
|
||
DB8000
|
heap
|
page read and write
|
||
C09000
|
unkown
|
page execute and read and write
|
||
C2DA2FE000
|
stack
|
page read and write
|
||
102C000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
14D1000
|
heap
|
page read and write
|
||
840000
|
heap
|
page read and write
|
||
51D0000
|
direct allocation
|
page execute and read and write
|
||
7D3C000
|
heap
|
page read and write
|
||
104A000
|
heap
|
page read and write
|
||
7CC0000
|
heap
|
page read and write
|
||
E20000
|
heap
|
page read and write
|
||
39DE000
|
stack
|
page read and write
|
||
8142000
|
heap
|
page read and write
|
||
352F000
|
stack
|
page read and write
|
||
7E02000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
1AF0000
|
heap
|
page read and write
|
||
77BF000
|
stack
|
page read and write
|
||
7DD3000
|
heap
|
page read and write
|
||
1114000
|
heap
|
page read and write
|
||
5080000
|
direct allocation
|
page execute and read and write
|
||
1D41E905000
|
heap
|
page read and write
|
||
DAD000
|
unkown
|
page execute and read and write
|
||
1181000
|
heap
|
page read and write
|
||
7CEA000
|
heap
|
page read and write
|
||
13E6000
|
heap
|
page read and write
|
||
3232000
|
heap
|
page read and write
|
||
777F000
|
stack
|
page read and write
|
||
4C90000
|
direct allocation
|
page execute and read and write
|
||
7C90000
|
trusted library allocation
|
page read and write
|
||
402F000
|
stack
|
page read and write
|
||
3912000
|
heap
|
page read and write
|
||
2E4B000
|
trusted library allocation
|
page read and write
|
||
460E000
|
stack
|
page read and write
|
||
8171000
|
heap
|
page read and write
|
||
7D90000
|
heap
|
page read and write
|
||
2C00000
|
direct allocation
|
page read and write
|
||
D45000
|
heap
|
page read and write
|
||
FDB000
|
heap
|
page read and write
|
||
76D000
|
unkown
|
page read and write
|
||
1150000
|
heap
|
page read and write
|
||
2CA0000
|
heap
|
page execute and read and write
|
||
E7B000
|
heap
|
page read and write
|
||
512F000
|
stack
|
page read and write
|
||
5010000
|
direct allocation
|
page execute and read and write
|
||
4D51000
|
heap
|
page read and write
|
||
7DE7000
|
heap
|
page read and write
|
||
7FF0000
|
trusted library allocation
|
page read and write
|
||
4D51000
|
heap
|
page read and write
|
||
2ED7000
|
heap
|
page read and write
|
||
5100000
|
direct allocation
|
page execute and read and write
|
||
D0E000
|
heap
|
page read and write
|
||
7CB4000
|
heap
|
page read and write
|
||
6EC8000
|
heap
|
page read and write
|
||
1128000
|
heap
|
page read and write
|
||
8171000
|
heap
|
page read and write
|
||
41EE000
|
stack
|
page read and write
|
||
7E0000
|
unkown
|
page read and write
|
||
100E000
|
stack
|
page read and write
|
||
844000
|
heap
|
page read and write
|
||
4EAC000
|
stack
|
page read and write
|
||
2E5D000
|
trusted library allocation
|
page read and write
|
||
EF0000
|
direct allocation
|
page read and write
|
||
4CE1000
|
heap
|
page read and write
|
||
C90000
|
direct allocation
|
page read and write
|
||
14C0000
|
direct allocation
|
page read and write
|
||
115A000
|
heap
|
page read and write
|
||
1D436E60000
|
heap
|
page execute and read and write
|
||
7944000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
7E16000
|
heap
|
page read and write
|
||
7CD3000
|
heap
|
page read and write
|
||
4A70000
|
direct allocation
|
page read and write
|
||
931000
|
unkown
|
page execute and write copy
|
||
284B17C8000
|
heap
|
page read and write
|
||
13AE000
|
heap
|
page read and write
|
||
8126000
|
heap
|
page read and write
|
||
7D3C000
|
heap
|
page read and write
|
||
7CDB000
|
heap
|
page read and write
|
||
5210000
|
direct allocation
|
page execute and read and write
|
||
891000
|
unkown
|
page execute and write copy
|
||
4B71000
|
heap
|
page read and write
|
||
F9A000
|
heap
|
page read and write
|
||
C97000
|
heap
|
page read and write
|
||
4DE0000
|
direct allocation
|
page read and write
|
||
385F000
|
stack
|
page read and write
|
||
7CE6000
|
heap
|
page read and write
|
||
7C8B000
|
heap
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
45AE000
|
stack
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
47F1000
|
heap
|
page read and write
|
||
7DDE000
|
heap
|
page read and write
|
||
7DA7000
|
heap
|
page read and write
|
||
7CB5000
|
heap
|
page read and write
|
||
302F000
|
stack
|
page read and write
|
||
2F2E000
|
stack
|
page read and write
|
||
1D436F0C000
|
heap
|
page read and write
|
||
1456000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
14C2000
|
heap
|
page read and write
|
||
5210000
|
direct allocation
|
page execute and read and write
|
||
5250000
|
direct allocation
|
page execute and read and write
|
||
1D41CF5E000
|
heap
|
page read and write
|
||
7CBD000
|
heap
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
8176000
|
heap
|
page read and write
|
||
2A60000
|
trusted library allocation
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
465E000
|
stack
|
page read and write
|
||
C09000
|
unkown
|
page execute and read and write
|
||
1214000
|
heap
|
page read and write
|
||
767000
|
unkown
|
page readonly
|
||
3500000
|
direct allocation
|
page read and write
|
||
1D420395000
|
trusted library allocation
|
page read and write
|
||
844000
|
heap
|
page read and write
|
||
337F000
|
stack
|
page read and write
|
||
8153000
|
heap
|
page read and write
|
||
145F000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
DEE000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
7DBC000
|
heap
|
page read and write
|
||
47D0000
|
heap
|
page read and write
|
||
2EC0000
|
heap
|
page read and write
|
||
7CCC000
|
heap
|
page read and write
|
||
7CE7000
|
heap
|
page read and write
|
||
7CB5000
|
heap
|
page read and write
|
||
7DDD000
|
heap
|
page read and write
|
||
8240000
|
trusted library allocation
|
page read and write
|
||
5370000
|
heap
|
page read and write
|
||
CF9000
|
heap
|
page read and write
|
||
7CE7000
|
heap
|
page read and write
|
||
1B10000
|
heap
|
page read and write
|
||
111F000
|
heap
|
page read and write
|
||
E6A000
|
unkown
|
page execute and write copy
|
||
7DC0000
|
trusted library allocation
|
page read and write
|
||
7D36000
|
heap
|
page read and write
|
||
7CE6000
|
heap
|
page read and write
|
||
7A00000
|
trusted library allocation
|
page read and write
|
||
1196000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
812D000
|
heap
|
page read and write
|
||
844000
|
heap
|
page read and write
|
||
5120000
|
direct allocation
|
page execute and read and write
|
||
8240000
|
trusted library allocation
|
page read and write
|
||
EB2000
|
unkown
|
page write copy
|
||
DE0000
|
direct allocation
|
page read and write
|
||
38B2000
|
heap
|
page read and write
|
||
4CE1000
|
heap
|
page read and write
|
||
1114000
|
heap
|
page read and write
|
||
306E000
|
stack
|
page read and write
|
||
910000
|
unkown
|
page execute and read and write
|
||
3358000
|
heap
|
page read and write
|
||
140C000
|
heap
|
page read and write
|
||
8140000
|
heap
|
page read and write
|
||
7CDB000
|
heap
|
page read and write
|
||
19C000
|
stack
|
page read and write
|
||
111F000
|
heap
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
814B000
|
heap
|
page read and write
|
||
7E05000
|
heap
|
page read and write
|
||
392A000
|
heap
|
page read and write
|
||
773000
|
unkown
|
page readonly
|
||
3909000
|
heap
|
page read and write
|
||
51E0000
|
direct allocation
|
page execute and read and write
|
||
426B000
|
stack
|
page read and write
|
||
EB7000
|
unkown
|
page readonly
|
||
4DD1000
|
heap
|
page read and write
|
||
7CD3000
|
heap
|
page read and write
|
||
8171000
|
heap
|
page read and write
|
||
C2DAAFD000
|
stack
|
page read and write
|
||
7C6B000
|
heap
|
page read and write
|
||
4F3F000
|
stack
|
page read and write
|
||
7A7E000
|
stack
|
page read and write
|
||
1D436EA6000
|
heap
|
page read and write
|
||
7CAA000
|
heap
|
page read and write
|
||
2C00000
|
direct allocation
|
page read and write
|
||
5300000
|
direct allocation
|
page execute and read and write
|
||
1D420730000
|
trusted library allocation
|
page read and write
|
||
DEF000
|
stack
|
page read and write
|
||
7951000
|
heap
|
page read and write
|
||
F50000
|
heap
|
page read and write
|
||
5230000
|
direct allocation
|
page execute and read and write
|
||
1113000
|
heap
|
page read and write
|
||
4CC0000
|
heap
|
page read and write
|
||
7DF1000
|
heap
|
page read and write
|
||
13E7000
|
heap
|
page read and write
|
||
525E000
|
stack
|
page read and write
|
||
3378000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
3871000
|
heap
|
page read and write
|
||
2AD0000
|
heap
|
page read and write
|
||
767000
|
unkown
|
page readonly
|
||
1477000
|
heap
|
page read and write
|
||
7E36000
|
heap
|
page read and write
|
||
7E1E000
|
heap
|
page read and write
|
||
7CE6000
|
heap
|
page read and write
|
||
88A2AFD000
|
unkown
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
46AF000
|
stack
|
page read and write
|
||
1130000
|
heap
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
F80000
|
direct allocation
|
page execute and read and write
|
||
78ED000
|
stack
|
page read and write
|
||
5140000
|
direct allocation
|
page execute and read and write
|
||
439F000
|
stack
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
F0A000
|
heap
|
page read and write
|
||
419000
|
unkown
|
page write copy
|
||
51D0000
|
direct allocation
|
page execute and read and write
|
||
7DBC000
|
heap
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
342E000
|
stack
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
7DC6000
|
heap
|
page read and write
|
||
7CDD000
|
heap
|
page read and write
|
||
7D05000
|
heap
|
page read and write
|
||
3C34000
|
heap
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
7CD7000
|
heap
|
page read and write
|
||
3E2E000
|
stack
|
page read and write
|
||
940000
|
unkown
|
page readonly
|
||
119E000
|
stack
|
page read and write
|
||
7CFD000
|
heap
|
page read and write
|
||
4A70000
|
direct allocation
|
page read and write
|
||
7CEB000
|
heap
|
page read and write
|
||
701000
|
unkown
|
page execute read
|
||
4981000
|
heap
|
page read and write
|
||
7DEB000
|
heap
|
page read and write
|
||
8172000
|
heap
|
page read and write
|
||
1D41EDD0000
|
heap
|
page execute and read and write
|
||
7CE6000
|
heap
|
page read and write
|
||
220D6000
|
heap
|
page read and write
|
||
8153000
|
heap
|
page read and write
|
||
38B3000
|
heap
|
page read and write
|
||
E50000
|
unkown
|
page readonly
|
||
82F0000
|
heap
|
page read and write
|
||
3501000
|
heap
|
page read and write
|
||
7FB1000
|
heap
|
page read and write
|
||
7C9E000
|
heap
|
page read and write
|
||
13B2000
|
heap
|
page read and write
|
||
11BA000
|
heap
|
page read and write
|
||
8161000
|
heap
|
page read and write
|
||
412000
|
unkown
|
page readonly
|
||
1384000
|
heap
|
page read and write
|
||
5230000
|
direct allocation
|
page execute and read and write
|
||
7C9E000
|
heap
|
page read and write
|
||
79AD000
|
stack
|
page read and write
|
||
EFA000
|
stack
|
page read and write
|
||
AC6000
|
unkown
|
page execute read
|
||
7CDB000
|
heap
|
page read and write
|
||
47F1000
|
heap
|
page read and write
|
||
2A5A000
|
trusted library allocation
|
page execute and read and write
|
||
119E000
|
heap
|
page read and write
|
||
76BE000
|
stack
|
page read and write
|
||
1185000
|
heap
|
page read and write
|
||
7951000
|
heap
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
352F000
|
stack
|
page read and write
|
||
1490000
|
remote allocation
|
page read and write
|
||
4A70000
|
direct allocation
|
page read and write
|
||
7D3C000
|
heap
|
page read and write
|
||
46EE000
|
stack
|
page read and write
|
||
284B16E0000
|
heap
|
page read and write
|
||
4D51000
|
heap
|
page read and write
|
||
347E000
|
stack
|
page read and write
|
||
C21000
|
unkown
|
page execute and write copy
|
||
394F000
|
heap
|
page read and write
|
||
7D3C000
|
heap
|
page read and write
|
||
7CB5000
|
heap
|
page read and write
|
||
50E0000
|
direct allocation
|
page execute and read and write
|
||
FC9000
|
heap
|
page read and write
|
||
882000
|
unkown
|
page execute and read and write
|
||
F8D000
|
heap
|
page read and write
|
||
4E63000
|
direct allocation
|
page read and write
|
||
7D0F000
|
heap
|
page read and write
|
||
994000
|
unkown
|
page execute and read and write
|
||
1113000
|
heap
|
page read and write
|
||
220F7000
|
heap
|
page read and write
|
||
730000
|
unkown
|
page readonly
|
||
98B000
|
unkown
|
page execute and read and write
|
||
1470000
|
heap
|
page read and write
|
||
40AE000
|
stack
|
page read and write
|
||
52F0000
|
direct allocation
|
page execute and read and write
|
||
5040000
|
direct allocation
|
page execute and read and write
|
||
7DF3000
|
heap
|
page read and write
|
||
452F000
|
stack
|
page read and write
|
||
66FF000
|
stack
|
page read and write
|
||
436D000
|
stack
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
C2DA7FE000
|
stack
|
page read and write
|
||
31E7000
|
heap
|
page read and write
|
||
1B1E000
|
heap
|
page read and write
|
||
47F1000
|
heap
|
page read and write
|
||
999000
|
unkown
|
page read and write
|
||
4C5F000
|
stack
|
page read and write
|
||
7DCA000
|
heap
|
page read and write
|
||
FBF000
|
heap
|
page read and write
|
||
1360000
|
heap
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
2C00000
|
direct allocation
|
page read and write
|
||
14E0000
|
direct allocation
|
page read and write
|
||
5030000
|
direct allocation
|
page execute and read and write
|
||
EF0000
|
direct allocation
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
7CC1000
|
heap
|
page read and write
|
||
EB7000
|
unkown
|
page readonly
|
||
FC2000
|
heap
|
page read and write
|
||
E6E000
|
heap
|
page read and write
|
||
1340000
|
direct allocation
|
page read and write
|
||
26AE000
|
stack
|
page read and write
|
||
D1B000
|
heap
|
page read and write
|
||
99B000
|
unkown
|
page execute and read and write
|
||
7CE3000
|
heap
|
page read and write
|
||
31CF000
|
stack
|
page read and write
|
||
11A1000
|
heap
|
page read and write
|
||
5020000
|
direct allocation
|
page execute and read and write
|
||
D03000
|
heap
|
page read and write
|
||
1440000
|
heap
|
page read and write
|
||
624000
|
remote allocation
|
page execute and read and write
|
||
7CE7000
|
heap
|
page read and write
|
||
37EE000
|
stack
|
page read and write
|
||
144A000
|
heap
|
page read and write
|
||
284B16C0000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
356E000
|
stack
|
page read and write
|
||
7CDD000
|
heap
|
page read and write
|
||
FBF000
|
heap
|
page read and write
|
||
51E5000
|
direct allocation
|
page read and write
|
||
320E000
|
stack
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
7CD3000
|
heap
|
page read and write
|
||
442F000
|
stack
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
844000
|
heap
|
page read and write
|
||
2C7E000
|
stack
|
page read and write
|
||
28189000
|
heap
|
page read and write
|
||
E50000
|
unkown
|
page readonly
|
||
3241000
|
heap
|
page read and write
|
||
815F000
|
heap
|
page read and write
|
||
7C8B000
|
heap
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
974000
|
unkown
|
page execute and read and write
|
||
7D89000
|
heap
|
page read and write
|
||
7CE1000
|
heap
|
page read and write
|
||
251F7590000
|
trusted library allocation
|
page read and write
|
||
7C9E000
|
heap
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
3923000
|
heap
|
page read and write
|
||
DF5000
|
heap
|
page read and write
|
||
2EC5000
|
direct allocation
|
page read and write
|
||
13B0000
|
heap
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
8155000
|
heap
|
page read and write
|
||
7CEB000
|
heap
|
page read and write
|
||
33AF000
|
stack
|
page read and write
|
||
1D41F008000
|
trusted library allocation
|
page read and write
|
||
7D3C000
|
heap
|
page read and write
|
||
4A70000
|
direct allocation
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
DB3000
|
unkown
|
page execute and write copy
|
||
52D0000
|
direct allocation
|
page execute and read and write
|
||
4C0F000
|
stack
|
page read and write
|
||
7CCD000
|
heap
|
page read and write
|
||
4DE0000
|
direct allocation
|
page read and write
|
||
2E02000
|
trusted library allocation
|
page read and write
|
||
7DF1000
|
heap
|
page read and write
|
||
E78000
|
heap
|
page read and write
|
||
251F7190000
|
trusted library allocation
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
7DF8000
|
heap
|
page read and write
|
||
1185000
|
heap
|
page read and write
|
||
7CB5000
|
heap
|
page read and write
|
||
1185000
|
heap
|
page read and write
|
||
7D3C000
|
heap
|
page read and write
|
||
2C5F000
|
stack
|
page read and write
|
||
3B6F000
|
stack
|
page read and write
|
||
844000
|
heap
|
page read and write
|
||
7C8B000
|
heap
|
page read and write
|
||
5080000
|
direct allocation
|
page execute and read and write
|
||
7CDD000
|
heap
|
page read and write
|
||
143F000
|
heap
|
page read and write
|
||
2BFE000
|
stack
|
page read and write
|
||
4CD0000
|
direct allocation
|
page execute and read and write
|
||
1A2F000
|
stack
|
page read and write
|
||
32AF000
|
stack
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
7D1E000
|
heap
|
page read and write
|
||
220DB000
|
heap
|
page read and write
|
||
9EC000
|
stack
|
page read and write
|
||
14C7000
|
heap
|
page read and write
|
||
51B0000
|
direct allocation
|
page execute and read and write
|
||
3276000
|
heap
|
page read and write
|
||
8050000
|
trusted library allocation
|
page read and write
|
||
8161000
|
heap
|
page read and write
|
||
3920000
|
heap
|
page read and write
|
||
2EB0000
|
direct allocation
|
page read and write
|
||
7DD0000
|
heap
|
page read and write
|
||
220D2000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
8172000
|
heap
|
page read and write
|
||
8149000
|
heap
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
4DC0000
|
direct allocation
|
page read and write
|
||
1D41E8B0000
|
heap
|
page read and write
|
||
128F000
|
stack
|
page read and write
|
||
7CF2000
|
heap
|
page read and write
|
||
7DE8000
|
heap
|
page read and write
|
||
2ABE000
|
stack
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
14DC000
|
heap
|
page read and write
|
||
C40000
|
unkown
|
page execute and write copy
|
||
13A4000
|
heap
|
page read and write
|
||
3950000
|
heap
|
page read and write
|
||
37FF000
|
stack
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
DFA000
|
heap
|
page read and write
|
||
4F89000
|
stack
|
page read and write
|
||
1439000
|
heap
|
page read and write
|
||
7CDF000
|
heap
|
page read and write
|
||
13B9000
|
heap
|
page read and write
|
||
C7D000
|
heap
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
1D4202F3000
|
trusted library allocation
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
5040000
|
direct allocation
|
page execute and read and write
|
||
2C00000
|
direct allocation
|
page read and write
|
||
C8542FE000
|
stack
|
page read and write
|
||
7DF1000
|
heap
|
page read and write
|
||
7F7000
|
unkown
|
page readonly
|
||
1384000
|
heap
|
page read and write
|
||
1447000
|
heap
|
page read and write
|
||
146F000
|
heap
|
page read and write
|
||
11A0000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
7DBC000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
2EB0000
|
direct allocation
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
14BF000
|
heap
|
page read and write
|
||
7CEA000
|
heap
|
page read and write
|
||
10ED000
|
stack
|
page read and write
|
||
53C7000
|
heap
|
page read and write
|
||
11E0000
|
direct allocation
|
page read and write
|
||
1300000
|
heap
|
page read and write
|
||
7CED000
|
heap
|
page read and write
|
||
7FBB000
|
heap
|
page read and write
|
||
142F000
|
heap
|
page read and write
|
||
3690000
|
heap
|
page read and write
|
||
3B6E000
|
stack
|
page read and write
|
||
701000
|
unkown
|
page execute read
|
||
5120000
|
direct allocation
|
page execute and read and write
|
||
7CEA000
|
heap
|
page read and write
|
||
D72000
|
heap
|
page read and write
|
||
38AF000
|
heap
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
284B17FD000
|
heap
|
page read and write
|
||
146E000
|
heap
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
7DD3000
|
heap
|
page read and write
|
||
394F000
|
heap
|
page read and write
|
||
1114000
|
heap
|
page read and write
|
||
11B2000
|
heap
|
page read and write
|
||
446E000
|
stack
|
page read and write
|
||
4CE1000
|
heap
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
EEE000
|
stack
|
page read and write
|
||
2BBC000
|
stack
|
page read and write
|
||
4DE0000
|
direct allocation
|
page read and write
|
||
3E8E000
|
stack
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
7E0000
|
unkown
|
page readonly
|
||
7DC8000
|
heap
|
page read and write
|
||
DB9000
|
unkown
|
page execute and read and write
|
||
81A9000
|
heap
|
page read and write
|
||
470F000
|
stack
|
page read and write
|
||
7DBA000
|
heap
|
page read and write
|
||
B1E000
|
unkown
|
page execute and read and write
|
||
7DBC000
|
heap
|
page read and write
|
||
4D51000
|
heap
|
page read and write
|
||
7C68000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
2EC7000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
14C0000
|
direct allocation
|
page read and write
|
||
7CCF000
|
heap
|
page read and write
|
||
7CE6000
|
heap
|
page read and write
|
||
143F000
|
heap
|
page read and write
|
||
7CED000
|
heap
|
page read and write
|
||
46EE000
|
stack
|
page read and write
|
||
CA0000
|
direct allocation
|
page read and write
|
||
1447000
|
heap
|
page read and write
|
||
7FF0000
|
trusted library allocation
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
52C3000
|
direct allocation
|
page read and write
|
||
2F34000
|
heap
|
page read and write
|
||
C2DA6FE000
|
stack
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
5120000
|
direct allocation
|
page execute and read and write
|
||
14BA000
|
heap
|
page read and write
|
||
3344000
|
heap
|
page read and write
|
||
47F1000
|
heap
|
page read and write
|
||
7905000
|
heap
|
page read and write
|
||
10F0000
|
direct allocation
|
page read and write
|
||
750000
|
unkown
|
page readonly
|
||
7A3000
|
unkown
|
page readonly
|
||
8161000
|
heap
|
page read and write
|
||
7D3C000
|
heap
|
page read and write
|
||
45BF000
|
stack
|
page read and write
|
||
1D42038F000
|
trusted library allocation
|
page read and write
|
||
4D51000
|
heap
|
page read and write
|
||
38AA000
|
heap
|
page read and write
|
||
76D000
|
unkown
|
page write copy
|
||
7CFF000
|
heap
|
page read and write
|
||
7E1000
|
unkown
|
page execute and read and write
|
||
3ABE000
|
stack
|
page read and write
|
||
D72000
|
heap
|
page read and write
|
||
42EE000
|
stack
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
49CE000
|
stack
|
page read and write
|
||
5387000
|
heap
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
2A7E000
|
stack
|
page read and write
|
||
4A1E000
|
stack
|
page read and write
|
||
389E000
|
stack
|
page read and write
|
||
76D000
|
unkown
|
page write copy
|
||
1D41FD94000
|
trusted library allocation
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
4A70000
|
direct allocation
|
page read and write
|
||
192E000
|
stack
|
page read and write
|
||
7D18000
|
heap
|
page read and write
|
||
E20000
|
heap
|
page read and write
|
||
11B0000
|
trusted library allocation
|
page read and write
|
||
7D10000
|
heap
|
page read and write
|
||
8172000
|
heap
|
page read and write
|
||
19F7000
|
unkown
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
220E3000
|
heap
|
page read and write
|
||
72BD000
|
heap
|
page read and write
|
||
1181000
|
heap
|
page read and write
|
||
7CF4000
|
heap
|
page read and write
|
||
1083000
|
trusted library allocation
|
page execute and read and write
|
||
1100000
|
heap
|
page read and write
|
||
7D3D000
|
heap
|
page read and write
|
||
14BA000
|
heap
|
page read and write
|
||
7C68000
|
heap
|
page read and write
|
||
7DC8000
|
heap
|
page read and write
|
||
7CB4000
|
heap
|
page read and write
|
||
8171000
|
heap
|
page read and write
|
||
4DF0000
|
heap
|
page read and write
|
||
79BD000
|
stack
|
page read and write
|
||
51D0000
|
direct allocation
|
page execute and read and write
|
||
C11000
|
unkown
|
page execute and read and write
|
||
4981000
|
heap
|
page read and write
|
||
7A10000
|
remote allocation
|
page read and write
|
||
DBA000
|
stack
|
page read and write
|
||
3BBF000
|
stack
|
page read and write
|
||
7CB4000
|
heap
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
7C6E000
|
stack
|
page read and write
|
||
DD6000
|
heap
|
page read and write
|
||
7D07000
|
heap
|
page read and write
|
||
1127000
|
heap
|
page read and write
|
||
8124000
|
heap
|
page read and write
|
||
8171000
|
heap
|
page read and write
|
||
19F9000
|
unkown
|
page readonly
|
||
50F0000
|
direct allocation
|
page execute and read and write
|
||
4981000
|
heap
|
page read and write
|
||
1F380142000
|
trusted library allocation
|
page read and write
|
||
750000
|
unkown
|
page readonly
|
||
2E3F000
|
stack
|
page read and write
|
||
425F000
|
stack
|
page read and write
|
||
5020000
|
direct allocation
|
page execute and read and write
|
||
2F10000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
DB3000
|
heap
|
page read and write
|
||
4B8E000
|
stack
|
page read and write
|
||
7CAA000
|
heap
|
page read and write
|
||
7C8B000
|
heap
|
page read and write
|
||
5130000
|
direct allocation
|
page execute and read and write
|
||
13CC000
|
heap
|
page read and write
|
||
806000
|
unkown
|
page readonly
|
||
7CE0000
|
heap
|
page read and write
|
||
7FF0000
|
trusted library allocation
|
page read and write
|
||
1440000
|
heap
|
page read and write
|
||
4EB0000
|
heap
|
page read and write
|
||
999000
|
unkown
|
page write copy
|
||
7DD7000
|
heap
|
page read and write
|
||
781000
|
unkown
|
page execute and read and write
|
||
4981000
|
heap
|
page read and write
|
||
7C9E000
|
heap
|
page read and write
|
||
1D436E70000
|
heap
|
page read and write
|
||
7D3C000
|
heap
|
page read and write
|
||
1040000
|
heap
|
page read and write
|
||
1402000
|
heap
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
967000
|
unkown
|
page write copy
|
||
EB7000
|
unkown
|
page readonly
|
||
FC9000
|
heap
|
page read and write
|
||
7FB6000
|
heap
|
page read and write
|
||
11D7000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
FF9000
|
heap
|
page read and write
|
||
5190000
|
direct allocation
|
page execute and read and write
|
||
7CEA000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
220E0000
|
heap
|
page read and write
|
||
36FE000
|
stack
|
page read and write
|
||
316E000
|
stack
|
page read and write
|
||
7D3C000
|
heap
|
page read and write
|
||
51D0000
|
direct allocation
|
page execute and read and write
|
||
53F0000
|
direct allocation
|
page execute and read and write
|
||
7FF0000
|
trusted library allocation
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
7CDD000
|
heap
|
page read and write
|
||
1110000
|
heap
|
page read and write
|
||
C7A000
|
heap
|
page read and write
|
||
7E2B000
|
heap
|
page read and write
|
||
13FE000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
967000
|
unkown
|
page write copy
|
||
7C60000
|
heap
|
page read and write
|
||
10F0000
|
direct allocation
|
page read and write
|
||
4F90000
|
direct allocation
|
page execute and read and write
|
||
FF0000
|
heap
|
page read and write
|
||
115E000
|
stack
|
page read and write
|
||
3319000
|
heap
|
page read and write
|
||
12DE000
|
stack
|
page read and write
|
||
7CF4000
|
heap
|
page read and write
|
||
13BE000
|
heap
|
page read and write
|
||
D1A000
|
heap
|
page read and write
|
||
7DD0000
|
heap
|
page read and write
|
||
4D70000
|
direct allocation
|
page execute and read and write
|
||
3F6E000
|
stack
|
page read and write
|
||
FF3000
|
heap
|
page read and write
|
||
3BE3000
|
heap
|
page read and write
|
||
7CE9000
|
heap
|
page read and write
|
||
7DBC000
|
heap
|
page read and write
|
||
4B70000
|
heap
|
page read and write
|
||
73FD000
|
stack
|
page read and write
|
||
4D60000
|
trusted library allocation
|
page read and write
|
||
DB6000
|
heap
|
page read and write
|
||
14D9000
|
heap
|
page read and write
|
||
394F000
|
heap
|
page read and write
|
||
7CF0000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
82FB000
|
heap
|
page read and write
|
||
42EF000
|
stack
|
page read and write
|
||
2CE7000
|
heap
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
7DBC000
|
heap
|
page read and write
|
||
4E3E000
|
stack
|
page read and write
|
||
220E0000
|
heap
|
page read and write
|
||
4C90000
|
direct allocation
|
page execute and read and write
|
||
3925000
|
heap
|
page read and write
|
||
7947000
|
heap
|
page read and write
|
||
F51000
|
heap
|
page read and write
|
||
3178000
|
heap
|
page read and write
|
||
1114000
|
heap
|
page read and write
|
||
D6B000
|
heap
|
page read and write
|
||
D16000
|
heap
|
page read and write
|
||
4DE0000
|
direct allocation
|
page read and write
|
||
1104000
|
trusted library allocation
|
page read and write
|
||
AE9000
|
unkown
|
page execute and read and write
|
||
2C00000
|
direct allocation
|
page read and write
|
||
7D3C000
|
heap
|
page read and write
|
||
8240000
|
trusted library allocation
|
page read and write
|
||
502E000
|
stack
|
page read and write
|
||
302F000
|
stack
|
page read and write
|
||
13BF000
|
stack
|
page read and write
|
||
1D41E90A000
|
heap
|
page read and write
|
||
7DD3000
|
heap
|
page read and write
|
||
51D0000
|
direct allocation
|
page execute and read and write
|
||
1444000
|
heap
|
page read and write
|
||
4CE1000
|
heap
|
page read and write
|
||
7CB5000
|
heap
|
page read and write
|
||
763D000
|
stack
|
page read and write
|
||
392E000
|
stack
|
page read and write
|
||
30CF000
|
stack
|
page read and write
|
||
1447000
|
heap
|
page read and write
|
||
13DE000
|
stack
|
page read and write
|
||
7D07000
|
heap
|
page read and write
|
||
1D420937000
|
trusted library allocation
|
page read and write
|
||
146F000
|
heap
|
page read and write
|
||
7FC2000
|
heap
|
page read and write
|
||
4F60000
|
direct allocation
|
page execute and read and write
|
||
4D90000
|
direct allocation
|
page execute and read and write
|
||
3900000
|
heap
|
page read and write
|
||
844000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
815F000
|
heap
|
page read and write
|
||
7DC000
|
stack
|
page read and write
|
||
112B000
|
trusted library allocation
|
page execute and read and write
|
||
424E000
|
stack
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
C2DA9FA000
|
stack
|
page read and write
|
||
4D51000
|
heap
|
page read and write
|
||
DB3000
|
heap
|
page read and write
|
||
7CBE000
|
heap
|
page read and write
|
||
145B000
|
heap
|
page read and write
|
||
3E4F000
|
stack
|
page read and write
|
||
157F000
|
stack
|
page read and write
|
||
EE8000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
31D0000
|
heap
|
page read and write
|
||
8172000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
4D51000
|
heap
|
page read and write
|
||
2EB0000
|
direct allocation
|
page read and write
|
||
7D18000
|
heap
|
page read and write
|
||
771000
|
unkown
|
page read and write
|
||
492F000
|
stack
|
page read and write
|
||
390D000
|
heap
|
page read and write
|
||
DD8000
|
unkown
|
page execute and read and write
|
||
393F000
|
stack
|
page read and write
|
||
13D6000
|
heap
|
page read and write
|
||
E95000
|
heap
|
page read and write
|
||
844000
|
heap
|
page read and write
|
||
8161000
|
heap
|
page read and write
|
||
53CA000
|
heap
|
page read and write
|
||
CD3000
|
unkown
|
page execute and write copy
|
||
2B2E000
|
stack
|
page read and write
|
||
4DC0000
|
direct allocation
|
page read and write
|
||
2C91000
|
trusted library allocation
|
page execute and read and write
|
||
316E000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
7C8B000
|
heap
|
page read and write
|
||
145D000
|
heap
|
page read and write
|
||
8E4000
|
unkown
|
page execute and read and write
|
||
F18000
|
direct allocation
|
page read and write
|
||
47F1000
|
heap
|
page read and write
|
||
AA5000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
7FE000
|
unkown
|
page execute and read and write
|
||
CDA000
|
unkown
|
page execute and write copy
|
||
4DD1000
|
heap
|
page read and write
|
||
7CF4000
|
heap
|
page read and write
|
||
8050000
|
trusted library allocation
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
47F1000
|
heap
|
page read and write
|
||
5040000
|
direct allocation
|
page execute and read and write
|
||
6275000
|
heap
|
page read and write
|
||
79FD000
|
stack
|
page read and write
|
||
7CB4000
|
heap
|
page read and write
|
||
1F380144000
|
trusted library allocation
|
page read and write
|
||
4D00000
|
direct allocation
|
page execute and read and write
|
||
8171000
|
heap
|
page read and write
|
||
7CFE000
|
heap
|
page read and write
|
||
14D1000
|
heap
|
page read and write
|
||
3DEF000
|
stack
|
page read and write
|
||
14C3000
|
heap
|
page read and write
|
||
3923000
|
heap
|
page read and write
|
||
1477000
|
heap
|
page read and write
|
||
7D00000
|
heap
|
page read and write
|
||
7A3000
|
unkown
|
page readonly
|
||
31E0000
|
heap
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
220C6000
|
heap
|
page read and write
|
||
DB9000
|
unkown
|
page execute and read and write
|
||
45AE000
|
stack
|
page read and write
|
||
28196000
|
heap
|
page read and write
|
||
F90000
|
heap
|
page read and write
|
||
7D3C000
|
heap
|
page read and write
|
||
88A2BFE000
|
stack
|
page read and write
|
||
7CB4000
|
heap
|
page read and write
|
||
1D42034D000
|
trusted library allocation
|
page read and write
|
||
47AF000
|
stack
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
7B7F000
|
stack
|
page read and write
|
||
8171000
|
heap
|
page read and write
|
||
8153000
|
heap
|
page read and write
|
||
7914000
|
heap
|
page read and write
|
||
47EF000
|
stack
|
page read and write
|
||
EAE000
|
stack
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
91E000
|
unkown
|
page execute and read and write
|
||
390D000
|
heap
|
page read and write
|
||
390B000
|
heap
|
page read and write
|
||
3CAE000
|
stack
|
page read and write
|
||
2EC0000
|
direct allocation
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1D42EE5C000
|
trusted library allocation
|
page read and write
|
||
4A8E000
|
stack
|
page read and write
|
||
7CCD000
|
heap
|
page read and write
|
||
762000
|
unkown
|
page readonly
|
||
44DF000
|
stack
|
page read and write
|
||
326F000
|
stack
|
page read and write
|
||
284B17B0000
|
heap
|
page read and write
|
||
8F0000
|
unkown
|
page execute and read and write
|
||
397F000
|
stack
|
page read and write
|
||
11A2000
|
heap
|
page read and write
|
||
D7C000
|
heap
|
page read and write
|
||
F51000
|
heap
|
page read and write
|
||
419000
|
unkown
|
page write copy
|
||
7CF0000
|
heap
|
page read and write
|
||
D10000
|
heap
|
page read and write
|
||
ECE000
|
heap
|
page read and write
|
||
366F000
|
stack
|
page read and write
|
||
7FF0000
|
trusted library allocation
|
page read and write
|
||
5040000
|
direct allocation
|
page execute and read and write
|
||
12C3000
|
heap
|
page read and write
|
||
96C000
|
unkown
|
page read and write
|
||
4CE1000
|
heap
|
page read and write
|
||
38B7000
|
heap
|
page read and write
|
||
11C1000
|
heap
|
page read and write
|
||
894000
|
unkown
|
page execute and read and write
|
||
2DC0000
|
direct allocation
|
page read and write
|
||
65FE000
|
stack
|
page read and write
|
||
3C30000
|
heap
|
page read and write
|
||
1038000
|
heap
|
page read and write
|
||
DB3000
|
heap
|
page read and write
|
||
11AB000
|
heap
|
page read and write
|
||
406E000
|
stack
|
page read and write
|
||
284B180D000
|
heap
|
page read and write
|
||
1050000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
40FE000
|
stack
|
page read and write
|
||
1169000
|
heap
|
page read and write
|
||
D2D000
|
heap
|
page read and write
|
||
47E0000
|
heap
|
page read and write
|
||
8140000
|
heap
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
406F000
|
stack
|
page read and write
|
||
3CEE000
|
stack
|
page read and write
|
||
97E000
|
stack
|
page read and write
|
||
8161000
|
heap
|
page read and write
|
||
1D42F0D9000
|
trusted library allocation
|
page read and write
|
||
76C000
|
unkown
|
page write copy
|
||
3E2E000
|
stack
|
page read and write
|
||
3950000
|
heap
|
page read and write
|
||
7DC2000
|
heap
|
page read and write
|
||
371F000
|
stack
|
page read and write
|
||
7A4000
|
unkown
|
page execute and read and write
|
||
1384000
|
heap
|
page read and write
|
||
773000
|
unkown
|
page readonly
|
||
7D3C000
|
heap
|
page read and write
|
||
F0A000
|
heap
|
page read and write
|
||
8050000
|
trusted library allocation
|
page read and write
|
||
38FE000
|
heap
|
page read and write
|
||
7CDE000
|
heap
|
page read and write
|
||
967000
|
unkown
|
page read and write
|
||
D77000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
78AD000
|
stack
|
page read and write
|
||
4DAC000
|
stack
|
page read and write
|
||
1418000
|
heap
|
page read and write
|
||
119E000
|
stack
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
7D3E000
|
heap
|
page read and write
|
||
47F1000
|
heap
|
page read and write
|
||
1D420547000
|
trusted library allocation
|
page read and write
|
||
330F000
|
heap
|
page read and write
|
||
50A0000
|
direct allocation
|
page execute and read and write
|
||
5040000
|
direct allocation
|
page execute and read and write
|
||
8171000
|
heap
|
page read and write
|
||
4FE0000
|
direct allocation
|
page execute and read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
7D27000
|
heap
|
page read and write
|
||
494B000
|
stack
|
page read and write
|
||
1548000
|
stack
|
page read and write
|
||
1510000
|
direct allocation
|
page read and write
|
||
2F2E000
|
stack
|
page read and write
|
||
284B3350000
|
heap
|
page read and write
|
||
4ED6000
|
heap
|
page read and write
|
||
2F7E000
|
stack
|
page read and write
|
||
7C90000
|
trusted library allocation
|
page read and write
|
||
647F000
|
stack
|
page read and write
|
||
844000
|
heap
|
page read and write
|
||
38FE000
|
heap
|
page read and write
|
||
7650000
|
remote allocation
|
page read and write
|
||
429E000
|
stack
|
page read and write
|
||
8175000
|
heap
|
page read and write
|
||
E4F000
|
heap
|
page read and write
|
||
14DC000
|
heap
|
page read and write
|
||
773000
|
unkown
|
page readonly
|
||
11A4000
|
heap
|
page read and write
|
||
844000
|
heap
|
page read and write
|
||
6D40000
|
heap
|
page read and write
|
||
10AE000
|
stack
|
page read and write
|
||
8172000
|
heap
|
page read and write
|
||
2C00000
|
direct allocation
|
page read and write
|
||
32D8000
|
heap
|
page read and write
|
||
D27000
|
heap
|
page read and write
|
||
8159000
|
heap
|
page read and write
|
||
5000000
|
direct allocation
|
page execute and read and write
|
||
1070000
|
heap
|
page read and write
|
||
8171000
|
heap
|
page read and write
|
||
7CE7000
|
heap
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
4D4F000
|
stack
|
page read and write
|
||
1D41E900000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
1050000
|
direct allocation
|
page read and write
|
||
636000
|
remote allocation
|
page execute and read and write
|
||
D13000
|
heap
|
page read and write
|
||
10E0000
|
heap
|
page read and write
|
||
7C8B000
|
heap
|
page read and write
|
||
220C6000
|
heap
|
page read and write
|
||
3A6E000
|
stack
|
page read and write
|
||
8136000
|
heap
|
page read and write
|
||
F00000
|
heap
|
page read and write
|
||
1002000
|
heap
|
page read and write
|
||
98E000
|
unkown
|
page readonly
|
||
13A4000
|
heap
|
page read and write
|
||
7D3C000
|
heap
|
page read and write
|
||
7E36000
|
heap
|
page read and write
|
||
7DC8000
|
heap
|
page read and write
|
||
7C8B000
|
heap
|
page read and write
|
||
7FB9000
|
heap
|
page read and write
|
||
1013000
|
heap
|
page read and write
|
||
7CDD000
|
heap
|
page read and write
|
||
1D420361000
|
trusted library allocation
|
page read and write
|
||
5140000
|
direct allocation
|
page execute and read and write
|
||
14D0000
|
direct allocation
|
page read and write
|
||
962000
|
unkown
|
page execute and read and write
|
||
7CB4000
|
heap
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
FC7000
|
heap
|
page read and write
|
||
8240000
|
trusted library allocation
|
page read and write
|
||
7C9E000
|
heap
|
page read and write
|
||
DAE000
|
unkown
|
page execute and write copy
|
||
384E000
|
stack
|
page read and write
|
||
E13000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
7D18000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
C8546F7000
|
stack
|
page read and write
|
||
8168000
|
heap
|
page read and write
|
||
113F000
|
heap
|
page read and write
|
||
1084000
|
trusted library allocation
|
page read and write
|
||
7D3C000
|
heap
|
page read and write
|
||
7CB5000
|
heap
|
page read and write
|
||
844000
|
heap
|
page read and write
|
||
284B1811000
|
heap
|
page read and write
|
||
7D1A000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
7E1E000
|
heap
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
930000
|
unkown
|
page readonly
|
||
348E000
|
stack
|
page read and write
|
||
FD8000
|
heap
|
page read and write
|
||
1181000
|
heap
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
7D3C000
|
heap
|
page read and write
|
||
7CAA000
|
heap
|
page read and write
|
||
7D71000
|
heap
|
page read and write
|
||
7D3C000
|
heap
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
EF0000
|
direct allocation
|
page read and write
|
||
3355000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
7FB1000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
2C00000
|
direct allocation
|
page read and write
|
||
7CFD000
|
heap
|
page read and write
|
||
8050000
|
trusted library allocation
|
page read and write
|
||
8140000
|
heap
|
page read and write
|
||
4A6E000
|
stack
|
page read and write
|
||
1426000
|
heap
|
page read and write
|
||
251F7190000
|
trusted library allocation
|
page read and write
|
||
32AF000
|
stack
|
page read and write
|
||
2DC0000
|
direct allocation
|
page read and write
|
||
4C90000
|
direct allocation
|
page execute and read and write
|
||
7CEB000
|
heap
|
page read and write
|
||
13BA000
|
heap
|
page read and write
|
||
2E7E000
|
stack
|
page read and write
|
||
4DED000
|
stack
|
page read and write
|
||
2C00000
|
direct allocation
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
4DE0000
|
direct allocation
|
page read and write
|
||
4CE1000
|
heap
|
page read and write
|
||
C9D000
|
stack
|
page read and write
|
||
DC4000
|
heap
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
3217000
|
heap
|
page read and write
|
||
391B000
|
heap
|
page read and write
|
||
4D51000
|
heap
|
page read and write
|
||
9DE000
|
stack
|
page read and write
|
||
D1E000
|
heap
|
page read and write
|
||
14BA000
|
heap
|
page read and write
|
||
701000
|
unkown
|
page execute and write copy
|
||
220DD000
|
heap
|
page read and write
|
||
7CD9000
|
heap
|
page read and write
|
||
2DEE000
|
stack
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
1181000
|
heap
|
page read and write
|
||
456F000
|
stack
|
page read and write
|
||
960000
|
unkown
|
page execute and read and write
|
||
918000
|
unkown
|
page execute and read and write
|
||
CD6000
|
unkown
|
page execute and write copy
|
||
4CF0000
|
direct allocation
|
page execute and read and write
|
||
4981000
|
heap
|
page read and write
|
||
4CE1000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
8153000
|
heap
|
page read and write
|
||
7FF0000
|
trusted library allocation
|
page read and write
|
||
7C68000
|
heap
|
page read and write
|
||
792000
|
unkown
|
page read and write
|
||
4C4E000
|
stack
|
page read and write
|
||
7DA6000
|
heap
|
page read and write
|
||
14C2000
|
heap
|
page read and write
|
||
5360000
|
remote allocation
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
7CEB000
|
heap
|
page read and write
|
||
7CF7000
|
heap
|
page read and write
|
||
5220000
|
direct allocation
|
page execute and read and write
|
||
7CE6000
|
heap
|
page read and write
|
||
90C000
|
unkown
|
page execute and read and write
|
||
5040000
|
direct allocation
|
page execute and read and write
|
||
10C0000
|
heap
|
page read and write
|
||
4D51000
|
heap
|
page read and write
|
||
284B17C5000
|
heap
|
page read and write
|
||
48EF000
|
stack
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
13DC000
|
heap
|
page read and write
|
||
356E000
|
stack
|
page read and write
|
||
5260000
|
direct allocation
|
page read and write
|
||
220DA000
|
heap
|
page read and write
|
||
7CE6000
|
heap
|
page read and write
|
||
14D1000
|
heap
|
page read and write
|
||
791B000
|
heap
|
page read and write
|
||
3EEF000
|
stack
|
page read and write
|
||
8171000
|
heap
|
page read and write
|
||
7C68000
|
heap
|
page read and write
|
||
1408000
|
heap
|
page read and write
|
||
5170000
|
direct allocation
|
page execute and read and write
|
||
FB5000
|
heap
|
page read and write
|
||
1A1C000
|
unkown
|
page readonly
|
||
8172000
|
heap
|
page read and write
|
||
14C7000
|
heap
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
7D0F000
|
heap
|
page read and write
|
||
700000
|
unkown
|
page readonly
|
||
4B5E000
|
stack
|
page read and write
|
||
411F000
|
stack
|
page read and write
|
||
437E000
|
stack
|
page read and write
|
||
4DC0000
|
direct allocation
|
page read and write
|
||
4CE1000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
47F1000
|
heap
|
page read and write
|
||
2F3F000
|
stack
|
page read and write
|
||
4990000
|
heap
|
page read and write
|
||
2DC0000
|
direct allocation
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
2DC0000
|
direct allocation
|
page read and write
|
||
3FCE000
|
stack
|
page read and write
|
||
11DB000
|
heap
|
page read and write
|
||
990000
|
unkown
|
page execute and read and write
|
||
4730000
|
heap
|
page read and write
|
||
51D0000
|
direct allocation
|
page execute and read and write
|
||
45EF000
|
stack
|
page read and write
|
||
7CDD000
|
heap
|
page read and write
|
||
5070000
|
direct allocation
|
page execute and read and write
|
||
1214000
|
heap
|
page read and write
|
||
8172000
|
heap
|
page read and write
|
||
8171000
|
heap
|
page read and write
|
||
412000
|
unkown
|
page readonly
|
||
4CE1000
|
heap
|
page read and write
|
||
2C00000
|
direct allocation
|
page read and write
|
||
4BD4000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
145B000
|
heap
|
page read and write
|
||
7CED000
|
heap
|
page read and write
|
||
7DBC000
|
heap
|
page read and write
|
||
12ED000
|
stack
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
844000
|
heap
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
38B6000
|
heap
|
page read and write
|
||
7CD2000
|
heap
|
page read and write
|
||
391B000
|
heap
|
page read and write
|
||
F7A000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
1D42EE11000
|
trusted library allocation
|
page read and write
|
||
4C70000
|
direct allocation
|
page execute and read and write
|
||
1F3F4660000
|
unkown
|
page readonly
|
||
52B000
|
stack
|
page read and write
|
||
1464000
|
heap
|
page read and write
|
||
2EB0000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
3D9E000
|
stack
|
page read and write
|
||
887000
|
unkown
|
page write copy
|
||
CC1000
|
unkown
|
page execute and read and write
|
||
8DD000
|
stack
|
page read and write
|
||
2E8B000
|
stack
|
page read and write
|
||
410E000
|
stack
|
page read and write
|
||
41AF000
|
stack
|
page read and write
|
||
CD3000
|
unkown
|
page execute and write copy
|
||
11A4000
|
heap
|
page read and write
|
||
7DC4000
|
heap
|
page read and write
|
||
7CDB000
|
heap
|
page read and write
|
||
942000
|
unkown
|
page readonly
|
||
220D6000
|
heap
|
page read and write
|
||
73BF000
|
stack
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
2E96000
|
trusted library allocation
|
page read and write
|
||
7C8B000
|
heap
|
page read and write
|
||
4A70000
|
direct allocation
|
page read and write
|
||
5120000
|
direct allocation
|
page execute and read and write
|
||
53F0000
|
direct allocation
|
page execute and read and write
|
||
53F0000
|
direct allocation
|
page execute and read and write
|
||
8171000
|
heap
|
page read and write
|
||
7CB5000
|
heap
|
page read and write
|
||
10F0000
|
direct allocation
|
page read and write
|
||
43EF000
|
stack
|
page read and write
|
||
7CDD000
|
heap
|
page read and write
|
||
11A8000
|
heap
|
page read and write
|
||
7CE6000
|
heap
|
page read and write
|
||
36CF000
|
stack
|
page read and write
|
||
1D4209FC000
|
trusted library allocation
|
page read and write
|
||
8153000
|
heap
|
page read and write
|
||
8171000
|
heap
|
page read and write
|
||
4A70000
|
direct allocation
|
page read and write
|
||
1114000
|
heap
|
page read and write
|
||
4A70000
|
direct allocation
|
page read and write
|
||
F9E000
|
heap
|
page read and write
|
||
14C7000
|
heap
|
page read and write
|
||
462E000
|
stack
|
page read and write
|
||
7D05000
|
heap
|
page read and write
|
||
64BE000
|
stack
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
7C68000
|
heap
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
4D51000
|
heap
|
page read and write
|
||
7CF1000
|
heap
|
page read and write
|
||
4CE1000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
968000
|
unkown
|
page execute and read and write
|
||
7DF5000
|
heap
|
page read and write
|
||
344F000
|
stack
|
page read and write
|
||
3F6E000
|
stack
|
page read and write
|
||
8240000
|
trusted library allocation
|
page read and write
|
||
4A70000
|
direct allocation
|
page read and write
|
||
38B3000
|
heap
|
page read and write
|
||
11B7000
|
heap
|
page read and write
|
||
D56000
|
heap
|
page read and write
|
||
C7E000
|
heap
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
1161000
|
heap
|
page read and write
|
||
7CBA000
|
heap
|
page read and write
|
||
4D51000
|
heap
|
page read and write
|
||
38B4000
|
heap
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
31CF000
|
heap
|
page read and write
|
||
448F000
|
stack
|
page read and write
|
||
7CB4000
|
heap
|
page read and write
|
||
4D51000
|
heap
|
page read and write
|
||
5230000
|
direct allocation
|
page execute and read and write
|
||
37A7000
|
heap
|
page read and write
|
||
FF1000
|
heap
|
page read and write
|
||
E67000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
4F80000
|
direct allocation
|
page execute and read and write
|
||
7CB5000
|
heap
|
page read and write
|
||
1195000
|
heap
|
page read and write
|
||
DB3000
|
unkown
|
page execute and write copy
|
||
7DB0000
|
heap
|
page read and write
|
||
7CDD000
|
heap
|
page read and write
|
||
7DD0000
|
heap
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
533E000
|
stack
|
page read and write
|
||
11DA000
|
heap
|
page read and write
|
||
7E34000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
38EE000
|
stack
|
page read and write
|
||
65BF000
|
stack
|
page read and write
|
||
2C93000
|
trusted library allocation
|
page read and write
|
||
7CE1000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
844000
|
heap
|
page read and write
|
||
7D1A000
|
heap
|
page read and write
|
||
2C00000
|
direct allocation
|
page read and write
|
||
CAA000
|
heap
|
page read and write
|
||
447000
|
remote allocation
|
page execute and read and write
|
||
392E000
|
stack
|
page read and write
|
||
5130000
|
direct allocation
|
page execute and read and write
|
||
3D3E000
|
stack
|
page read and write
|
||
1442000
|
heap
|
page read and write
|
||
11A6000
|
heap
|
page read and write
|
||
4D50000
|
heap
|
page read and write
|
||
398E000
|
stack
|
page read and write
|
||
4FA0000
|
direct allocation
|
page execute and read and write
|
||
10F9000
|
stack
|
page read and write
|
||
4FF5000
|
direct allocation
|
page read and write
|
||
4CE1000
|
heap
|
page read and write
|
||
762000
|
unkown
|
page write copy
|
||
D00000
|
heap
|
page read and write
|
||
C90000
|
direct allocation
|
page read and write
|
||
4F10000
|
direct allocation
|
page read and write
|
||
1112000
|
heap
|
page read and write
|
||
81B0000
|
trusted library allocation
|
page read and write
|
||
5360000
|
remote allocation
|
page read and write
|
||
8FD000
|
stack
|
page read and write
|
||
7D3C000
|
heap
|
page read and write
|
||
7CED000
|
heap
|
page read and write
|
||
7C8B000
|
heap
|
page read and write
|
||
1490000
|
remote allocation
|
page read and write
|
||
1070000
|
heap
|
page read and write
|
||
3908000
|
heap
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
CCD000
|
unkown
|
page execute and read and write
|
||
80D0000
|
heap
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
DDA000
|
unkown
|
page execute and write copy
|
||
1384000
|
heap
|
page read and write
|
||
7DBA000
|
heap
|
page read and write
|
||
113E000
|
heap
|
page read and write
|
||
7CAA000
|
heap
|
page read and write
|
||
13A0000
|
heap
|
page read and write
|
||
50C0000
|
direct allocation
|
page execute and read and write
|
||
11A4000
|
heap
|
page read and write
|
||
4C90000
|
direct allocation
|
page execute and read and write
|
||
E35000
|
heap
|
page read and write
|
||
220E2000
|
heap
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
432E000
|
stack
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
844000
|
heap
|
page read and write
|
||
8DC000
|
unkown
|
page execute and read and write
|
||
3C5E000
|
stack
|
page read and write
|
||
4A81000
|
heap
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
391E000
|
heap
|
page read and write
|
||
4DC0000
|
direct allocation
|
page read and write
|
||
1D436EB2000
|
heap
|
page read and write
|
||
4F80000
|
direct allocation
|
page execute and read and write
|
||
1214000
|
heap
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
7DCB000
|
heap
|
page read and write
|
||
8171000
|
heap
|
page read and write
|
||
47F1000
|
heap
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
B29000
|
unkown
|
page execute and read and write
|
||
1009000
|
heap
|
page read and write
|
||
512D000
|
stack
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
2C20000
|
direct allocation
|
page read and write
|
||
7D0C000
|
heap
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
7CB4000
|
heap
|
page read and write
|
||
7DF3000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
A17000
|
unkown
|
page write copy
|
||
2E98000
|
trusted library allocation
|
page read and write
|
||
392F000
|
heap
|
page read and write
|
||
625E000
|
stack
|
page read and write
|
||
7D3C000
|
heap
|
page read and write
|
||
1F380001000
|
trusted library allocation
|
page read and write
|
||
7CAA000
|
heap
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
31C7000
|
heap
|
page read and write
|
||
7D06000
|
heap
|
page read and write
|
||
7DE7000
|
heap
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
FC9000
|
heap
|
page read and write
|
||
3909000
|
heap
|
page read and write
|
||
37AF000
|
stack
|
page read and write
|
||
2A6B000
|
trusted library allocation
|
page execute and read and write
|
||
7CE7000
|
heap
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
7CDB000
|
heap
|
page read and write
|
||
284B3180000
|
heap
|
page read and write
|
||
930000
|
heap
|
page read and write
|
||
EA0000
|
unkown
|
page readonly
|
||
7CF6000
|
heap
|
page read and write
|
||
394F000
|
heap
|
page read and write
|
||
42AF000
|
stack
|
page read and write
|
||
F55000
|
heap
|
page read and write
|
||
28190000
|
heap
|
page read and write
|
||
4C71000
|
heap
|
page read and write
|
||
7DF3000
|
heap
|
page read and write
|
||
50A0000
|
direct allocation
|
page execute and read and write
|
||
5090000
|
direct allocation
|
page execute and read and write
|
||
685C000
|
stack
|
page read and write
|
||
AC6000
|
unkown
|
page execute read
|
||
8EA000
|
unkown
|
page execute and read and write
|
||
4C90000
|
direct allocation
|
page execute and read and write
|
||
1114000
|
heap
|
page read and write
|
||
2EB0000
|
direct allocation
|
page read and write
|
||
5280000
|
direct allocation
|
page execute and read and write
|
||
48F0000
|
trusted library allocation
|
page read and write
|
||
496E000
|
stack
|
page read and write
|
||
5150000
|
direct allocation
|
page execute and read and write
|
||
D4E000
|
heap
|
page read and write
|
||
7FB1000
|
heap
|
page read and write
|
||
82D1000
|
heap
|
page read and write
|
||
7CD9000
|
heap
|
page read and write
|
||
7DF3000
|
heap
|
page read and write
|
||
F9E000
|
heap
|
page read and write
|
||
7CBE000
|
stack
|
page read and write
|
||
7D3C000
|
heap
|
page read and write
|
||
7CD7000
|
heap
|
page read and write
|
||
11E0000
|
direct allocation
|
page read and write
|
||
7D0F000
|
heap
|
page read and write
|
||
812D000
|
heap
|
page read and write
|
||
488E000
|
stack
|
page read and write
|
||
3183000
|
heap
|
page read and write
|
||
8050000
|
trusted library allocation
|
page read and write
|
||
12F9000
|
stack
|
page read and write
|
||
4C62000
|
heap
|
page read and write
|
||
475F000
|
stack
|
page read and write
|
||
C76000
|
heap
|
page read and write
|
||
844000
|
heap
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
2C00000
|
direct allocation
|
page read and write
|
||
F5B000
|
stack
|
page read and write
|
||
C8548FF000
|
stack
|
page read and write
|
||
19F9000
|
unkown
|
page readonly
|
||
7CEA000
|
heap
|
page read and write
|
||
11E0000
|
direct allocation
|
page read and write
|
||
7DF6000
|
heap
|
page read and write
|
||
770000
|
unkown
|
page write copy
|
||
DB6000
|
unkown
|
page execute and write copy
|
||
7DC8000
|
heap
|
page read and write
|
||
5100000
|
direct allocation
|
page execute and read and write
|
||
47F1000
|
heap
|
page read and write
|
||
2CB3000
|
trusted library allocation
|
page read and write
|
||
78BD000
|
stack
|
page read and write
|
||
4C90000
|
direct allocation
|
page execute and read and write
|
||
F47000
|
heap
|
page read and write
|
||
10F0000
|
direct allocation
|
page read and write
|
||
7DF3000
|
heap
|
page read and write
|
||
C2DAEFE000
|
stack
|
page read and write
|
||
474E000
|
stack
|
page read and write
|
||
1127000
|
heap
|
page read and write
|
||
EB2000
|
unkown
|
page read and write
|
||
7900000
|
heap
|
page read and write
|
||
7CE8000
|
heap
|
page read and write
|
||
8171000
|
heap
|
page read and write
|
||
31AE000
|
stack
|
page read and write
|
||
145B000
|
heap
|
page read and write
|
||
2C2D000
|
stack
|
page read and write
|
||
7CEA000
|
heap
|
page read and write
|
||
7CB5000
|
heap
|
page read and write
|
||
1D41CF7E000
|
heap
|
page read and write
|
||
140C000
|
heap
|
page read and write
|
||
4CC0000
|
direct allocation
|
page execute and read and write
|
||
CEF000
|
heap
|
page read and write
|
||
108E000
|
stack
|
page read and write
|
||
DBA000
|
unkown
|
page execute and write copy
|
||
30BE000
|
stack
|
page read and write
|
||
7C9E000
|
heap
|
page read and write
|
||
7C6A000
|
heap
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
13F2000
|
heap
|
page read and write
|
||
5040000
|
direct allocation
|
page execute and read and write
|
||
5120000
|
direct allocation
|
page execute and read and write
|
||
51D0000
|
direct allocation
|
page execute and read and write
|
||
51B0000
|
direct allocation
|
page execute and read and write
|
||
7A1000
|
unkown
|
page write copy
|
||
747E000
|
heap
|
page read and write
|
||
4A2F000
|
stack
|
page read and write
|
||
7FB1000
|
heap
|
page read and write
|
||
D3B000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
7C68000
|
heap
|
page read and write
|
||
DB6000
|
unkown
|
page execute and write copy
|
||
284B1802000
|
heap
|
page read and write
|
||
1340000
|
direct allocation
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
14C2000
|
heap
|
page read and write
|
||
47F1000
|
heap
|
page read and write
|
||
4FF0000
|
direct allocation
|
page read and write
|
||
14AC000
|
heap
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
3F2F000
|
stack
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
2DC0000
|
direct allocation
|
page read and write
|
||
7C9E000
|
heap
|
page read and write
|
||
5040000
|
direct allocation
|
page execute and read and write
|
||
15E0000
|
heap
|
page read and write
|
||
7D80000
|
heap
|
page read and write
|
||
815D000
|
heap
|
page read and write
|
||
7389000
|
heap
|
page read and write
|
||
5260000
|
direct allocation
|
page execute and read and write
|
||
5120000
|
direct allocation
|
page execute and read and write
|
||
7C90000
|
trusted library allocation
|
page read and write
|
||
1D4F000
|
stack
|
page read and write
|
||
5230000
|
direct allocation
|
page execute and read and write
|
||
922000
|
unkown
|
page execute and read and write
|
||
D36000
|
heap
|
page read and write
|
||
3CB1000
|
trusted library allocation
|
page read and write
|
||
D30000
|
heap
|
page read and write
|
||
7D3C000
|
heap
|
page read and write
|
||
7D3C000
|
heap
|
page read and write
|
||
102A000
|
heap
|
page read and write
|
||
7CA2000
|
heap
|
page read and write
|
||
3F2E000
|
stack
|
page read and write
|
||
1119000
|
heap
|
page read and write
|
||
7CB4000
|
heap
|
page read and write
|
||
7CB4000
|
heap
|
page read and write
|
||
A24000
|
unkown
|
page execute and read and write
|
||
F5D000
|
heap
|
page read and write
|
||
140E000
|
heap
|
page read and write
|
||
844000
|
heap
|
page read and write
|
||
7CD2000
|
heap
|
page read and write
|
||
7DC6000
|
heap
|
page read and write
|
||
CFB000
|
heap
|
page read and write
|
||
220E6000
|
heap
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
7DC6000
|
heap
|
page read and write
|
||
4D51000
|
heap
|
page read and write
|
||
1411000
|
heap
|
page read and write
|
||
7C6D000
|
heap
|
page read and write
|
||
51F0000
|
direct allocation
|
page execute and read and write
|
||
51F0000
|
heap
|
page read and write
|
||
1114000
|
heap
|
page read and write
|
||
7FF0000
|
trusted library allocation
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
700000
|
unkown
|
page readonly
|
||
144A000
|
heap
|
page read and write
|
||
7FB0000
|
heap
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
50E0000
|
direct allocation
|
page read and write
|
||
7D14000
|
heap
|
page read and write
|
||
1D41F394000
|
trusted library allocation
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
8161000
|
heap
|
page read and write
|
||
3B2F000
|
stack
|
page read and write
|
||
4D20000
|
direct allocation
|
page execute and read and write
|
||
7CED000
|
heap
|
page read and write
|
||
5230000
|
direct allocation
|
page execute and read and write
|
||
7FBD000
|
heap
|
page read and write
|
||
7C00000
|
remote allocation
|
page read and write
|
||
366F000
|
stack
|
page read and write
|
||
1036000
|
heap
|
page read and write
|
||
E23000
|
heap
|
page read and write
|
||
13FA000
|
heap
|
page read and write
|
||
138E000
|
stack
|
page read and write
|
||
8181000
|
heap
|
page read and write
|
||
7D15000
|
heap
|
page read and write
|
||
7CD2000
|
heap
|
page read and write
|
||
91F000
|
unkown
|
page execute and write copy
|
||
284B17D7000
|
heap
|
page read and write
|
||
220F7000
|
heap
|
page read and write
|
||
7C8B000
|
heap
|
page read and write
|
||
8171000
|
heap
|
page read and write
|
||
1120000
|
trusted library allocation
|
page read and write
|
||
1441000
|
heap
|
page read and write
|
||
7A10000
|
remote allocation
|
page read and write
|
||
4FC0000
|
direct allocation
|
page execute and read and write
|
||
14DC000
|
heap
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
2EA0000
|
heap
|
page read and write
|
||
35DF000
|
stack
|
page read and write
|
||
1125000
|
heap
|
page read and write
|
||
FEA000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
5110000
|
direct allocation
|
page execute and read and write
|
||
13ED000
|
heap
|
page read and write
|
||
1F3F4662000
|
unkown
|
page readonly
|
||
7D3C000
|
heap
|
page read and write
|
||
7CB4000
|
heap
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
7CDF000
|
heap
|
page read and write
|
||
306E000
|
stack
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
7D25000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
5090000
|
direct allocation
|
page execute and read and write
|
||
3997000
|
heap
|
page read and write
|
||
E23000
|
heap
|
page read and write
|
||
5180000
|
direct allocation
|
page read and write
|
||
3180000
|
heap
|
page read and write
|
||
146F000
|
heap
|
page read and write
|
||
F10000
|
heap
|
page read and write
|
||
7DBA000
|
heap
|
page read and write
|
||
844000
|
heap
|
page read and write
|
||
4DF1000
|
direct allocation
|
page read and write
|
||
115D000
|
heap
|
page read and write
|
||
7DA3000
|
heap
|
page read and write
|
||
E17000
|
heap
|
page read and write
|
||
7D3C000
|
heap
|
page read and write
|
||
7CBB000
|
heap
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
ABA000
|
unkown
|
page execute and write copy
|
||
4CE1000
|
heap
|
page read and write
|
||
1090000
|
heap
|
page read and write
|
||
7946000
|
heap
|
page read and write
|
||
14D9000
|
heap
|
page read and write
|
||
1443000
|
heap
|
page read and write
|
||
4C90000
|
direct allocation
|
page execute and read and write
|
||
FBF000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
7D21000
|
heap
|
page read and write
|
||
4D51000
|
heap
|
page read and write
|
||
15E6000
|
heap
|
page read and write
|
||
3154000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
5120000
|
direct allocation
|
page execute and read and write
|
||
7CE1000
|
heap
|
page read and write
|
||
7D3C000
|
heap
|
page read and write
|
||
701000
|
unkown
|
page execute read
|
||
1F380080000
|
trusted library allocation
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
284B17EF000
|
heap
|
page read and write
|
||
7E1E000
|
heap
|
page read and write
|
||
2EC8000
|
direct allocation
|
page read and write
|
||
3C0E000
|
stack
|
page read and write
|
||
11C2000
|
heap
|
page read and write
|
||
53F0000
|
direct allocation
|
page execute and read and write
|
||
7CFF000
|
heap
|
page read and write
|
||
1B97000
|
heap
|
page read and write
|
||
7D3C000
|
heap
|
page read and write
|
||
25AF000
|
stack
|
page read and write
|
||
C85544E000
|
stack
|
page read and write
|
||
7DE5000
|
heap
|
page read and write
|
||
EC2000
|
heap
|
page read and write
|
||
700000
|
unkown
|
page readonly
|
||
376F000
|
stack
|
page read and write
|
||
1B1A000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
51D0000
|
direct allocation
|
page execute and read and write
|
||
82D0000
|
heap
|
page read and write
|
||
7D3C000
|
heap
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
6FB000
|
stack
|
page read and write
|
||
C8545FF000
|
stack
|
page read and write
|
||
4B6F000
|
stack
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
75AE000
|
stack
|
page read and write
|
||
14BF000
|
stack
|
page read and write
|
||
890000
|
unkown
|
page read and write
|
||
844000
|
heap
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
7E03000
|
heap
|
page read and write
|
||
1121000
|
heap
|
page read and write
|
||
3A2F000
|
stack
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
8171000
|
heap
|
page read and write
|
||
1D420307000
|
trusted library allocation
|
page read and write
|
||
14D0000
|
direct allocation
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
4FF0000
|
direct allocation
|
page execute and read and write
|
||
14C2000
|
heap
|
page read and write
|
||
4DC0000
|
direct allocation
|
page read and write
|
||
33EF000
|
stack
|
page read and write
|
||
E3E000
|
heap
|
page read and write
|
||
284B19D0000
|
heap
|
page read and write
|
||
49DF000
|
stack
|
page read and write
|
||
8DA000
|
unkown
|
page execute and read and write
|
||
2C37000
|
heap
|
page read and write
|
||
4EC0000
|
trusted library allocation
|
page read and write
|
||
4CE1000
|
heap
|
page read and write
|
||
5160000
|
direct allocation
|
page execute and read and write
|
||
3920000
|
heap
|
page read and write
|
||
370E000
|
stack
|
page read and write
|
||
F50000
|
heap
|
page read and write
|
||
CD0000
|
unkown
|
page execute and read and write
|
||
FF9000
|
heap
|
page read and write
|
||
767E000
|
stack
|
page read and write
|
||
1D41CFAC000
|
heap
|
page read and write
|
||
8E6000
|
unkown
|
page execute and read and write
|
||
C2DA8FF000
|
stack
|
page read and write
|
||
5230000
|
direct allocation
|
page execute and read and write
|
||
5171000
|
direct allocation
|
page read and write
|
||
473E000
|
stack
|
page read and write
|
||
7CCE000
|
heap
|
page read and write
|
||
47EE000
|
stack
|
page read and write
|
||
7D91000
|
heap
|
page read and write
|
||
342E000
|
stack
|
page read and write
|
||
4FD0000
|
direct allocation
|
page execute and read and write
|
||
730000
|
unkown
|
page readonly
|
||
7E47000
|
heap
|
page read and write
|
||
750000
|
unkown
|
page readonly
|
||
E28000
|
heap
|
page read and write
|
||
7DBA000
|
heap
|
page read and write
|
||
7FF0000
|
trusted library allocation
|
page read and write
|
||
7C90000
|
trusted library allocation
|
page read and write
|
||
2DC0000
|
direct allocation
|
page read and write
|
||
4D80000
|
direct allocation
|
page execute and read and write
|
||
4C61000
|
heap
|
page read and write
|
||
7DB1000
|
heap
|
page read and write
|
||
4F5E000
|
stack
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
C854679000
|
stack
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
7CAA000
|
heap
|
page read and write
|
||
41A000
|
unkown
|
page write copy
|
||
34EF000
|
stack
|
page read and write
|
||
C3F000
|
unkown
|
page execute and read and write
|
||
36AE000
|
stack
|
page read and write
|
||
8153000
|
heap
|
page read and write
|
||
11A0000
|
trusted library allocation
|
page execute and read and write
|
||
4C90000
|
direct allocation
|
page execute and read and write
|
||
7D18000
|
heap
|
page read and write
|
||
5150000
|
direct allocation
|
page execute and read and write
|
||
10F0000
|
heap
|
page read and write
|
||
7DE7000
|
heap
|
page read and write
|
||
8161000
|
heap
|
page read and write
|
||
8153000
|
heap
|
page read and write
|
||
1D41CF45000
|
heap
|
page read and write
|
||
7DA8000
|
heap
|
page read and write
|
||
7CF8000
|
heap
|
page read and write
|
||
251F7590000
|
trusted library allocation
|
page read and write
|
||
39E0000
|
remote allocation
|
page read and write
|
||
A0E000
|
stack
|
page read and write
|
||
145F000
|
heap
|
page read and write
|
||
483F000
|
stack
|
page read and write
|
||
844000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
4EB1000
|
heap
|
page read and write
|
||
4CE1000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
220D3000
|
heap
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
7CCE000
|
heap
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
1185000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
4F80000
|
direct allocation
|
page execute and read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
7CF0000
|
heap
|
page read and write
|
||
7C9E000
|
heap
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
4F10000
|
direct allocation
|
page read and write
|
||
11AF000
|
stack
|
page read and write
|
||
2D8F000
|
stack
|
page read and write
|
||
5120000
|
direct allocation
|
page execute and read and write
|
||
762000
|
unkown
|
page write copy
|
||
14D1000
|
heap
|
page read and write
|
||
1114000
|
heap
|
page read and write
|
||
7650000
|
remote allocation
|
page read and write
|
||
13E0000
|
heap
|
page read and write
|
||
C8549FE000
|
stack
|
page read and write
|
||
3911000
|
heap
|
page read and write
|
||
11C1000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
1441000
|
heap
|
page read and write
|
||
1330000
|
heap
|
page read and write
|
||
7CF0000
|
heap
|
page read and write
|
||
1D4207A0000
|
trusted library allocation
|
page read and write
|
||
CD9000
|
unkown
|
page execute and read and write
|
||
3255000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
1114000
|
heap
|
page read and write
|
||
DB3000
|
unkown
|
page execute and write copy
|
||
7CC4000
|
heap
|
page read and write
|
||
674000
|
unkown
|
page execute and read and write
|
||
14D9000
|
heap
|
page read and write
|
||
7CDB000
|
heap
|
page read and write
|
||
7CD3000
|
heap
|
page read and write
|
||
8161000
|
heap
|
page read and write
|
||
1114000
|
heap
|
page read and write
|
||
74FD000
|
stack
|
page read and write
|
||
4991000
|
heap
|
page read and write
|
||
FB7000
|
heap
|
page read and write
|
||
4F70000
|
direct allocation
|
page execute and read and write
|
||
5210000
|
trusted library allocation
|
page read and write
|
||
104E000
|
stack
|
page read and write
|
||
4D51000
|
heap
|
page read and write
|
||
33E0000
|
heap
|
page read and write
|
||
4D51000
|
heap
|
page read and write
|
||
5360000
|
remote allocation
|
page read and write
|
||
7CF4000
|
heap
|
page read and write
|
||
7C00000
|
remote allocation
|
page read and write
|
||
107A000
|
heap
|
page read and write
|
||
489F000
|
stack
|
page read and write
|
||
352E000
|
stack
|
page read and write
|
||
2FEF000
|
stack
|
page read and write
|
||
5270000
|
direct allocation
|
page execute and read and write
|
||
7D24000
|
heap
|
page read and write
|
||
4D51000
|
heap
|
page read and write
|
||
13BE000
|
heap
|
page read and write
|
||
8168000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
762000
|
unkown
|
page read and write
|
||
392A000
|
heap
|
page read and write
|
||
7CF4000
|
heap
|
page read and write
|
||
7C9E000
|
heap
|
page read and write
|
||
14D1000
|
heap
|
page read and write
|
||
30DF000
|
stack
|
page read and write
|
||
34DE000
|
stack
|
page read and write
|
||
7C69000
|
heap
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
10A0000
|
heap
|
page read and write
|
||
307F000
|
stack
|
page read and write
|
||
844000
|
heap
|
page read and write
|
||
1288000
|
heap
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
14D9000
|
heap
|
page read and write
|
||
40AE000
|
stack
|
page read and write
|
||
FCC000
|
heap
|
page read and write
|
||
14BB000
|
heap
|
page read and write
|
||
A4E000
|
stack
|
page read and write
|
||
5060000
|
direct allocation
|
page execute and read and write
|
||
2ED0000
|
heap
|
page read and write
|
||
10F0000
|
direct allocation
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
699F000
|
stack
|
page read and write
|
||
39E0000
|
remote allocation
|
page read and write
|
||
401E000
|
stack
|
page read and write
|
||
7E44000
|
heap
|
page read and write
|
||
1400000
|
heap
|
page read and write
|
||
1D41CF6B000
|
heap
|
page read and write
|
||
13EA000
|
heap
|
page read and write
|
||
844000
|
heap
|
page read and write
|
||
79ED000
|
stack
|
page read and write
|
||
7FB9000
|
heap
|
page read and write
|
||
4A81000
|
heap
|
page read and write
|
||
51C0000
|
heap
|
page read and write
|
||
7CE6000
|
heap
|
page read and write
|
||
1D42077C000
|
trusted library allocation
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
44AF000
|
stack
|
page read and write
|
||
357F000
|
stack
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
1128000
|
heap
|
page read and write
|
||
7DF3000
|
heap
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
844000
|
heap
|
page read and write
|
||
220F7000
|
heap
|
page read and write
|
||
7D10000
|
heap
|
page read and write
|
||
7C8B000
|
heap
|
page read and write
|
||
E66000
|
unkown
|
page execute and write copy
|
||
107E000
|
heap
|
page read and write
|
||
7DC8000
|
heap
|
page read and write
|
||
7C8B000
|
heap
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
7944000
|
heap
|
page read and write
|
||
4A4C000
|
stack
|
page read and write
|
||
390F000
|
heap
|
page read and write
|
||
1127000
|
heap
|
page read and write
|
||
3C1F000
|
stack
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
6A1000
|
unkown
|
page execute read
|
||
1D41CF62000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
50E0000
|
direct allocation
|
page execute and read and write
|
||
7D0F000
|
heap
|
page read and write
|
||
DAC000
|
heap
|
page read and write
|
||
19F8000
|
unkown
|
page readonly
|
||
1433000
|
heap
|
page read and write
|
||
105B000
|
stack
|
page read and write
|
||
2CDE000
|
stack
|
page read and write
|
||
7CDB000
|
heap
|
page read and write
|
||
2CAE000
|
stack
|
page read and write
|
||
E5D000
|
unkown
|
page execute and read and write
|
||
7DD7000
|
heap
|
page read and write
|
||
C21000
|
unkown
|
page execute and write copy
|
||
E6E000
|
heap
|
page read and write
|
||
5040000
|
direct allocation
|
page execute and read and write
|
||
13A4000
|
heap
|
page read and write
|
||
52A0000
|
heap
|
page read and write
|
||
3152000
|
heap
|
page read and write
|
||
1D41CED0000
|
heap
|
page read and write
|
||
5230000
|
direct allocation
|
page execute and read and write
|
||
423E000
|
stack
|
page read and write
|
||
916000
|
unkown
|
page execute and read and write
|
||
504D000
|
stack
|
page read and write
|
||
C3F000
|
unkown
|
page execute and write copy
|
||
7C8B000
|
heap
|
page read and write
|
||
1D41EE66000
|
trusted library allocation
|
page read and write
|
||
5230000
|
direct allocation
|
page execute and read and write
|
||
7CD3000
|
heap
|
page read and write
|
||
1D436E30000
|
trusted library allocation
|
page read and write
|
||
7EAE000
|
stack
|
page read and write
|
||
497F000
|
stack
|
page read and write
|
||
145B000
|
heap
|
page read and write
|
||
7DE9000
|
heap
|
page read and write
|
||
FC9000
|
heap
|
page read and write
|
||
7C9F000
|
heap
|
page read and write
|
||
B40000
|
unkown
|
page execute and read and write
|
||
C85427E000
|
unkown
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
1D42034A000
|
trusted library allocation
|
page read and write
|
||
482E000
|
stack
|
page read and write
|
||
F20000
|
heap
|
page read and write
|
||
41EE000
|
stack
|
page read and write
|
||
10B9000
|
heap
|
page read and write
|
||
1D41CFA6000
|
heap
|
page read and write
|
||
1429000
|
heap
|
page read and write
|
||
51C0000
|
direct allocation
|
page execute and read and write
|
||
DEB000
|
heap
|
page read and write
|
||
538F000
|
heap
|
page read and write
|
||
8240000
|
trusted library allocation
|
page read and write
|
||
14C0000
|
direct allocation
|
page read and write
|
||
5120000
|
direct allocation
|
page execute and read and write
|
||
7CBA000
|
heap
|
page read and write
|
||
41AE000
|
stack
|
page read and write
|
||
7903000
|
heap
|
page read and write
|
||
7C9E000
|
heap
|
page read and write
|
||
419000
|
unkown
|
page write copy
|
||
143F000
|
heap
|
page read and write
|
||
CDF000
|
heap
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
4E5E000
|
stack
|
page read and write
|
||
343F000
|
stack
|
page read and write
|
||
3F7F000
|
stack
|
page read and write
|
||
3BFE000
|
stack
|
page read and write
|
||
887000
|
unkown
|
page write copy
|
||
7CEA000
|
heap
|
page read and write
|
||
7FB2000
|
heap
|
page read and write
|
||
4D51000
|
heap
|
page read and write
|
||
44EE000
|
stack
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
40CF000
|
stack
|
page read and write
|
||
7D24000
|
heap
|
page read and write
|
||
392F000
|
heap
|
page read and write
|
||
4DA0000
|
direct allocation
|
page execute and read and write
|
||
7D19000
|
heap
|
page read and write
|
||
6D40000
|
heap
|
page read and write
|
||
C97000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
8E2000
|
unkown
|
page execute and read and write
|
||
363E000
|
stack
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
A17000
|
unkown
|
page read and write
|
||
4D51000
|
heap
|
page read and write
|
||
EA0000
|
unkown
|
page readonly
|
||
2EBC000
|
stack
|
page read and write
|
||
521E000
|
stack
|
page read and write
|
||
540E000
|
stack
|
page read and write
|
||
750000
|
unkown
|
page readonly
|
||
1114000
|
heap
|
page read and write
|
||
3141000
|
heap
|
page read and write
|
||
4D51000
|
heap
|
page read and write
|
||
47F1000
|
heap
|
page read and write
|
||
8E0000
|
unkown
|
page execute and read and write
|
||
2C20000
|
trusted library allocation
|
page read and write
|
||
910000
|
unkown
|
page execute and read and write
|
||
127E000
|
stack
|
page read and write
|
||
2C0E000
|
stack
|
page read and write
|
||
3650000
|
unclassified section
|
page read and write
|
||
81A9000
|
heap
|
page read and write
|
||
4CB0000
|
direct allocation
|
page execute and read and write
|
||
52B0000
|
direct allocation
|
page execute and read and write
|
||
7DC8000
|
heap
|
page read and write
|
||
220E8000
|
heap
|
page read and write
|
||
47F1000
|
heap
|
page read and write
|
||
15AC000
|
stack
|
page read and write
|
||
8161000
|
heap
|
page read and write
|
||
4D51000
|
heap
|
page read and write
|
||
390B000
|
heap
|
page read and write
|
||
6710000
|
heap
|
page read and write
|
||
7C6D000
|
heap
|
page read and write
|
||
7C00000
|
remote allocation
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
7D3C000
|
heap
|
page read and write
|
||
14C7000
|
heap
|
page read and write
|
||
2E58000
|
trusted library allocation
|
page read and write
|
||
D67000
|
heap
|
page read and write
|
||
5CC000
|
stack
|
page read and write
|
||
4CE1000
|
heap
|
page read and write
|
||
1D41CF20000
|
heap
|
page read and write
|
||
1055000
|
heap
|
page read and write
|
||
7CED000
|
heap
|
page read and write
|
||
8153000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
4A70000
|
direct allocation
|
page read and write
|
||
E13000
|
heap
|
page read and write
|
||
D6B000
|
stack
|
page read and write
|
||
CD0000
|
unkown
|
page execute and write copy
|
||
442F000
|
stack
|
page read and write
|
||
136B000
|
heap
|
page read and write
|
||
7DE7000
|
heap
|
page read and write
|
||
5120000
|
direct allocation
|
page execute and read and write
|
||
48DE000
|
stack
|
page read and write
|
||
4CE1000
|
heap
|
page read and write
|
||
7DE5000
|
heap
|
page read and write
|
||
101B000
|
heap
|
page read and write
|
||
773000
|
unkown
|
page readonly
|
||
12FE000
|
stack
|
page read and write
|
||
7C68000
|
heap
|
page read and write
|
||
2C60000
|
heap
|
page execute and read and write
|
||
7CEA000
|
heap
|
page read and write
|
||
1B44000
|
heap
|
page read and write
|
||
3905000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
4C90000
|
direct allocation
|
page execute and read and write
|
||
284B17EF000
|
heap
|
page read and write
|
||
2EEF000
|
stack
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
E50000
|
heap
|
page read and write
|
||
7D0C000
|
heap
|
page read and write
|
||
7DC8000
|
heap
|
page read and write
|
||
8F2000
|
unkown
|
page execute and read and write
|
||
4DC0000
|
direct allocation
|
page read and write
|
||
7E1000
|
unkown
|
page execute and write copy
|
||
2DE0000
|
heap
|
page read and write
|
||
1200000
|
heap
|
page read and write
|
||
6D30000
|
heap
|
page read and write
|
||
4D51000
|
heap
|
page read and write
|
||
8157000
|
heap
|
page read and write
|
||
4D30000
|
direct allocation
|
page execute and read and write
|
||
4DC0000
|
direct allocation
|
page read and write
|
||
787F000
|
stack
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
4F80000
|
direct allocation
|
page execute and read and write
|
||
7C6C000
|
heap
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
67B000
|
unkown
|
page execute and read and write
|
||
DB6000
|
unkown
|
page execute and write copy
|
||
7CDB000
|
heap
|
page read and write
|
||
35CE000
|
stack
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
7947000
|
heap
|
page read and write
|
||
EF7000
|
heap
|
page read and write
|
||
51A0000
|
direct allocation
|
page execute and read and write
|
||
4981000
|
heap
|
page read and write
|
||
7DF1000
|
heap
|
page read and write
|
||
7CDB000
|
heap
|
page read and write
|
||
32DA000
|
heap
|
page read and write
|
||
11B7000
|
heap
|
page read and write
|
||
88A2FFF000
|
stack
|
page read and write
|
||
7CFE000
|
heap
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
96C000
|
unkown
|
page read and write
|
||
81A9000
|
heap
|
page read and write
|
||
7D0E000
|
heap
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
5010000
|
direct allocation
|
page execute and read and write
|
||
36C0000
|
heap
|
page read and write
|
||
8153000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
1040000
|
heap
|
page read and write
|
||
7D0C000
|
heap
|
page read and write
|
||
792E000
|
heap
|
page read and write
|
||
7CE1000
|
heap
|
page read and write
|
||
7CE7000
|
heap
|
page read and write
|
||
2E9A000
|
trusted library allocation
|
page read and write
|
||
C90000
|
direct allocation
|
page read and write
|
||
7DD6000
|
heap
|
page read and write
|
||
14D9000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
4D51000
|
heap
|
page read and write
|
||
7DA3000
|
heap
|
page read and write
|
||
844000
|
heap
|
page read and write
|
||
7A00000
|
trusted library allocation
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
B31000
|
unkown
|
page execute and read and write
|
||
1443000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
7DA5000
|
heap
|
page read and write
|
||
DF5000
|
heap
|
page read and write
|
||
4D51000
|
heap
|
page read and write
|
||
7D14000
|
heap
|
page read and write
|
||
EAE000
|
stack
|
page read and write
|
||
7DE7000
|
heap
|
page read and write
|
||
2DE7000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
38FE000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
7D0C000
|
heap
|
page read and write
|
||
1D436E66000
|
heap
|
page execute and read and write
|
||
7D0F000
|
heap
|
page read and write
|
||
6A0000
|
unkown
|
page readonly
|
||
4C61000
|
heap
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
5340000
|
direct allocation
|
page execute and read and write
|
||
4B71000
|
heap
|
page read and write
|
||
15F0000
|
heap
|
page read and write
|
||
815B000
|
heap
|
page read and write
|
||
14D9000
|
heap
|
page read and write
|
||
3DEE000
|
stack
|
page read and write
|
||
7CE6000
|
heap
|
page read and write
|
||
38EF000
|
stack
|
page read and write
|
||
38B7000
|
heap
|
page read and write
|
||
7D0F000
|
heap
|
page read and write
|
||
8E8000
|
unkown
|
page execute and read and write
|
||
1195000
|
heap
|
page read and write
|
||
1477000
|
heap
|
page read and write
|
||
7CAA000
|
heap
|
page read and write
|
||
7FC9000
|
heap
|
page read and write
|
||
908000
|
unkown
|
page execute and read and write
|
||
A20000
|
unkown
|
page execute and read and write
|
||
31AE000
|
stack
|
page read and write
|
||
7CE8000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
82ED000
|
heap
|
page read and write
|
||
C854479000
|
stack
|
page read and write
|
||
2DBB000
|
stack
|
page read and write
|
||
753D000
|
stack
|
page read and write
|
||
930000
|
unkown
|
page readonly
|
||
7DF1000
|
heap
|
page read and write
|
||
7C6B000
|
heap
|
page read and write
|
||
7CEA000
|
heap
|
page read and write
|
||
91F000
|
unkown
|
page execute and read and write
|
||
4FB0000
|
direct allocation
|
page execute and read and write
|
||
5260000
|
direct allocation
|
page read and write
|
||
3B6F000
|
stack
|
page read and write
|
||
32C4000
|
heap
|
page read and write
|
||
F2C000
|
heap
|
page read and write
|
||
220E0000
|
heap
|
page read and write
|
||
D03000
|
heap
|
page read and write
|
||
C90000
|
direct allocation
|
page read and write
|
||
4D51000
|
heap
|
page read and write
|
||
14DC000
|
heap
|
page read and write
|
||
E6E000
|
heap
|
page read and write
|
||
2C80000
|
heap
|
page read and write
|
||
F40000
|
trusted library allocation
|
page read and write
|
||
C11000
|
unkown
|
page execute and read and write
|
||
7E02000
|
heap
|
page read and write
|
||
7CAB000
|
heap
|
page read and write
|
||
4D51000
|
heap
|
page read and write
|
||
434F000
|
stack
|
page read and write
|
||
7D26000
|
heap
|
page read and write
|
||
46FF000
|
stack
|
page read and write
|
||
7FCA000
|
heap
|
page read and write
|
||
797000
|
unkown
|
page readonly
|
||
3D5F000
|
stack
|
page read and write
|
||
284B19D5000
|
heap
|
page read and write
|
||
251F7190000
|
trusted library allocation
|
page read and write
|
||
8171000
|
heap
|
page read and write
|
||
456F000
|
stack
|
page read and write
|
||
844000
|
heap
|
page read and write
|
||
8161000
|
heap
|
page read and write
|
||
50B0000
|
direct allocation
|
page execute and read and write
|
||
7D3C000
|
heap
|
page read and write
|
||
334E000
|
stack
|
page read and write
|
||
390B000
|
heap
|
page read and write
|
||
47F1000
|
heap
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
D6D000
|
heap
|
page read and write
|
||
7CB6000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
E0C000
|
heap
|
page read and write
|
||
6D31000
|
heap
|
page read and write
|
||
220D2000
|
heap
|
page read and write
|
||
CF6000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
7DE7000
|
heap
|
page read and write
|
||
13D9000
|
heap
|
page read and write
|
||
7944000
|
heap
|
page read and write
|
||
44BE000
|
stack
|
page read and write
|
||
391C000
|
heap
|
page read and write
|
||
DB6000
|
unkown
|
page execute and write copy
|
||
689E000
|
stack
|
page read and write
|
||
D0B000
|
heap
|
page read and write
|
||
B00000
|
unkown
|
page execute and read and write
|
||
1009000
|
heap
|
page read and write
|
||
7DE7000
|
heap
|
page read and write
|
||
891000
|
unkown
|
page execute and read and write
|
||
4DC0000
|
direct allocation
|
page read and write
|
||
7D3C000
|
heap
|
page read and write
|
||
7C0000
|
unkown
|
page readonly
|
||
DCD000
|
heap
|
page read and write
|
||
7C69000
|
heap
|
page read and write
|
||
10EF000
|
stack
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
1114000
|
heap
|
page read and write
|
||
7CE4000
|
heap
|
page read and write
|
||
498F000
|
stack
|
page read and write
|
||
5240000
|
direct allocation
|
page execute and read and write
|
||
73C000
|
unkown
|
page readonly
|
||
4DD1000
|
heap
|
page read and write
|
||
7CED000
|
heap
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
2EB0000
|
direct allocation
|
page read and write
|
||
7D26000
|
heap
|
page read and write
|
||
4A80000
|
heap
|
page read and write
|
||
7CC1000
|
heap
|
page read and write
|
||
7DF3000
|
heap
|
page read and write
|
||
DBA000
|
unkown
|
page execute and write copy
|
||
3306000
|
heap
|
page read and write
|
||
147F000
|
stack
|
page read and write
|
||
EF0000
|
direct allocation
|
page read and write
|
||
4D10000
|
direct allocation
|
page execute and read and write
|
||
7FF0000
|
trusted library allocation
|
page read and write
|
||
7CDB000
|
heap
|
page read and write
|
||
8F7000
|
stack
|
page read and write
|
||
38AF000
|
stack
|
page read and write
|
||
88C000
|
unkown
|
page read and write
|
||
7DC4000
|
heap
|
page read and write
|
||
8153000
|
heap
|
page read and write
|
||
D1D000
|
heap
|
page read and write
|
||
7CDD000
|
heap
|
page read and write
|
||
7D3C000
|
heap
|
page read and write
|
||
4ACF000
|
stack
|
page read and write
|
||
47F0000
|
heap
|
page read and write
|
||
7CCC000
|
heap
|
page read and write
|
||
E84000
|
heap
|
page read and write
|
||
932000
|
unkown
|
page readonly
|
||
3EDE000
|
stack
|
page read and write
|
||
7C68000
|
heap
|
page read and write
|
||
5230000
|
direct allocation
|
page execute and read and write
|
||
14D1000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
51C0000
|
direct allocation
|
page execute and read and write
|
||
8F4000
|
unkown
|
page execute and read and write
|
||
8050000
|
trusted library allocation
|
page read and write
|
||
1020000
|
heap
|
page read and write
|
||
4C80000
|
direct allocation
|
page execute and read and write
|
||
E60000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
8171000
|
heap
|
page read and write
|
||
CFC000
|
stack
|
page read and write
|
||
415E000
|
stack
|
page read and write
|
||
C20000
|
unkown
|
page execute and write copy
|
||
5310000
|
direct allocation
|
page execute and read and write
|
||
7CDB000
|
heap
|
page read and write
|
||
7E16000
|
heap
|
page read and write
|
||
7D3C000
|
heap
|
page read and write
|
||
5100000
|
direct allocation
|
page execute and read and write
|
||
8DA000
|
unkown
|
page execute and read and write
|
||
96F000
|
unkown
|
page read and write
|
||
7CF2000
|
heap
|
page read and write
|
||
974000
|
unkown
|
page execute and read and write
|
||
50A0000
|
direct allocation
|
page execute and read and write
|
||
3910000
|
heap
|
page read and write
|
||
7C90000
|
trusted library allocation
|
page read and write
|
||
32AE000
|
stack
|
page read and write
|
||
3500000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
7CB5000
|
heap
|
page read and write
|
||
930000
|
unkown
|
page readonly
|
||
701000
|
unkown
|
page execute and read and write
|
||
47F1000
|
heap
|
page read and write
|
||
390C000
|
heap
|
page read and write
|
||
406F000
|
stack
|
page read and write
|
||
F02000
|
heap
|
page read and write
|
||
484F000
|
stack
|
page read and write
|
||
E66000
|
unkown
|
page execute and write copy
|
||
8EC000
|
unkown
|
page execute and read and write
|
||
7CCD000
|
heap
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
14DC000
|
heap
|
page read and write
|
||
7D19000
|
heap
|
page read and write
|
||
7FF0000
|
trusted library allocation
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
F00000
|
trusted library allocation
|
page read and write
|
||
4F50000
|
direct allocation
|
page execute and read and write
|
||
DBF000
|
heap
|
page read and write
|
||
7DBC000
|
heap
|
page read and write
|
||
4CE1000
|
heap
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
1C150000
|
trusted library allocation
|
page read and write
|
||
B40000
|
unkown
|
page execute and write copy
|
||
14C0000
|
direct allocation
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
2C9E000
|
stack
|
page read and write
|
||
11BA000
|
heap
|
page read and write
|
||
1D4202C3000
|
trusted library allocation
|
page read and write
|
||
14BA000
|
heap
|
page read and write
|
||
4DC0000
|
direct allocation
|
page read and write
|
||
F15000
|
heap
|
page read and write
|
||
7DE7000
|
heap
|
page read and write
|
||
7C8B000
|
heap
|
page read and write
|
||
3A7F000
|
stack
|
page read and write
|
||
7CEA000
|
heap
|
page read and write
|
||
1D42F0D5000
|
trusted library allocation
|
page read and write
|
||
4C90000
|
direct allocation
|
page execute and read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
7DE5000
|
heap
|
page read and write
|
||
7D36000
|
heap
|
page read and write
|
||
7CFC000
|
heap
|
page read and write
|
||
7C90000
|
trusted library allocation
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
3905000
|
heap
|
page read and write
|
||
7CB5000
|
heap
|
page read and write
|
||
8156000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
7DE3000
|
heap
|
page read and write
|
||
731000
|
unkown
|
page execute read
|
||
7DF3000
|
heap
|
page read and write
|
||
7CE6000
|
heap
|
page read and write
|
||
52C0000
|
direct allocation
|
page execute and read and write
|
||
DE5000
|
heap
|
page read and write
|
||
7D0F000
|
heap
|
page read and write
|
||
5350000
|
direct allocation
|
page execute and read and write
|
||
4D51000
|
heap
|
page read and write
|
||
7DE2000
|
heap
|
page read and write
|
||
7CFF000
|
heap
|
page read and write
|
||
7E0000
|
unkown
|
page readonly
|
||
8161000
|
heap
|
page read and write
|
||
DF4000
|
heap
|
page read and write
|
||
79D000
|
unkown
|
page read and write
|
||
890000
|
unkown
|
page readonly
|
||
80D3000
|
heap
|
page read and write
|
||
7D3C000
|
heap
|
page read and write
|
||
1127000
|
heap
|
page read and write
|
||
7D91000
|
heap
|
page read and write
|
||
C85437F000
|
stack
|
page read and write
|
||
3A2E000
|
stack
|
page read and write
|
||
7CFD000
|
heap
|
page read and write
|
||
7E1000
|
unkown
|
page execute and write copy
|
||
11BA000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
11C0000
|
heap
|
page read and write
|
||
220D4000
|
heap
|
page read and write
|
||
47F1000
|
heap
|
page read and write
|
||
47F1000
|
heap
|
page read and write
|
||
7CB5000
|
heap
|
page read and write
|
||
1114000
|
heap
|
page read and write
|
||
7DC5000
|
heap
|
page read and write
|
||
8240000
|
trusted library allocation
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
33EF000
|
stack
|
page read and write
|
||
133D000
|
stack
|
page read and write
|
||
AA0000
|
heap
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
1447000
|
heap
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
7CB4000
|
heap
|
page read and write
|
||
447F000
|
stack
|
page read and write
|
||
4DC0000
|
direct allocation
|
page read and write
|
||
1466000
|
heap
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
5040000
|
direct allocation
|
page execute and read and write
|
||
81A1000
|
heap
|
page read and write
|
||
C3F000
|
unkown
|
page execute and write copy
|
||
2EEF000
|
stack
|
page read and write
|
||
284B1790000
|
heap
|
page read and write
|
||
43DE000
|
stack
|
page read and write
|
||
F1B000
|
heap
|
page read and write
|
||
E34000
|
heap
|
page read and write
|
||
EB9000
|
heap
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
771000
|
unkown
|
page write copy
|
||
284B318A000
|
heap
|
page read and write
|
||
7D3C000
|
heap
|
page read and write
|
||
7CAA000
|
heap
|
page read and write
|
||
33BC000
|
heap
|
page read and write
|
||
7A00000
|
trusted library allocation
|
page read and write
|
||
D13000
|
heap
|
page read and write
|
||
7CDB000
|
heap
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
7DE5000
|
heap
|
page read and write
|
||
14BA000
|
heap
|
page read and write
|
||
4D51000
|
heap
|
page read and write
|
||
2817D000
|
heap
|
page read and write
|
||
1D420320000
|
trusted library allocation
|
page read and write
|
||
7CEB000
|
heap
|
page read and write
|
||
AF6000
|
unkown
|
page execute read
|
||
4DC0000
|
direct allocation
|
page read and write
|
||
1441000
|
heap
|
page read and write
|
||
220D6000
|
heap
|
page read and write
|
||
3CFF000
|
stack
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
112A000
|
heap
|
page read and write
|
||
3A2F000
|
stack
|
page read and write
|
||
7DCB000
|
heap
|
page read and write
|
||
1490000
|
remote allocation
|
page read and write
|
||
432E000
|
stack
|
page read and write
|
||
7C8B000
|
heap
|
page read and write
|
||
7FF0000
|
trusted library allocation
|
page read and write
|
||
EF0000
|
direct allocation
|
page read and write
|
||
14D9000
|
heap
|
page read and write
|
||
2D3F000
|
stack
|
page read and write
|
||
1280000
|
heap
|
page read and write
|
||
11B0000
|
heap
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
144C000
|
heap
|
page read and write
|
||
611000
|
unkown
|
page execute and write copy
|
||
8EE000
|
unkown
|
page execute and read and write
|
||
7D07000
|
heap
|
page read and write
|
||
7CB5000
|
heap
|
page read and write
|
||
1340000
|
direct allocation
|
page read and write
|
||
1D420A00000
|
trusted library allocation
|
page read and write
|
||
1D4202C7000
|
trusted library allocation
|
page read and write
|
||
C85487E000
|
stack
|
page read and write
|
||
D6E000
|
heap
|
page read and write
|
||
CC2000
|
heap
|
page read and write
|
||
8181000
|
heap
|
page read and write
|
||
1D420334000
|
trusted library allocation
|
page read and write
|
||
95B000
|
unkown
|
page execute and read and write
|
||
311E000
|
stack
|
page read and write
|
||
1443000
|
heap
|
page read and write
|
||
51E0000
|
direct allocation
|
page read and write
|
||
7CDF000
|
heap
|
page read and write
|
||
4DE0000
|
trusted library allocation
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
53D2000
|
heap
|
page read and write
|
||
E63000
|
heap
|
page read and write
|
||
D37000
|
stack
|
page read and write
|
||
7CFF000
|
heap
|
page read and write
|
||
5261000
|
direct allocation
|
page read and write
|
||
76D000
|
unkown
|
page write copy
|
||
45FE000
|
stack
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
1D42EE02000
|
trusted library allocation
|
page read and write
|
||
BC9000
|
unkown
|
page execute and read and write
|
||
BB0000
|
unkown
|
page execute and read and write
|
||
1197000
|
heap
|
page read and write
|
||
2DED000
|
heap
|
page read and write
|
||
10EA000
|
heap
|
page read and write
|
||
284B3183000
|
heap
|
page read and write
|
||
5230000
|
direct allocation
|
page execute and read and write
|
||
3B1E000
|
stack
|
page read and write
|
||
795D000
|
heap
|
page read and write
|
||
487E000
|
stack
|
page read and write
|
||
284B3184000
|
heap
|
page read and write
|
||
1D41CEC0000
|
trusted library allocation
|
page read and write
|
||
7CC7000
|
heap
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
D46000
|
heap
|
page read and write
|
||
3FBE000
|
stack
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
446E000
|
stack
|
page read and write
|
||
7DD0000
|
heap
|
page read and write
|
||
1444000
|
heap
|
page read and write
|
||
7DE5000
|
heap
|
page read and write
|
||
8050000
|
trusted library allocation
|
page read and write
|
||
14D1000
|
heap
|
page read and write
|
||
7CBA000
|
heap
|
page read and write
|
||
1125000
|
heap
|
page read and write
|
||
4FF8000
|
direct allocation
|
page read and write
|
||
466F000
|
stack
|
page read and write
|
||
7DF1000
|
heap
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
51D0000
|
direct allocation
|
page execute and read and write
|
||
82FD000
|
heap
|
page read and write
|
||
7CE7000
|
heap
|
page read and write
|
||
2EB0000
|
direct allocation
|
page read and write
|
||
316E000
|
heap
|
page read and write
|
||
111C000
|
heap
|
page read and write
|
||
7AFD000
|
stack
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
7CED000
|
heap
|
page read and write
|
||
1D42030A000
|
trusted library allocation
|
page read and write
|
||
7CE6000
|
heap
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
F15000
|
direct allocation
|
page read and write
|
||
5230000
|
direct allocation
|
page execute and read and write
|
||
32FF000
|
stack
|
page read and write
|
||
7C6B000
|
heap
|
page read and write
|
||
780000
|
unkown
|
page readonly
|
||
D7B000
|
heap
|
page read and write
|
||
50F0000
|
direct allocation
|
page execute and read and write
|
||
E70000
|
heap
|
page read and write
|
||
38D5000
|
heap
|
page read and write
|
||
7D15000
|
heap
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
8240000
|
trusted library allocation
|
page read and write
|
||
7DE5000
|
heap
|
page read and write
|
||
4ED5000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
82FB000
|
heap
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
3905000
|
heap
|
page read and write
|
||
4A6F000
|
stack
|
page read and write
|
||
3905000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
E8E000
|
heap
|
page read and write
|
||
7E12000
|
heap
|
page read and write
|
||
C79000
|
unkown
|
page execute and read and write
|
||
1447000
|
heap
|
page read and write
|
||
1210000
|
heap
|
page read and write
|
||
4D51000
|
heap
|
page read and write
|
||
380F000
|
stack
|
page read and write
|
||
7C6A000
|
heap
|
page read and write
|
||
8171000
|
heap
|
page read and write
|
||
47F1000
|
heap
|
page read and write
|
||
EB2000
|
unkown
|
page write copy
|
||
2DC0000
|
direct allocation
|
page read and write
|
||
316F000
|
stack
|
page read and write
|
||
4E50000
|
trusted library allocation
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
284B3186000
|
heap
|
page read and write
|
||
962000
|
unkown
|
page execute and read and write
|
||
844000
|
heap
|
page read and write
|
||
47F1000
|
heap
|
page read and write
|
||
14BA000
|
heap
|
page read and write
|
||
7C5F000
|
stack
|
page read and write
|
||
4E9E000
|
stack
|
page read and write
|
||
7FBD000
|
heap
|
page read and write
|
||
C20000
|
unkown
|
page execute and read and write
|
||
11A4000
|
heap
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
394F000
|
heap
|
page read and write
|
||
78FE000
|
stack
|
page read and write
|
||
1185000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
41AF000
|
stack
|
page read and write
|
||
7C6D000
|
heap
|
page read and write
|
||
10F0000
|
heap
|
page read and write
|
||
50B0000
|
direct allocation
|
page execute and read and write
|
||
1384000
|
heap
|
page read and write
|
||
399F000
|
stack
|
page read and write
|
||
52A0000
|
heap
|
page read and write
|
||
7DF3000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
4C60000
|
heap
|
page read and write
|
||
36E0000
|
direct allocation
|
page read and write
|
||
284B3188000
|
heap
|
page read and write
|
||
812D000
|
heap
|
page read and write
|
||
700000
|
unkown
|
page readonly
|
||
7DFD000
|
heap
|
page read and write
|
||
5200000
|
direct allocation
|
page execute and read and write
|
||
774000
|
unkown
|
page readonly
|
||
1492000
|
heap
|
page read and write
|
||
8172000
|
heap
|
page read and write
|
||
7DCF000
|
heap
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
4D51000
|
heap
|
page read and write
|
||
7FC1000
|
heap
|
page read and write
|
||
143F000
|
heap
|
page read and write
|
||
3ACE000
|
stack
|
page read and write
|
||
39EF000
|
stack
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
38D5000
|
heap
|
page read and write
|
||
3E9F000
|
stack
|
page read and write
|
||
14C2000
|
heap
|
page read and write
|
||
792000
|
unkown
|
page write copy
|
||
C853FB3000
|
stack
|
page read and write
|
||
139B000
|
heap
|
page read and write
|
||
333E000
|
stack
|
page read and write
|
||
32EE000
|
stack
|
page read and write
|
||
3A8F000
|
stack
|
page read and write
|
||
7BBE000
|
stack
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
1D41FE1B000
|
trusted library allocation
|
page read and write
|
||
7CE6000
|
heap
|
page read and write
|
||
2C00000
|
direct allocation
|
page read and write
|
||
C853FFE000
|
stack
|
page read and write
|
||
321F000
|
stack
|
page read and write
|
||
7DE7000
|
heap
|
page read and write
|
||
780000
|
unkown
|
page readonly
|
||
220F3000
|
heap
|
page read and write
|
||
7CE6000
|
heap
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
4800000
|
heap
|
page read and write
|
||
7DCA000
|
heap
|
page read and write
|
||
3CEE000
|
stack
|
page read and write
|
||
7DD0000
|
heap
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
817D000
|
heap
|
page read and write
|
||
7E33000
|
heap
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
7CE6000
|
heap
|
page read and write
|
||
46AF000
|
stack
|
page read and write
|
||
774000
|
unkown
|
page execute and read and write
|
||
7D3C000
|
heap
|
page read and write
|
||
7E12000
|
heap
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
7CE4000
|
heap
|
page read and write
|
||
38FE000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
7C90000
|
trusted library allocation
|
page read and write
|
||
4D51000
|
heap
|
page read and write
|
||
701000
|
unkown
|
page execute and write copy
|
||
4DD1000
|
heap
|
page read and write
|
||
1443000
|
heap
|
page read and write
|
||
2F15000
|
heap
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
A8E000
|
stack
|
page read and write
|
||
1D4202F1000
|
trusted library allocation
|
page read and write
|
||
C854A7B000
|
stack
|
page read and write
|
||
610000
|
unkown
|
page readonly
|
||
79D000
|
unkown
|
page write copy
|
||
7FB2000
|
heap
|
page read and write
|
||
920000
|
unkown
|
page execute and write copy
|
||
145B000
|
heap
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
7D1E000
|
heap
|
page read and write
|
||
7D87000
|
heap
|
page read and write
|
||
740000
|
heap
|
page read and write
|
||
CCE000
|
unkown
|
page execute and write copy
|
||
42EF000
|
stack
|
page read and write
|
||
7DB1000
|
heap
|
page read and write
|
||
D70000
|
heap
|
page read and write
|
||
1119000
|
heap
|
page read and write
|
||
251F7190000
|
trusted library allocation
|
page read and write
|
||
53C0000
|
direct allocation
|
page execute and read and write
|
||
10F9000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
7D0E000
|
heap
|
page read and write
|
||
7CB4000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
767000
|
unkown
|
page readonly
|
||
3F2E000
|
stack
|
page read and write
|
||
35BE000
|
stack
|
page read and write
|
||
2E86000
|
trusted library allocation
|
page read and write
|
||
361E000
|
stack
|
page read and write
|
||
7C90000
|
trusted library allocation
|
page read and write
|
||
88F000
|
unkown
|
page read and write
|
||
3165000
|
heap
|
page read and write
|
||
7CEA000
|
heap
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
844000
|
heap
|
page read and write
|
||
D4C000
|
heap
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
C20000
|
unkown
|
page execute and write copy
|
||
36AE000
|
stack
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
4CE1000
|
heap
|
page read and write
|
||
11B2000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
51D0000
|
direct allocation
|
page execute and read and write
|
||
679000
|
unkown
|
page read and write
|
||
7CEA000
|
heap
|
page read and write
|
||
2BCF000
|
stack
|
page read and write
|
||
8171000
|
heap
|
page read and write
|
||
52A0000
|
direct allocation
|
page execute and read and write
|
||
7D3C000
|
heap
|
page read and write
|
||
251F7190000
|
trusted library allocation
|
page read and write
|
||
814A000
|
heap
|
page read and write
|
||
5301000
|
direct allocation
|
page read and write
|
||
7DE7000
|
heap
|
page read and write
|
||
2C10000
|
trusted library allocation
|
page execute and read and write
|
||
14DC000
|
heap
|
page read and write
|
||
815F000
|
heap
|
page read and write
|
||
7E17000
|
heap
|
page read and write
|
||
1090000
|
trusted library allocation
|
page read and write
|
||
220E2000
|
heap
|
page read and write
|
||
C85457F000
|
stack
|
page read and write
|
||
7DC2000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
412000
|
unkown
|
page readonly
|
||
7DC6000
|
heap
|
page read and write
|
||
2CB1000
|
trusted library allocation
|
page read and write
|
||
505F000
|
stack
|
page read and write
|
||
11C1000
|
heap
|
page read and write
|
||
27AD000
|
stack
|
page read and write
|
||
7CF7000
|
heap
|
page read and write
|
||
7DF3000
|
heap
|
page read and write
|
||
7DBA000
|
heap
|
page read and write
|
||
53CF000
|
heap
|
page read and write
|
||
7CA1000
|
heap
|
page read and write
|
||
844000
|
heap
|
page read and write
|
||
7CEF000
|
heap
|
page read and write
|
||
5120000
|
direct allocation
|
page execute and read and write
|
||
112E000
|
heap
|
page read and write
|
||
5180000
|
direct allocation
|
page execute and read and write
|
||
4A70000
|
direct allocation
|
page read and write
|
||
1B40000
|
heap
|
page read and write
|
||
7C90000
|
trusted library allocation
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
844000
|
heap
|
page read and write
|
||
7E0000
|
unkown
|
page read and write
|
||
7DF3000
|
heap
|
page read and write
|
||
8153000
|
heap
|
page read and write
|
||
7CE6000
|
heap
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
E50000
|
unkown
|
page readonly
|
||
7CB4000
|
heap
|
page read and write
|
||
7CC7000
|
heap
|
page read and write
|
||
37C8000
|
heap
|
page read and write
|
||
8172000
|
heap
|
page read and write
|
||
5130000
|
direct allocation
|
page execute and read and write
|
||
1449000
|
heap
|
page read and write
|
||
EC2000
|
heap
|
page read and write
|
||
52FE000
|
stack
|
page read and write
|
||
2DAF000
|
stack
|
page read and write
|
||
7CAA000
|
heap
|
page read and write
|
||
7C90000
|
trusted library allocation
|
page read and write
|
||
7C8B000
|
heap
|
page read and write
|
||
1D42EDE1000
|
trusted library allocation
|
page read and write
|
||
115E000
|
heap
|
page read and write
|
||
1D41CF10000
|
trusted library allocation
|
page read and write
|
||
7CB4000
|
heap
|
page read and write
|
||
53F0000
|
direct allocation
|
page execute and read and write
|
||
F01000
|
heap
|
page read and write
|
||
10FD000
|
heap
|
page read and write
|
||
14BE000
|
heap
|
page read and write
|
||
8240000
|
trusted library allocation
|
page read and write
|
||
143F000
|
heap
|
page read and write
|
||
EB4000
|
unkown
|
page write copy
|
||
797000
|
unkown
|
page readonly
|
||
2E9B000
|
stack
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
39E0000
|
remote allocation
|
page read and write
|
||
32EE000
|
stack
|
page read and write
|
||
5040000
|
direct allocation
|
page execute and read and write
|
||
53BD000
|
stack
|
page read and write
|
||
1040000
|
heap
|
page read and write
|
||
2E5E000
|
stack
|
page read and write
|
||
CB9000
|
unkown
|
page execute and read and write
|
||
3923000
|
heap
|
page read and write
|
||
7CDB000
|
heap
|
page read and write
|
||
7D6F000
|
stack
|
page read and write
|
||
142D000
|
heap
|
page read and write
|
||
7C8B000
|
heap
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
7CE4000
|
heap
|
page read and write
|
||
C2DA0F3000
|
stack
|
page read and write
|
||
E69000
|
unkown
|
page execute and read and write
|
||
AC6000
|
unkown
|
page execute read
|
||
AC6000
|
unkown
|
page execute read
|
||
1384000
|
heap
|
page read and write
|
||
7CDD000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
7DBC000
|
heap
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
AF6000
|
unkown
|
page execute read
|
||
7D3C000
|
heap
|
page read and write
|
||
7D60000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
7CB5000
|
heap
|
page read and write
|
||
7E02000
|
heap
|
page read and write
|
||
1D42031E000
|
trusted library allocation
|
page read and write
|
||
7CDE000
|
heap
|
page read and write
|
||
529D000
|
stack
|
page read and write
|
||
461F000
|
stack
|
page read and write
|
||
1340000
|
direct allocation
|
page read and write
|
||
D6E000
|
heap
|
page read and write
|
||
5330000
|
direct allocation
|
page execute and read and write
|
||
4981000
|
heap
|
page read and write
|
||
7FB6000
|
heap
|
page read and write
|
||
220E8000
|
heap
|
page read and write
|
||
7CFC000
|
heap
|
page read and write
|
||
7CAA000
|
heap
|
page read and write
|
||
817D000
|
heap
|
page read and write
|
||
D13000
|
heap
|
page read and write
|
||
BFA000
|
unkown
|
page execute and read and write
|
||
CB0000
|
direct allocation
|
page read and write
|
||
7DF1000
|
heap
|
page read and write
|
||
31FE000
|
stack
|
page read and write
|
||
8181000
|
heap
|
page read and write
|
||
10F3000
|
trusted library allocation
|
page execute and read and write
|
||
1181000
|
heap
|
page read and write
|
||
CA0000
|
heap
|
page read and write
|
||
771000
|
unkown
|
page write copy
|
||
4981000
|
heap
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
397E000
|
stack
|
page read and write
|
||
143F000
|
heap
|
page read and write
|
||
7DC0000
|
trusted library allocation
|
page read and write
|
||
5070000
|
direct allocation
|
page execute and read and write
|
||
2FFB000
|
heap
|
page read and write
|
||
8153000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
7A10000
|
remote allocation
|
page read and write
|
||
5110000
|
direct allocation
|
page execute and read and write
|
||
251F7590000
|
trusted library allocation
|
page read and write
|
||
F27000
|
heap
|
page read and write
|
||
420F000
|
stack
|
page read and write
|
||
3FDF000
|
stack
|
page read and write
|
||
5230000
|
direct allocation
|
page execute and read and write
|
||
50D0000
|
direct allocation
|
page execute and read and write
|
||
700000
|
unkown
|
page readonly
|
||
2FB0000
|
trusted library allocation
|
page read and write
|
||
51E8000
|
direct allocation
|
page read and write
|
||
1D41CE80000
|
heap
|
page read and write
|
||
3CAF000
|
stack
|
page read and write
|
||
844000
|
heap
|
page read and write
|
||
7CDD000
|
heap
|
page read and write
|
||
2C6F000
|
stack
|
page read and write
|
||
88A277D000
|
stack
|
page read and write
|
||
7D3C000
|
heap
|
page read and write
|
||
51D0000
|
direct allocation
|
page execute and read and write
|
||
4B71000
|
heap
|
page read and write
|
||
D1F000
|
heap
|
page read and write
|
||
7C6A000
|
heap
|
page read and write
|
||
7DCB000
|
heap
|
page read and write
|
||
7CEA000
|
heap
|
page read and write
|
||
251F7190000
|
trusted library allocation
|
page read and write
|
||
167E000
|
stack
|
page read and write
|
||
4DC0000
|
direct allocation
|
page read and write
|
||
7D21000
|
heap
|
page read and write
|
||
F10000
|
direct allocation
|
page read and write
|
||
1091000
|
heap
|
page read and write
|
||
7CC0000
|
heap
|
page read and write
|
||
4D51000
|
heap
|
page read and write
|
||
7FF0000
|
trusted library allocation
|
page read and write
|
||
7C9E000
|
heap
|
page read and write
|
||
3333000
|
heap
|
page read and write
|
||
4B1F000
|
stack
|
page read and write
|
||
10EE000
|
heap
|
page read and write
|
||
7DDB000
|
heap
|
page read and write
|
||
CDC000
|
stack
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
50A0000
|
direct allocation
|
page execute and read and write
|
||
53F0000
|
direct allocation
|
page execute and read and write
|
||
7CE7000
|
heap
|
page read and write
|
||
7CF0000
|
heap
|
page read and write
|
||
1D41CE20000
|
heap
|
page read and write
|
||
7DBC000
|
heap
|
page read and write
|
||
7938000
|
heap
|
page read and write
|
||
220C6000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
CD1000
|
unkown
|
page execute and write copy
|
||
767000
|
unkown
|
page readonly
|
||
5120000
|
direct allocation
|
page execute and read and write
|
||
7D3C000
|
heap
|
page read and write
|
||
88A2784000
|
stack
|
page read and write
|
||
13DE000
|
heap
|
page read and write
|
||
3F8F000
|
stack
|
page read and write
|
||
1D41CED5000
|
heap
|
page read and write
|
||
4CE0000
|
direct allocation
|
page execute and read and write
|
||
11A4000
|
heap
|
page read and write
|
||
91C000
|
unkown
|
page execute and read and write
|
||
1384000
|
heap
|
page read and write
|
||
CD7000
|
heap
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
7DDB000
|
heap
|
page read and write
|
||
8171000
|
heap
|
page read and write
|
||
EC0000
|
heap
|
page read and write
|
||
EB5000
|
unkown
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
5050000
|
direct allocation
|
page execute and read and write
|
||
512B000
|
stack
|
page read and write
|
||
456E000
|
stack
|
page read and write
|
||
7DBC000
|
heap
|
page read and write
|
||
34F0000
|
direct allocation
|
page execute and read and write
|
||
7D00000
|
heap
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
312F000
|
stack
|
page read and write
|
||
F11000
|
heap
|
page read and write
|
||
D03000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
7DBA000
|
heap
|
page read and write
|
||
6276000
|
heap
|
page read and write
|
||
137E000
|
stack
|
page read and write
|
||
7DF1000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
7CF4000
|
heap
|
page read and write
|
||
339E000
|
stack
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
771000
|
unkown
|
page write copy
|
||
4C61000
|
heap
|
page read and write
|
||
1195000
|
heap
|
page read and write
|
||
47F1000
|
heap
|
page read and write
|
||
284B17D7000
|
heap
|
page read and write
|
||
6D3E000
|
heap
|
page read and write
|
||
362F000
|
stack
|
page read and write
|
||
10F0000
|
direct allocation
|
page read and write
|
||
7CB4000
|
heap
|
page read and write
|
||
820000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
D3E000
|
heap
|
page read and write
|
||
8240000
|
trusted library allocation
|
page read and write
|
||
4D60000
|
direct allocation
|
page execute and read and write
|
||
4B71000
|
heap
|
page read and write
|
||
7CE6000
|
heap
|
page read and write
|
||
8171000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
14C7000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
8172000
|
heap
|
page read and write
|
||
4C90000
|
direct allocation
|
page execute and read and write
|
||
37EE000
|
stack
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
8172000
|
heap
|
page read and write
|
||
51A0000
|
direct allocation
|
page execute and read and write
|
||
438E000
|
stack
|
page read and write
|
||
10F4000
|
trusted library allocation
|
page read and write
|
||
7941000
|
heap
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
479E000
|
stack
|
page read and write
|
||
4F80000
|
direct allocation
|
page execute and read and write
|
||
7DD0000
|
heap
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
4CA0000
|
direct allocation
|
page execute and read and write
|
||
3BAE000
|
stack
|
page read and write
|
||
1003000
|
heap
|
page read and write
|
||
1340000
|
direct allocation
|
page read and write
|
||
32E4000
|
heap
|
page read and write
|
||
E63000
|
unkown
|
page execute and write copy
|
||
7E1000
|
unkown
|
page execute and read and write
|
||
1B2B000
|
heap
|
page execute and read and write
|
||
8171000
|
heap
|
page read and write
|
||
96F000
|
unkown
|
page read and write
|
||
844000
|
heap
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
3ADF000
|
stack
|
page read and write
|
||
7C9E000
|
heap
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
A12000
|
unkown
|
page execute and read and write
|
||
11B2000
|
heap
|
page read and write
|
||
CA0000
|
direct allocation
|
page read and write
|
||
4C61000
|
heap
|
page read and write
|
||
2C8E000
|
stack
|
page read and write
|
||
47F1000
|
heap
|
page read and write
|
||
430000
|
unkown
|
page read and write
|
||
C2DA3FB000
|
stack
|
page read and write
|
||
1F380091000
|
trusted library allocation
|
page read and write
|
||
4CE1000
|
heap
|
page read and write
|
||
1C051000
|
heap
|
page read and write
|
||
38EF000
|
stack
|
page read and write
|
||
4A70000
|
direct allocation
|
page read and write
|
||
4CE1000
|
heap
|
page read and write
|
||
5290000
|
direct allocation
|
page execute and read and write
|
||
F1B000
|
heap
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
DAD000
|
unkown
|
page execute and read and write
|
||
38B8000
|
heap
|
page read and write
|
||
14C2000
|
heap
|
page read and write
|
||
2CE0000
|
heap
|
page read and write
|
||
3DEF000
|
stack
|
page read and write
|
||
41FE000
|
stack
|
page read and write
|
||
7CD3000
|
heap
|
page read and write
|
||
349F000
|
stack
|
page read and write
|
||
28182000
|
heap
|
page read and write
|
||
EA0000
|
unkown
|
page readonly
|
||
CD6000
|
unkown
|
page execute and write copy
|
||
844000
|
heap
|
page read and write
|
||
C8543FE000
|
stack
|
page read and write
|
||
6270000
|
heap
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
7B5E000
|
stack
|
page read and write
|
||
7FAE000
|
stack
|
page read and write
|
||
7DF3000
|
heap
|
page read and write
|
||
7CE4000
|
heap
|
page read and write
|
||
13D2000
|
heap
|
page read and write
|
||
11B7000
|
heap
|
page read and write
|
||
3BE0000
|
heap
|
page read and write
|
||
14C0000
|
direct allocation
|
page read and write
|
||
FC9000
|
heap
|
page read and write
|
||
4CE1000
|
heap
|
page read and write
|
||
EF0000
|
direct allocation
|
page read and write
|
||
4DC0000
|
direct allocation
|
page read and write
|
||
CD3000
|
unkown
|
page execute and write copy
|
||
13A4000
|
heap
|
page read and write
|
||
7DC8000
|
heap
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
EF0000
|
direct allocation
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
77AF000
|
stack
|
page read and write
|
||
2C00000
|
direct allocation
|
page read and write
|
||
7C90000
|
trusted library allocation
|
page read and write
|
||
50F0000
|
direct allocation
|
page execute and read and write
|
||
1214000
|
heap
|
page read and write
|
||
8153000
|
heap
|
page read and write
|
||
7C9E000
|
heap
|
page read and write
|
||
D53000
|
heap
|
page read and write
|
||
98C000
|
stack
|
page read and write
|
||
38D5000
|
heap
|
page read and write
|
||
7E1C000
|
heap
|
page read and write
|
||
38AF000
|
heap
|
page read and write
|
||
7D3F000
|
heap
|
page read and write
|
||
7CF4000
|
heap
|
page read and write
|
||
A28000
|
heap
|
page read and write
|
||
139F000
|
heap
|
page read and write
|
||
5200000
|
direct allocation
|
page execute and read and write
|
||
4981000
|
heap
|
page read and write
|
There are 3481 hidden memdumps, click here to show them.