Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
5d9fe2735d4399d98e6e6a792b1feb26d6f2d9a5d77944ecacb4b4837e5e5fca.zip
|
Zip archive data, at least v5.1 to extract, compression method=AES Encrypted
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\_MEI14482\Crypto.Cipher._AES.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI14482\_ctypes.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI14482\_hashlib.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI14482\_socket.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI14482\_ssl.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI14482\_win32sysloader.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI14482\back.jpg
|
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI14482\bz2.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI14482\config.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI14482\ftpcrack.exe.manifest
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI14482\msvcp90.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI14482\msvcr90.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI14482\netifaces.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI14482\perfmon.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI14482\psutil._psutil_windows.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI14482\pyexpat.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI14482\python27.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI14482\pywintypes27.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI14482\select.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI14482\servicemanager.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI14482\unicodedata.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI14482\win32api.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI14482\win32event.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI14482\win32evtlog.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI14482\win32service.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI14482\xmrig.exe
|
PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI28682\Crypto.Cipher._AES.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI28682\_ctypes.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI28682\_hashlib.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI28682\_socket.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI28682\_ssl.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI28682\_win32sysloader.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI28682\back.jpg
|
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI28682\bz2.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI28682\config.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI28682\ftpcrack.exe.manifest
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI28682\msvcp90.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI28682\msvcr90.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI28682\netifaces.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI28682\perfmon.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI28682\psutil._psutil_windows.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI28682\pyexpat.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI28682\python27.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI28682\pywintypes27.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI28682\select.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI28682\servicemanager.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI28682\unicodedata.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI28682\win32api.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI28682\win32event.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI28682\win32evtlog.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI28682\win32service.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI28682\xmrig.exe
|
PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI33482\Crypto.Cipher._AES.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI33482\_ctypes.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI33482\_hashlib.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI33482\_socket.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI33482\_ssl.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI33482\_win32sysloader.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI33482\back.jpg
|
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI33482\bz2.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI33482\config.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI33482\ftpcrack.exe.manifest
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI33482\msvcp90.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI33482\msvcr90.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI33482\netifaces.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI33482\perfmon.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI33482\psutil._psutil_windows.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI33482\pyexpat.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI33482\python27.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI33482\pywintypes27.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI33482\select.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI33482\servicemanager.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI33482\unicodedata.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI33482\win32api.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI33482\win32event.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI33482\win32evtlog.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI33482\win32service.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI33482\xmrig.exe
|
PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI57642\Crypto.Cipher._AES.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI57642\_ctypes.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI57642\_hashlib.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI57642\_socket.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI57642\_ssl.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI57642\_win32sysloader.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI57642\back.jpg
|
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI57642\bz2.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI57642\config.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI57642\ftpcrack.exe.manifest
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI57642\msvcp90.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI57642\msvcr90.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI57642\netifaces.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI57642\perfmon.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI57642\psutil._psutil_windows.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI57642\pyexpat.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI57642\python27.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI57642\pywintypes27.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI57642\select.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI57642\servicemanager.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI57642\unicodedata.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI57642\win32api.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI57642\win32event.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI57642\win32evtlog.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI57642\win32service.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI57642\xmrig.exe
|
PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\Desktop\5d9fe2735d4399d98e6e6a792b1feb26d6f2d9a5d77944ecacb4b4837e5e5fca\5d9fe2735d4399d98e6e6a792b1feb26d6f2d9a5d77944ecacb4b4837e5e5fca.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\HelpPane.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Temp\_MEI70482\Crypto.Cipher._AES.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Windows\Temp\_MEI70482\_ctypes.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Windows\Temp\_MEI70482\_hashlib.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Windows\Temp\_MEI70482\_socket.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Windows\Temp\_MEI70482\_ssl.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Windows\Temp\_MEI70482\_win32sysloader.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Temp\_MEI70482\back.jpg
|
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
|
dropped
|
||
C:\Windows\Temp\_MEI70482\bz2.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Windows\Temp\_MEI70482\config.json
|
JSON data
|
dropped
|
||
C:\Windows\Temp\_MEI70482\msvcp90.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Windows\Temp\_MEI70482\msvcr90.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Windows\Temp\_MEI70482\netifaces.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Windows\Temp\_MEI70482\perfmon.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Windows\Temp\_MEI70482\psutil._psutil_windows.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Windows\Temp\_MEI70482\pyexpat.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Windows\Temp\_MEI70482\python27.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Windows\Temp\_MEI70482\pywintypes27.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Windows\Temp\_MEI70482\select.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Windows\Temp\_MEI70482\servicemanager.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Windows\Temp\_MEI70482\unicodedata.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Windows\Temp\_MEI70482\win32api.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Windows\Temp\_MEI70482\win32event.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Windows\Temp\_MEI70482\win32evtlog.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Windows\Temp\_MEI70482\win32service.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Windows\Temp\_MEI70482\xmrig.exe
|
PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
|
dropped
|
||
C:\Windows\Temp\config
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Temp\config.json
|
JSON data
|
dropped
|
||
C:\Windows\Temp\xmrig.exe
|
PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\edb.log
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
|
Extensible storage engine DataBase, version 0x620, checksum 0xa2188a86, page size 16384, DirtyShutdown, Windows version 10.0
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
|
data
|
dropped
|
||
C:\ProgramData\USOShared\Logs\System\UpdateSessionOrchestration.7ae3c485-636a-4b66-a35a-b2059d1e6bb9.1.etl
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI14482\Include\pyconfig.h
|
C source, ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI14482\Microsoft.VC90.CRT.manifest
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI14482\certifi\cacert.pem
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI14482\httplib2\cacerts.txt
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI14482\msvcm90.dll
|
PE32 executable (DLL) (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI28682\Include\pyconfig.h
|
C source, ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI28682\Microsoft.VC90.CRT.manifest
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI28682\certifi\cacert.pem
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI28682\httplib2\cacerts.txt
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI28682\msvcm90.dll
|
PE32 executable (DLL) (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI33482\Include\pyconfig.h
|
C source, ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI33482\Microsoft.VC90.CRT.manifest
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI33482\certifi\cacert.pem
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI33482\httplib2\cacerts.txt
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI33482\msvcm90.dll
|
PE32 executable (DLL) (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI57642\Include\pyconfig.h
|
C source, ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI57642\Microsoft.VC90.CRT.manifest
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI57642\certifi\cacert.pem
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI57642\httplib2\cacerts.txt
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI57642\msvcm90.dll
|
PE32 executable (DLL) (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
|
JSON data
|
dropped
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
modified
|
||
C:\Windows\Temp\_MEI70482\Include\pyconfig.h
|
C source, ASCII text
|
dropped
|
||
C:\Windows\Temp\_MEI70482\Microsoft.VC90.CRT.manifest
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Temp\_MEI70482\certifi\cacert.pem
|
ASCII text
|
dropped
|
||
C:\Windows\Temp\_MEI70482\ftpcrack.exe.manifest
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Temp\_MEI70482\httplib2\cacerts.txt
|
ASCII text
|
dropped
|
||
C:\Windows\Temp\_MEI70482\msvcm90.dll
|
PE32 executable (DLL) (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Temp\link.txt
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has command line arguments, Archive,
ctime=Sun May 26 13:48:06 2019, mtime=Sun Jun 2 09:48:11 2019, atime=Sun May 26 13:48:06 2019, length=3933296, window=hide
|
dropped
|
||
\Device\ConDrv
|
ASCII text, with CRLF line terminators
|
dropped
|
There are 159 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
|
||
C:\Program Files\7-Zip\7zG.exe
|
"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\user\Desktop\5d9fe2735d4399d98e6e6a792b1feb26d6f2d9a5d77944ecacb4b4837e5e5fca\"
-ad -an -ai#7zMap16652:184:7zEvent5233
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k NetworkService -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\system32\svchost.exe -k UnistackSvcGroup
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s wscsvc
|
||
C:\Users\user\Desktop\5d9fe2735d4399d98e6e6a792b1feb26d6f2d9a5d77944ecacb4b4837e5e5fca\5d9fe2735d4399d98e6e6a792b1feb26d6f2d9a5d77944ecacb4b4837e5e5fca.exe
|
"C:\Users\user\Desktop\5d9fe2735d4399d98e6e6a792b1feb26d6f2d9a5d77944ecacb4b4837e5e5fca\5d9fe2735d4399d98e6e6a792b1feb26d6f2d9a5d77944ecacb4b4837e5e5fca.exe"
|
||
C:\Users\user\Desktop\5d9fe2735d4399d98e6e6a792b1feb26d6f2d9a5d77944ecacb4b4837e5e5fca\5d9fe2735d4399d98e6e6a792b1feb26d6f2d9a5d77944ecacb4b4837e5e5fca.exe
|
"C:\Users\user\Desktop\5d9fe2735d4399d98e6e6a792b1feb26d6f2d9a5d77944ecacb4b4837e5e5fca\5d9fe2735d4399d98e6e6a792b1feb26d6f2d9a5d77944ecacb4b4837e5e5fca.exe"
|
||
C:\Users\user\Desktop\5d9fe2735d4399d98e6e6a792b1feb26d6f2d9a5d77944ecacb4b4837e5e5fca\5d9fe2735d4399d98e6e6a792b1feb26d6f2d9a5d77944ecacb4b4837e5e5fca.exe
|
"C:\Users\user\Desktop\5d9fe2735d4399d98e6e6a792b1feb26d6f2d9a5d77944ecacb4b4837e5e5fca\5d9fe2735d4399d98e6e6a792b1feb26d6f2d9a5d77944ecacb4b4837e5e5fca.exe"
|
||
C:\Users\user\Desktop\5d9fe2735d4399d98e6e6a792b1feb26d6f2d9a5d77944ecacb4b4837e5e5fca\5d9fe2735d4399d98e6e6a792b1feb26d6f2d9a5d77944ecacb4b4837e5e5fca.exe
|
"C:\Users\user\Desktop\5d9fe2735d4399d98e6e6a792b1feb26d6f2d9a5d77944ecacb4b4837e5e5fca\5d9fe2735d4399d98e6e6a792b1feb26d6f2d9a5d77944ecacb4b4837e5e5fca.exe"
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /c copy /y C:\Users\user\Desktop\5d9fe2735d4399d98e6e6a792b1feb26d6f2d9a5d77944ecacb4b4837e5e5fca\5d9fe2735d4399d98e6e6a792b1feb26d6f2d9a5d77944ecacb4b4837e5e5fca.exe
C:\Users\user\HelpPane.exe
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /c C:\Users\user\HelpPane.exe --startup auto install
|
||
C:\Users\user\HelpPane.exe
|
C:\Users\user\HelpPane.exe --startup auto install
|
||
C:\Users\user\HelpPane.exe
|
C:\Users\user\HelpPane.exe --startup auto install
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /c C:\Users\user\HelpPane.exe start
|
||
C:\Users\user\HelpPane.exe
|
C:\Users\user\HelpPane.exe start
|
||
C:\Users\user\HelpPane.exe
|
C:\Users\user\HelpPane.exe start
|
||
C:\Users\user\HelpPane.exe
|
"C:\Users\user\HelpPane.exe"
|
||
C:\Users\user\HelpPane.exe
|
"C:\Users\user\HelpPane.exe"
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /c taskkill /pid 2284 /f
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /c copy /y C:\Windows\TEMP\_MEI70~1\xmrig.exe C:\Windows\TEMP\xmrig.exe
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /c copy /y C:\Windows\TEMP\_MEI70~1\config.json C:\Windows\TEMP\config.json
|
||
C:\Windows\Temp\xmrig.exe
|
C:\Windows\TEMP\xmrig.exe
|
||
C:\Windows\SysWOW64\netsh.exe
|
netsh firewall add allowedprogram C:\Users\user\HelpPane.exe "MyApp" ENABLE
|
||
C:\Windows\System32\rundll32.exe
|
C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6}
-Embedding
|
||
C:\Windows\System32\SgrmBroker.exe
|
C:\Windows\system32\SgrmBroker.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /pid 2284 /f
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\spoolsv.exe
|
C:\Windows\System32\spoolsv.exe
|
||
C:\Program Files\Windows Defender\MpCmdRun.exe
|
"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 29 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://gcc.gnu.org/bugs/):
|
unknown
|
||
https://mahler:8092/site-updates.py
|
unknown
|
||
http://docs.python.org/3/library/functools.html#functools.lru_cache
|
unknown
|
||
http://mail.pytho
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/Routes/
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Routes/Driving
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
|
unknown
|
||
https://t0.tiles.ditu.live.com/tiles/gen
|
unknown
|
||
http://www.python.org/
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Routes/Walking
|
unknown
|
||
https://www.google.com/accounts/ClientLogin
|
unknown
|
||
http://proxy.ex
|
unknown
|
||
http://www.openssl.org/support/faq.html
|
unknown
|
||
https://dev.ditu.live.com/mapcontrol/logging.ashx
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
|
unknown
|
||
http://www.iana.org/assignments/tls-parameters/tls-parameters.xml#tls-parameters-6
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Transit/Schedules/
|
unknown
|
||
http://www.faqs.org/rfcs/rfc2822.html
|
unknown
|
||
http://mail.python.org/pipermail/python-dev/2012-June/120787.html
|
unknown
|
||
http://docs.python.org/3/library/subprocess.html
|
unknown
|
||
http://goo.gl/zeJZl
|
unknown
|
||
http://www.python.org/dev/peps/pep-0205/
|
unknown
|
||
http://www.bingmapsportal.com
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Imagery/Copyright/
|
unknown
|
||
https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
|
unknown
|
||
http://pyloris.sourceforge.net/).
|
unknown
|
||
https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
|
unknown
|
||
http://python.org/dev/peps/pep-0263/
|
unknown
|
||
http://www.valicert.com/
|
unknown
|
||
http://motomastyle.com/)
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/Transit/Stops/
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Routes/
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Traffic/Incidents/
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
|
unknown
|
||
https://dynamic.api.tiles.ditu.live.com/odvs/gri?pv=1&r=
|
unknown
|
||
http://crl.ver)
|
unknown
|
||
https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
|
unknown
|
||
http://bugs.python.org/issue6973.
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
|
unknown
|
||
https://ecn.dev.virtualearth.net/REST/V1/MapControlConfiguration/native/
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Locations
|
unknown
|
||
https://dev.ditu.live.com/REST/V1/MapControlConfiguration/native/
|
unknown
|
||
https://dev.virtualearth.net/mapcontrol/logging.ashx
|
unknown
|
||
http://breakingcode.wordpress.com/)
|
unknown
|
||
https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
|
unknown
|
||
https://dynamic.t
|
unknown
|
||
https://g.live.com/odclientsettings/Prod-C:
|
unknown
|
||
http://tools.ietf.org/html/rfc6125#section-6.4.3
|
unknown
|
||
http://www.openssl.org/support/faq.htmlC:
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Routes/Transit
|
unknown
|
||
https://github.com/mhammond/pywin320
|
unknown
|
||
https://g.live.com/odclientsettings/ProdV2-C:
|
unknown
|
||
https://.P
|
unknown
|
||
https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
|
unknown
|
||
https://tiles.virtualearth.net/tiles/cmd/StreetSideBubbleMetaData?north=
|
unknown
|
||
https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
|
unknown
|
||
http://www.faqs.org/rfcs/rfc822.html
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/Locations
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtu
|
unknown
|
||
http://docs.python.org/library/socket.html#socket.setdefaulttimeout
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/
|
unknown
|
||
https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
|
unknown
|
There are 53 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
dht.transmissionbt.com
|
87.98.162.88
|
||
bttracker.acc.umu.se
|
130.239.18.158
|
||
router.bittorrent.com
|
67.215.246.10
|
||
router.utorrent.com
|
82.221.103.244
|
||
xmr.crypto-pool.fr
|
unknown
|
||
bttracker.debian.org
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
1.241.172.105
|
unknown
|
Korea Republic of
|
||
117.204.203.91
|
unknown
|
India
|
||
117.204.203.84
|
unknown
|
India
|
||
117.204.203.90
|
unknown
|
India
|
||
182.127.183.40
|
unknown
|
China
|
||
71.221.126.225
|
unknown
|
United States
|
||
140.108.194.87
|
unknown
|
United States
|
||
117.90.247.237
|
unknown
|
China
|
||
117.204.203.72
|
unknown
|
India
|
||
65.119.229.26
|
unknown
|
United States
|
||
117.204.203.73
|
unknown
|
India
|
||
95.57.233.38
|
unknown
|
Kazakhstan
|
||
99.140.119.229
|
unknown
|
United States
|
||
221.55.216.129
|
unknown
|
Japan
|
||
70.227.202.179
|
unknown
|
United States
|
||
50.165.122.9
|
unknown
|
United States
|
||
82.61.252.30
|
unknown
|
Italy
|
||
151.53.156.120
|
unknown
|
Italy
|
||
36.13.225.183
|
unknown
|
Japan
|
||
98.214.132.109
|
unknown
|
United States
|
||
125.44.36.16
|
unknown
|
China
|
||
43.70.37.217
|
unknown
|
Japan
|
||
198.236.210.207
|
unknown
|
United States
|
||
122.21.106.30
|
unknown
|
Japan
|
||
125.125.211.109
|
unknown
|
China
|
||
211.203.192.131
|
unknown
|
Korea Republic of
|
||
61.84.74.119
|
unknown
|
Korea Republic of
|
||
98.26.186.53
|
unknown
|
United States
|
||
191.128.90.159
|
unknown
|
Brazil
|
||
201.17.110.194
|
unknown
|
Brazil
|
||
178.72.78.170
|
unknown
|
Russian Federation
|
||
126.204.118.24
|
unknown
|
Japan
|
||
118.155.201.137
|
unknown
|
Japan
|
||
6.53.111.46
|
unknown
|
United States
|
||
120.20.155.234
|
unknown
|
Australia
|
||
118.8.227.76
|
unknown
|
Japan
|
||
150.156.128.15
|
unknown
|
United States
|
||
119.204.19.238
|
unknown
|
Korea Republic of
|
||
119.193.74.194
|
unknown
|
Korea Republic of
|
||
197.237.98.149
|
unknown
|
Kenya
|
||
153.163.61.125
|
unknown
|
Japan
|
||
40.184.207.203
|
unknown
|
United States
|
||
85.168.61.126
|
unknown
|
France
|
||
105.214.99.140
|
unknown
|
South Africa
|
||
123.15.159.248
|
unknown
|
China
|
||
220.198.240.128
|
unknown
|
China
|
||
114.78.247.166
|
unknown
|
Australia
|
||
68.179.69.27
|
unknown
|
Canada
|
||
91.146.9.12
|
unknown
|
Russian Federation
|
||
91.127.252.253
|
unknown
|
Slovakia (SLOVAK Republic)
|
||
95.83.17.9
|
unknown
|
Russian Federation
|
||
84.20.235.151
|
unknown
|
Slovenia
|
||
5.142.92.11
|
unknown
|
Russian Federation
|
||
1.81.81.184
|
unknown
|
China
|
||
112.80.232.5
|
unknown
|
China
|
||
176.77.11.83
|
unknown
|
Russian Federation
|
||
101.98.183.156
|
unknown
|
New Zealand
|
||
86.17.186.211
|
unknown
|
United Kingdom
|
||
193.107.183.90
|
unknown
|
Russian Federation
|
||
156.114.21.239
|
unknown
|
Netherlands
|
||
211.17.6.154
|
unknown
|
Japan
|
||
83.158.181.217
|
unknown
|
France
|
||
94.50.19.42
|
unknown
|
Russian Federation
|
||
21.63.221.57
|
unknown
|
United States
|
||
54.236.234.52
|
unknown
|
United States
|
||
70.19.70.116
|
unknown
|
United States
|
||
3.29.236.43
|
unknown
|
United States
|
||
125.136.218.222
|
unknown
|
Korea Republic of
|
||
40.231.106.212
|
unknown
|
United States
|
||
42.192.179.207
|
unknown
|
China
|
||
117.204.203.85
|
unknown
|
India
|
||
86.193.210.142
|
unknown
|
France
|
||
187.184.203.20
|
unknown
|
Mexico
|
||
39.64.69.198
|
unknown
|
China
|
||
37.52.88.18
|
unknown
|
Ukraine
|
||
52.251.253.134
|
unknown
|
United States
|
||
223.100.5.56
|
unknown
|
China
|
||
138.67.220.218
|
unknown
|
United States
|
||
111.197.247.49
|
unknown
|
China
|
||
177.230.146.176
|
unknown
|
Mexico
|
||
174.245.176.198
|
unknown
|
United States
|
||
52.7.125.172
|
unknown
|
United States
|
||
4.49.166.159
|
unknown
|
United States
|
||
22.189.24.237
|
unknown
|
United States
|
||
199.19.225.48
|
unknown
|
United States
|
||
175.203.170.52
|
unknown
|
Korea Republic of
|
||
45.91.104.5
|
unknown
|
Hungary
|
||
191.41.165.22
|
unknown
|
Brazil
|
||
68.203.208.111
|
unknown
|
United States
|
||
125.43.93.177
|
unknown
|
China
|
||
26.3.158.61
|
unknown
|
United States
|
||
89.162.86.210
|
unknown
|
Norway
|
||
210.69.114.68
|
unknown
|
Taiwan; Republic of China (ROC)
|
||
36.245.54.10
|
unknown
|
Japan
|
||
33.224.113.159
|
unknown
|
United States
|
||
82.39.124.216
|
unknown
|
United Kingdom
|
||
37.48.244.25
|
unknown
|
United Kingdom
|
||
78.108.29.116
|
unknown
|
Hungary
|
||
171.4.223.222
|
unknown
|
Thailand
|
||
131.204.52.84
|
unknown
|
United States
|
There are 90 hidden IPs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
|
cval
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
|
PerfMMFileName
|
||
HKEY_CURRENT_USER\SOFTWARE\7-Zip\Extraction
|
PathHistory
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\WMI\Security
|
c688cf83-9945-5ff6-0e1e-1ff1f8a2ec9a
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Orchestrator
|
StartWorkerOnServiceStart
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Orchestrator\Scheduler
|
Checking to see if mostack override has changed
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Orchestrator\Scheduler
|
UsoCrmScan
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Orchestrator\Scheduler
|
CleanupUsoLogs
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\StateftpService\PythonClass
|
NULL
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
401000
|
unkown
|
page execute and read and write
|
||
1500000
|
heap
|
page read and write
|
||
CCE000
|
heap
|
page read and write
|
||
9B5000
|
unkown
|
page read and write
|
||
EF0000
|
direct allocation
|
page read and write
|
||
18A2000
|
heap
|
page read and write
|
||
151D000
|
heap
|
page read and write
|
||
C15000
|
heap
|
page read and write
|
||
CE3000
|
heap
|
page read and write
|
||
311C000
|
heap
|
page read and write
|
||
24AF000
|
heap
|
page read and write
|
||
9B0000
|
unkown
|
page write copy
|
||
151E000
|
heap
|
page read and write
|
||
1DE9000
|
heap
|
page read and write
|
||
C72E000
|
stack
|
page read and write
|
||
3450000
|
heap
|
page read and write
|
||
1E9BA000
|
unkown
|
page execute and write copy
|
||
C36E000
|
stack
|
page read and write
|
||
21D1000
|
heap
|
page read and write
|
||
26EDB319000
|
heap
|
page read and write
|
||
35B7000
|
heap
|
page read and write
|
||
138E000
|
stack
|
page read and write
|
||
23A2000
|
heap
|
page read and write
|
||
6CE11000
|
unkown
|
page execute and read and write
|
||
314A000
|
heap
|
page read and write
|
||
C4AE000
|
stack
|
page read and write
|
||
122DC000
|
heap
|
page read and write
|
||
2FB3000
|
heap
|
page read and write
|
||
145E000
|
stack
|
page read and write
|
||
6C562000
|
unkown
|
page execute and read and write
|
||
244E000
|
heap
|
page read and write
|
||
8CAE000
|
stack
|
page read and write
|
||
1134E000
|
stack
|
page read and write
|
||
1E17000
|
heap
|
page read and write
|
||
6EAE000
|
stack
|
page read and write
|
||
DFF000
|
unkown
|
page read and write
|
||
2FB7000
|
heap
|
page read and write
|
||
6C313000
|
unkown
|
page execute and read and write
|
||
2FE2000
|
heap
|
page read and write
|
||
31A8000
|
heap
|
page read and write
|
||
1E7BE000
|
unkown
|
page execute and read and write
|
||
3DC000
|
unkown
|
page read and write
|
||
EEDC2FB000
|
stack
|
page read and write
|
||
6D09A000
|
unkown
|
page execute and read and write
|
||
5FAE000
|
stack
|
page read and write
|
||
6C3E0000
|
unkown
|
page readonly
|
||
399D000
|
heap
|
page read and write
|
||
AF9027E000
|
unkown
|
page readonly
|
||
AF8F59B000
|
stack
|
page read and write
|
||
24F7000
|
heap
|
page read and write
|
||
74EE000
|
stack
|
page read and write
|
||
27CD2600000
|
heap
|
page read and write
|
||
1F08A461000
|
heap
|
page read and write
|
||
6C7A1000
|
unkown
|
page execute and read and write
|
||
2542000
|
heap
|
page read and write
|
||
C2C000
|
heap
|
page read and write
|
||
26EDB141000
|
trusted library allocation
|
page read and write
|
||
301B000
|
heap
|
page read and write
|
||
2F9000
|
unkown
|
page read and write
|
||
1E7A1000
|
unkown
|
page execute and read and write
|
||
1F08A44C000
|
heap
|
page read and write
|
||
2591000
|
heap
|
page read and write
|
||
3115000
|
heap
|
page read and write
|
||
21D1000
|
heap
|
page read and write
|
||
151E000
|
heap
|
page read and write
|
||
473C000
|
stack
|
page read and write
|
||
24F4000
|
heap
|
page read and write
|
||
25C8000
|
heap
|
page read and write
|
||
2CA4000
|
heap
|
page read and write
|
||
EEDB8FE000
|
unkown
|
page readonly
|
||
3A3A000
|
heap
|
page read and write
|
||
2272000
|
heap
|
page read and write
|
||
1686000
|
heap
|
page read and write
|
||
74DFB000
|
unkown
|
page execute and write copy
|
||
73A51000
|
unkown
|
page execute and read and write
|
||
29FC000
|
heap
|
page read and write
|
||
2795000
|
heap
|
page read and write
|
||
6D0A6000
|
unkown
|
page execute and read and write
|
||
2A7A000
|
heap
|
page read and write
|
||
45553FE000
|
unkown
|
page readonly
|
||
2E02000
|
heap
|
page read and write
|
||
1E01000
|
heap
|
page read and write
|
||
35CC000
|
heap
|
page read and write
|
||
23FA000
|
heap
|
page read and write
|
||
2DFD000
|
heap
|
page read and write
|
||
1997AB30000
|
heap
|
page read and write
|
||
2A94000
|
heap
|
page read and write
|
||
A503E7E000
|
unkown
|
page readonly
|
||
2C25000
|
heap
|
page read and write
|
||
834000
|
heap
|
page read and write
|
||
26ED5C8F000
|
heap
|
page read and write
|
||
36CA000
|
heap
|
page read and write
|
||
10F2000
|
stack
|
page read and write
|
||
2D75000
|
heap
|
page read and write
|
||
2FB8000
|
heap
|
page read and write
|
||
2595000
|
heap
|
page read and write
|
||
63AD000
|
stack
|
page read and write
|
||
225B75D0000
|
heap
|
page read and write
|
||
225B7613000
|
heap
|
page read and write
|
||
817000
|
heap
|
page read and write
|
||
6D071000
|
unkown
|
page execute and read and write
|
||
2594000
|
heap
|
page read and write
|
||
23A6000
|
heap
|
page read and write
|
||
9E2E000
|
stack
|
page read and write
|
||
2A90000
|
heap
|
page read and write
|
||
3250000
|
unkown
|
page readonly
|
||
1517000
|
heap
|
page read and write
|
||
34C000
|
stack
|
page read and write
|
||
27C50F00000
|
heap
|
page read and write
|
||
2FB8000
|
heap
|
page read and write
|
||
4F6D000
|
stack
|
page read and write
|
||
1F08A441000
|
heap
|
page read and write
|
||
1108E000
|
stack
|
page read and write
|
||
1DD0000
|
heap
|
page read and write
|
||
2FB5000
|
heap
|
page read and write
|
||
31EB000
|
heap
|
page read and write
|
||
6C3A1000
|
unkown
|
page execute and read and write
|
||
2321000
|
heap
|
page read and write
|
||
25B6000
|
heap
|
page read and write
|
||
316A000
|
heap
|
page read and write
|
||
74DF9000
|
unkown
|
page execute and read and write
|
||
1F08A46B000
|
heap
|
page read and write
|
||
70E000
|
stack
|
page read and write
|
||
2BFF000
|
heap
|
page read and write
|
||
22C9000
|
heap
|
page read and write
|
||
2FB5000
|
heap
|
page read and write
|
||
500000
|
heap
|
page read and write
|
||
6C3C1000
|
unkown
|
page execute and read and write
|
||
D12E000
|
stack
|
page read and write
|
||
2080000
|
heap
|
page read and write
|
||
7BE000
|
stack
|
page read and write
|
||
46AE000
|
stack
|
page read and write
|
||
26ED6A40000
|
trusted library allocation
|
page read and write
|
||
2BFF000
|
heap
|
page read and write
|
||
FA3E000
|
stack
|
page read and write
|
||
27C50E13000
|
heap
|
page read and write
|
||
302A000
|
heap
|
page read and write
|
||
6D0D9000
|
unkown
|
page execute and read and write
|
||
2F9000
|
unkown
|
page read and write
|
||
AA6E000
|
stack
|
page read and write
|
||
26EDB180000
|
trusted library allocation
|
page read and write
|
||
21DC000
|
heap
|
page read and write
|
||
250F000
|
heap
|
page read and write
|
||
10F8D000
|
stack
|
page read and write
|
||
59AE000
|
stack
|
page read and write
|
||
6C2C0000
|
unkown
|
page execute and read and write
|
||
151D000
|
heap
|
page read and write
|
||
D8AE000
|
stack
|
page read and write
|
||
26F8000
|
heap
|
page read and write
|
||
A50407E000
|
unkown
|
page readonly
|
||
1C3FA500000
|
heap
|
page read and write
|
||
2E0000
|
unkown
|
page readonly
|
||
345B000
|
heap
|
page read and write
|
||
1E9B6000
|
unkown
|
page execute and read and write
|
||
260A000
|
heap
|
page read and write
|
||
30C0000
|
heap
|
page read and write
|
||
2FC1000
|
heap
|
page read and write
|
||
A5040FE000
|
stack
|
page read and write
|
||
302A000
|
heap
|
page read and write
|
||
C6F000
|
stack
|
page read and write
|
||
762D000
|
stack
|
page read and write
|
||
2AF0000
|
heap
|
page read and write
|
||
1425000
|
heap
|
page read and write
|
||
2F86000
|
heap
|
page read and write
|
||
3942000
|
heap
|
page read and write
|
||
1865000
|
heap
|
page read and write
|
||
3806000
|
heap
|
page read and write
|
||
59C000
|
stack
|
page read and write
|
||
2A89000
|
heap
|
page read and write
|
||
7EA000
|
heap
|
page read and write
|
||
1194D000
|
stack
|
page read and write
|
||
50EE000
|
stack
|
page read and write
|
||
25A0000
|
heap
|
page read and write
|
||
2EC000
|
unkown
|
page read and write
|
||
A0F000
|
stack
|
page read and write
|
||
6C3DB000
|
unkown
|
page execute and write copy
|
||
302A000
|
heap
|
page read and write
|
||
A32D000
|
stack
|
page read and write
|
||
87B000
|
heap
|
page read and write
|
||
19DE000
|
stack
|
page read and write
|
||
2591000
|
heap
|
page read and write
|
||
2F70000
|
heap
|
page read and write
|
||
30F1000
|
heap
|
page read and write
|
||
2CC2000
|
heap
|
page read and write
|
||
3165000
|
heap
|
page read and write
|
||
6CE40000
|
unkown
|
page readonly
|
||
11E8000
|
heap
|
page read and write
|
||
225B765B000
|
heap
|
page read and write
|
||
2972000
|
heap
|
page read and write
|
||
1573000
|
heap
|
page read and write
|
||
A503D7D000
|
stack
|
page read and write
|
||
15A4000
|
heap
|
page read and write
|
||
2FC7000
|
heap
|
page read and write
|
||
159E000
|
stack
|
page read and write
|
||
CB8000
|
heap
|
page read and write
|
||
27C9000
|
heap
|
page read and write
|
||
1DE6000
|
heap
|
page read and write
|
||
2EC000
|
unkown
|
page read and write
|
||
2443000
|
heap
|
page read and write
|
||
6C5CB000
|
unkown
|
page execute and read and write
|
||
3353000
|
heap
|
page read and write
|
||
2FCA000
|
heap
|
page read and write
|
||
2F9000
|
unkown
|
page read and write
|
||
C0C000
|
heap
|
page read and write
|
||
88F000
|
heap
|
page read and write
|
||
8DD000
|
heap
|
page read and write
|
||
22BE000
|
heap
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
13D0000
|
heap
|
page read and write
|
||
CF0000
|
heap
|
page read and write
|
||
339D000
|
heap
|
page read and write
|
||
6C3A0000
|
unkown
|
page readonly
|
||
26ED6502000
|
heap
|
page read and write
|
||
3270000
|
unkown
|
page readonly
|
||
1516000
|
heap
|
page read and write
|
||
3165000
|
heap
|
page read and write
|
||
26ED5CBA000
|
heap
|
page read and write
|
||
1F08A475000
|
heap
|
page read and write
|
||
311B000
|
heap
|
page read and write
|
||
302A000
|
heap
|
page read and write
|
||
2F82000
|
heap
|
page read and write
|
||
30BB000
|
heap
|
page read and write
|
||
26EDB140000
|
trusted library allocation
|
page read and write
|
||
84A000
|
heap
|
page read and write
|
||
2E0000
|
unkown
|
page readonly
|
||
1366000
|
trusted library allocation
|
page read and write
|
||
6F2000
|
stack
|
page read and write
|
||
EEDB1FB000
|
stack
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
194F000
|
stack
|
page read and write
|
||
1F08A436000
|
heap
|
page read and write
|
||
1148E000
|
stack
|
page read and write
|
||
2B88000
|
heap
|
page read and write
|
||
1E1E000
|
stack
|
page read and write
|
||
F3B000
|
heap
|
page read and write
|
||
3213000
|
heap
|
page read and write
|
||
2FC1000
|
heap
|
page read and write
|
||
2F44000
|
heap
|
page read and write
|
||
3AE2000
|
heap
|
page read and write
|
||
EEDACFE000
|
unkown
|
page readonly
|
||
837000
|
heap
|
page read and write
|
||
27C50E72000
|
heap
|
page read and write
|
||
3296000
|
heap
|
page read and write
|
||
2380000
|
unkown
|
page readonly
|
||
21EA000
|
heap
|
page read and write
|
||
2B4D000
|
heap
|
page read and write
|
||
39DA000
|
heap
|
page read and write
|
||
22C1000
|
heap
|
page read and write
|
||
21E9000
|
heap
|
page read and write
|
||
74E000
|
heap
|
page read and write
|
||
3DC000
|
unkown
|
page write copy
|
||
3279000
|
unkown
|
page read and write
|
||
21D1000
|
heap
|
page read and write
|
||
6CAFB000
|
unkown
|
page execute and read and write
|
||
1997AB35000
|
heap
|
page read and write
|
||
3122000
|
heap
|
page read and write
|
||
26EDB120000
|
trusted library allocation
|
page read and write
|
||
6D06E000
|
unkown
|
page execute and read and write
|
||
2C1000
|
unkown
|
page execute read
|
||
2E4E000
|
heap
|
page read and write
|
||
1EFD2960000
|
heap
|
page read and write
|
||
29EE000
|
heap
|
page read and write
|
||
26ED6C80000
|
trusted library allocation
|
page read and write
|
||
1E7D6000
|
unkown
|
page execute and read and write
|
||
295E000
|
stack
|
page read and write
|
||
2C0000
|
unkown
|
page readonly
|
||
A50487D000
|
stack
|
page read and write
|
||
482D000
|
stack
|
page read and write
|
||
7C2D000
|
stack
|
page read and write
|
||
F0AE000
|
stack
|
page read and write
|
||
8D6000
|
heap
|
page read and write
|
||
32BC000
|
heap
|
page read and write
|
||
1E9B9000
|
unkown
|
page execute and read and write
|
||
A5AE000
|
stack
|
page read and write
|
||
1C5000
|
heap
|
page read and write
|
||
2E2E000
|
heap
|
page read and write
|
||
12A0000
|
heap
|
page read and write
|
||
136D000
|
trusted library allocation
|
page read and write
|
||
6CE38000
|
unkown
|
page read and write
|
||
2FD5000
|
heap
|
page read and write
|
||
3675000
|
heap
|
page read and write
|
||
31E7000
|
heap
|
page read and write
|
||
3383000
|
heap
|
page read and write
|
||
889000
|
heap
|
page read and write
|
||
2598000
|
heap
|
page read and write
|
||
2F75000
|
heap
|
page read and write
|
||
CFB000
|
stack
|
page read and write
|
||
A50447E000
|
unkown
|
page readonly
|
||
27C50E02000
|
heap
|
page read and write
|
||
2CE1000
|
heap
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
35B8000
|
heap
|
page read and write
|
||
2CCD000
|
heap
|
page read and write
|
||
8B8000
|
heap
|
page read and write
|
||
3884000
|
heap
|
page read and write
|
||
249A000
|
heap
|
page read and write
|
||
6C32D000
|
unkown
|
page execute and read and write
|
||
FF3E000
|
stack
|
page read and write
|
||
10008000
|
unkown
|
page execute and read and write
|
||
1997ABFE000
|
heap
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
6C732000
|
unkown
|
page execute and read and write
|
||
1750000
|
heap
|
page read and write
|
||
302A000
|
heap
|
page read and write
|
||
F9C000
|
stack
|
page read and write
|
||
1C3FAA02000
|
heap
|
page read and write
|
||
2B05000
|
heap
|
page read and write
|
||
55AE000
|
stack
|
page read and write
|
||
396C000
|
heap
|
page read and write
|
||
E3E000
|
stack
|
page read and write
|
||
1C3FA481000
|
heap
|
page read and write
|
||
3A2E000
|
stack
|
page read and write
|
||
1E9B4000
|
unkown
|
page execute and read and write
|
||
31F7000
|
heap
|
page read and write
|
||
31FB000
|
heap
|
page read and write
|
||
253E000
|
heap
|
page read and write
|
||
2590000
|
heap
|
page read and write
|
||
10004000
|
unkown
|
page execute and read and write
|
||
6CCC6000
|
unkown
|
page read and write
|
||
532E000
|
stack
|
page read and write
|
||
15A7000
|
heap
|
page read and write
|
||
1E8CF000
|
unkown
|
page execute and read and write
|
||
33F0000
|
heap
|
page read and write
|
||
1DD5000
|
heap
|
page read and write
|
||
6CA8B000
|
unkown
|
page execute and read and write
|
||
254D000
|
heap
|
page read and write
|
||
36B3000
|
heap
|
page read and write
|
||
24AE000
|
heap
|
page read and write
|
||
1997ABE5000
|
heap
|
page read and write
|
||
151F000
|
heap
|
page read and write
|
||
82AE000
|
stack
|
page read and write
|
||
3AC0000
|
heap
|
page read and write
|
||
2A42000
|
heap
|
page read and write
|
||
522E000
|
stack
|
page read and write
|
||
2B69000
|
heap
|
page read and write
|
||
2AD8000
|
heap
|
page read and write
|
||
2850000
|
heap
|
page read and write
|
||
1F08A48B000
|
heap
|
page read and write
|
||
1F08A455000
|
heap
|
page read and write
|
||
6CCC4000
|
unkown
|
page execute and write copy
|
||
311B000
|
heap
|
page read and write
|
||
50AE000
|
stack
|
page read and write
|
||
2596000
|
heap
|
page read and write
|
||
1E7B9000
|
unkown
|
page execute and read and write
|
||
2C9B000
|
heap
|
page read and write
|
||
23ED000
|
heap
|
page read and write
|
||
25AB000
|
heap
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
6FEE000
|
stack
|
page read and write
|
||
E3EE000
|
stack
|
page read and write
|
||
7FA000
|
heap
|
page read and write
|
||
2D40000
|
heap
|
page read and write
|
||
122C9000
|
heap
|
page read and write
|
||
880000
|
heap
|
page read and write
|
||
BAEE000
|
stack
|
page read and write
|
||
6C8A3000
|
unkown
|
page execute and read and write
|
||
26ED5BD0000
|
trusted library section
|
page read and write
|
||
6C534000
|
unkown
|
page execute and read and write
|
||
6CB7B000
|
unkown
|
page execute and read and write
|
||
3926000
|
heap
|
page read and write
|
||
1EDE000
|
heap
|
page read and write
|
||
27CD2410000
|
heap
|
page read and write
|
||
45555FE000
|
unkown
|
page readonly
|
||
74DFC000
|
unkown
|
page read and write
|
||
2591000
|
heap
|
page read and write
|
||
1094E000
|
stack
|
page read and write
|
||
32EE000
|
stack
|
page read and write
|
||
158F000
|
heap
|
page read and write
|
||
6CCB0000
|
unkown
|
page execute and read and write
|
||
22CF000
|
heap
|
page read and write
|
||
21D1000
|
heap
|
page read and write
|
||
6C7A0000
|
unkown
|
page readonly
|
||
3989000
|
heap
|
page read and write
|
||
1425000
|
heap
|
page read and write
|
||
1997ABB3000
|
heap
|
page read and write
|
||
2D24000
|
heap
|
page read and write
|
||
1517000
|
heap
|
page read and write
|
||
A503AFE000
|
stack
|
page read and write
|
||
3912000
|
heap
|
page read and write
|
||
1EFD2A60000
|
heap
|
page read and write
|
||
31D7000
|
heap
|
page read and write
|
||
956E000
|
stack
|
page read and write
|
||
6CAE9000
|
unkown
|
page execute and read and write
|
||
12E1000
|
unkown
|
page execute and read and write
|
||
1198E000
|
stack
|
page read and write
|
||
6D06E000
|
unkown
|
page execute and read and write
|
||
870000
|
heap
|
page read and write
|
||
12CB000
|
unkown
|
page execute and read and write
|
||
281E000
|
heap
|
page read and write
|
||
EEDC0FE000
|
stack
|
page read and write
|
||
831000
|
heap
|
page read and write
|
||
B84000
|
heap
|
page read and write
|
||
1517000
|
heap
|
page read and write
|
||
A5046FE000
|
stack
|
page read and write
|
||
36C8000
|
heap
|
page read and write
|
||
2497000
|
heap
|
page read and write
|
||
827000
|
heap
|
page read and write
|
||
2AEB000
|
heap
|
page read and write
|
||
2A96000
|
heap
|
page read and write
|
||
1350000
|
trusted library allocation
|
page read and write
|
||
260A000
|
heap
|
page read and write
|
||
11D4E000
|
stack
|
page read and write
|
||
24A5000
|
heap
|
page read and write
|
||
6CE41000
|
unkown
|
page execute and read and write
|
||
302A000
|
heap
|
page read and write
|
||
9BAE000
|
stack
|
page read and write
|
||
24D2000
|
heap
|
page read and write
|
||
6CE36000
|
unkown
|
page execute and write copy
|
||
80D000
|
heap
|
page read and write
|
||
EEDBBFE000
|
unkown
|
page readonly
|
||
34B5000
|
heap
|
page read and write
|
||
73B3E000
|
unkown
|
page execute and read and write
|
||
39D2000
|
heap
|
page read and write
|
||
27C50E00000
|
heap
|
page read and write
|
||
2609000
|
heap
|
page read and write
|
||
2A75000
|
heap
|
page read and write
|
||
73B3F000
|
unkown
|
page execute and write copy
|
||
27F8000
|
heap
|
page read and write
|
||
38DF000
|
heap
|
page read and write
|
||
225B75B0000
|
heap
|
page read and write
|
||
2BB0000
|
heap
|
page read and write
|
||
302A000
|
heap
|
page read and write
|
||
1F08A44A000
|
heap
|
page read and write
|
||
260A000
|
heap
|
page read and write
|
||
EEDBFFE000
|
unkown
|
page readonly
|
||
3808000
|
heap
|
page read and write
|
||
2594000
|
heap
|
page read and write
|
||
1DD2000
|
heap
|
page read and write
|
||
321F000
|
heap
|
page read and write
|
||
3100000
|
heap
|
page read and write
|
||
26ED6500000
|
heap
|
page read and write
|
||
6D09A000
|
unkown
|
page execute and read and write
|
||
1C3FA502000
|
heap
|
page read and write
|
||
1997AC0F000
|
heap
|
page read and write
|
||
C9AE000
|
stack
|
page read and write
|
||
565227E000
|
stack
|
page read and write
|
||
73A8C000
|
unkown
|
page read and write
|
||
74AE000
|
stack
|
page read and write
|
||
366F000
|
heap
|
page read and write
|
||
33D2000
|
heap
|
page read and write
|
||
3AAD000
|
heap
|
page read and write
|
||
3BAE000
|
stack
|
page read and write
|
||
E16D000
|
stack
|
page read and write
|
||
30F1000
|
heap
|
page read and write
|
||
2F77000
|
heap
|
page read and write
|
||
31E6000
|
heap
|
page read and write
|
||
27CA000
|
heap
|
page read and write
|
||
25A2000
|
heap
|
page read and write
|
||
6D063000
|
unkown
|
page execute and read and write
|
||
341E000
|
heap
|
page read and write
|
||
302A000
|
heap
|
page read and write
|
||
E56E000
|
stack
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
BBD000
|
stack
|
page read and write
|
||
2A7F000
|
heap
|
page read and write
|
||
25C7000
|
heap
|
page read and write
|
||
151D000
|
heap
|
page read and write
|
||
1C0000
|
heap
|
page read and write
|
||
2CFC000
|
heap
|
page read and write
|
||
1184E000
|
stack
|
page read and write
|
||
C12000
|
heap
|
page read and write
|
||
1686000
|
heap
|
page read and write
|
||
1000D000
|
unkown
|
page read and write
|
||
260A000
|
heap
|
page read and write
|
||
25C2000
|
heap
|
page read and write
|
||
12C1000
|
unkown
|
page execute and read and write
|
||
342E000
|
heap
|
page read and write
|
||
2FB1000
|
unkown
|
page execute and read and write
|
||
EE0000
|
heap
|
page read and write
|
||
6C371000
|
unkown
|
page execute and read and write
|
||
C00000
|
heap
|
page read and write
|
||
1516000
|
heap
|
page read and write
|
||
2596000
|
heap
|
page read and write
|
||
EEDA37B000
|
stack
|
page read and write
|
||
1997E360000
|
trusted library allocation
|
page read and write
|
||
2517000
|
heap
|
page read and write
|
||
1997CE12000
|
trusted library allocation
|
page read and write
|
||
225B75E0000
|
heap
|
page read and write
|
||
26EDB228000
|
heap
|
page read and write
|
||
30FA000
|
heap
|
page read and write
|
||
C3A000
|
heap
|
page read and write
|
||
B40000
|
heap
|
page read and write
|
||
F1E000
|
stack
|
page read and write
|
||
1BDE000
|
stack
|
page read and write
|
||
6C64B000
|
unkown
|
page execute and read and write
|
||
2C54000
|
heap
|
page read and write
|
||
318D000
|
heap
|
page read and write
|
||
27C50E60000
|
heap
|
page read and write
|
||
A6AE000
|
stack
|
page read and write
|
||
1670000
|
heap
|
page read and write
|
||
1144E000
|
stack
|
page read and write
|
||
6C574000
|
unkown
|
page execute and read and write
|
||
2599000
|
heap
|
page read and write
|
||
84A000
|
heap
|
page read and write
|
||
437F000
|
stack
|
page read and write
|
||
2F96000
|
heap
|
page read and write
|
||
1F08A468000
|
heap
|
page read and write
|
||
26ED5B60000
|
heap
|
page read and write
|
||
4D2E000
|
stack
|
page read and write
|
||
3981000
|
heap
|
page read and write
|
||
1506000
|
heap
|
page read and write
|
||
2FCB000
|
heap
|
page read and write
|
||
2C74000
|
heap
|
page read and write
|
||
B1E000
|
stack
|
page read and write
|
||
1E8D7000
|
unkown
|
page execute and read and write
|
||
2B6E000
|
stack
|
page read and write
|
||
4B3CBFE000
|
stack
|
page read and write
|
||
86F000
|
heap
|
page read and write
|
||
978000
|
heap
|
page read and write
|
||
2130000
|
heap
|
page read and write
|
||
1ECB6000
|
unkown
|
page execute and read and write
|
||
82E000
|
heap
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
23EE000
|
stack
|
page read and write
|
||
316F000
|
heap
|
page read and write
|
||
6C89D000
|
unkown
|
page execute and read and write
|
||
363E000
|
heap
|
page read and write
|
||
2F8E000
|
heap
|
page read and write
|
||
C86E000
|
stack
|
page read and write
|
||
3825000
|
heap
|
page read and write
|
||
260A000
|
heap
|
page read and write
|
||
2FB9000
|
heap
|
page read and write
|
||
35B1000
|
heap
|
page read and write
|
||
1E7C2000
|
unkown
|
page read and write
|
||
2FB8000
|
heap
|
page read and write
|
||
838000
|
heap
|
page read and write
|
||
325B000
|
unkown
|
page execute and read and write
|
||
AF8FDFE000
|
stack
|
page read and write
|
||
6A3000
|
heap
|
page read and write
|
||
2398000
|
unkown
|
page execute and read and write
|
||
3348000
|
heap
|
page read and write
|
||
26A2000
|
heap
|
page read and write
|
||
2BE0000
|
heap
|
page read and write
|
||
1D0000
|
heap
|
page read and write
|
||
1230000
|
heap
|
page read and write
|
||
30F8000
|
heap
|
page read and write
|
||
3426000
|
heap
|
page read and write
|
||
837000
|
heap
|
page read and write
|
||
3442000
|
heap
|
page read and write
|
||
1C3FA48E000
|
heap
|
page read and write
|
||
1B9F000
|
stack
|
page read and write
|
||
1221C000
|
heap
|
page read and write
|
||
2F9000
|
unkown
|
page read and write
|
||
AF9077E000
|
stack
|
page read and write
|
||
23F8000
|
heap
|
page read and write
|
||
39AF000
|
heap
|
page read and write
|
||
6C908000
|
unkown
|
page read and write
|
||
4B3CDFE000
|
stack
|
page read and write
|
||
2BB6000
|
heap
|
page read and write
|
||
88E000
|
heap
|
page read and write
|
||
2FB1000
|
heap
|
page read and write
|
||
2BF4000
|
heap
|
page read and write
|
||
1517000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
1F08AC02000
|
trusted library allocation
|
page read and write
|
||
27CD2702000
|
heap
|
page read and write
|
||
7AEE000
|
stack
|
page read and write
|
||
1C3FA230000
|
heap
|
page read and write
|
||
3107000
|
heap
|
page read and write
|
||
3148000
|
heap
|
page read and write
|
||
6C96E000
|
unkown
|
page execute and read and write
|
||
33E8000
|
heap
|
page read and write
|
||
3026000
|
heap
|
page read and write
|
||
18BD000
|
heap
|
page read and write
|
||
2493000
|
heap
|
page read and write
|
||
30F6000
|
heap
|
page read and write
|
||
1F08A42B000
|
heap
|
page read and write
|
||
2696000
|
heap
|
page read and write
|
||
2490000
|
heap
|
page read and write
|
||
122FE000
|
heap
|
page read and write
|
||
397F000
|
heap
|
page read and write
|
||
77E000
|
stack
|
page read and write
|
||
2B2F000
|
stack
|
page read and write
|
||
3148000
|
heap
|
page read and write
|
||
1F08A4AB000
|
heap
|
page read and write
|
||
29EE000
|
stack
|
page read and write
|
||
492E000
|
stack
|
page read and write
|
||
2A48000
|
heap
|
page read and write
|
||
87E000
|
heap
|
page read and write
|
||
2C36000
|
heap
|
page read and write
|
||
2B2A000
|
heap
|
page read and write
|
||
3498000
|
heap
|
page read and write
|
||
6C590000
|
unkown
|
page execute and read and write
|
||
297E000
|
heap
|
page read and write
|
||
25A1000
|
heap
|
page read and write
|
||
6C1E9000
|
unkown
|
page execute and read and write
|
||
B40000
|
heap
|
page read and write
|
||
26ED5B90000
|
heap
|
page read and write
|
||
6CBC1000
|
unkown
|
page execute and read and write
|
||
6C1CC000
|
unkown
|
page execute and read and write
|
||
31FC000
|
heap
|
page read and write
|
||
1997ABE0000
|
heap
|
page read and write
|
||
2518000
|
heap
|
page read and write
|
||
22D6000
|
heap
|
page read and write
|
||
A06E000
|
stack
|
page read and write
|
||
378D000
|
heap
|
page read and write
|
||
676E000
|
stack
|
page read and write
|
||
26ED5CAF000
|
heap
|
page read and write
|
||
786E000
|
stack
|
page read and write
|
||
21CB000
|
unkown
|
page execute and read and write
|
||
D76E000
|
stack
|
page read and write
|
||
6C72F000
|
unkown
|
page execute and read and write
|
||
B6E000
|
unkown
|
page read and write
|
||
2A69000
|
heap
|
page read and write
|
||
1331000
|
stack
|
page read and write
|
||
1517000
|
heap
|
page read and write
|
||
1517000
|
heap
|
page read and write
|
||
339A000
|
heap
|
page read and write
|
||
23A2000
|
unkown
|
page execute and read and write
|
||
582E000
|
stack
|
page read and write
|
||
15C5000
|
heap
|
page read and write
|
||
6C73C000
|
unkown
|
page execute and read and write
|
||
243E000
|
heap
|
page read and write
|
||
15BE000
|
heap
|
page read and write
|
||
21DB000
|
heap
|
page read and write
|
||
390F000
|
stack
|
page read and write
|
||
10F4D000
|
stack
|
page read and write
|
||
EEDBA79000
|
stack
|
page read and write
|
||
26EDB255000
|
heap
|
page read and write
|
||
2C2E000
|
heap
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
14AE000
|
stack
|
page read and write
|
||
1C3FA435000
|
heap
|
page read and write
|
||
1E45000
|
heap
|
page read and write
|
||
30FD000
|
heap
|
page read and write
|
||
1DE0000
|
heap
|
page read and write
|
||
3E9000
|
unkown
|
page read and write
|
||
3982000
|
heap
|
page read and write
|
||
6C89B000
|
unkown
|
page execute and read and write
|
||
880000
|
direct allocation
|
page execute and read and write
|
||
75EE000
|
stack
|
page read and write
|
||
3B1000
|
unkown
|
page execute read
|
||
1E7D4000
|
unkown
|
page execute and read and write
|
||
2506000
|
heap
|
page read and write
|
||
21D3000
|
unkown
|
page read and write
|
||
854000
|
heap
|
page read and write
|
||
25A0000
|
heap
|
page read and write
|
||
84D000
|
heap
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
F1ED000
|
stack
|
page read and write
|
||
6C224000
|
unkown
|
page execute and write copy
|
||
3851000
|
heap
|
page read and write
|
||
463C000
|
stack
|
page read and write
|
||
3DC000
|
unkown
|
page read and write
|
||
21E6000
|
heap
|
page read and write
|
||
87AE000
|
stack
|
page read and write
|
||
1F08A450000
|
heap
|
page read and write
|
||
1ADE000
|
stack
|
page read and write
|
||
E60000
|
heap
|
page read and write
|
||
839000
|
heap
|
page read and write
|
||
2C00000
|
direct allocation
|
page read and write
|
||
AFAE000
|
stack
|
page read and write
|
||
2599000
|
heap
|
page read and write
|
||
2FB5000
|
heap
|
page read and write
|
||
3709000
|
heap
|
page read and write
|
||
3206000
|
heap
|
page read and write
|
||
403D000
|
stack
|
page read and write
|
||
CBD000
|
heap
|
page read and write
|
||
367E000
|
heap
|
page read and write
|
||
2754000
|
heap
|
page read and write
|
||
249F000
|
heap
|
page read and write
|
||
301B000
|
heap
|
page read and write
|
||
8F2E000
|
stack
|
page read and write
|
||
8862ABC000
|
stack
|
page read and write
|
||
73B3A000
|
unkown
|
page execute and read and write
|
||
23FD000
|
heap
|
page read and write
|
||
320D000
|
heap
|
page read and write
|
||
319C000
|
heap
|
page read and write
|
||
2CEB000
|
heap
|
page read and write
|
||
1044E000
|
stack
|
page read and write
|
||
2FC1000
|
unkown
|
page execute and read and write
|
||
3342000
|
heap
|
page read and write
|
||
315C000
|
heap
|
page read and write
|
||
25A2000
|
heap
|
page read and write
|
||
6CAE1000
|
unkown
|
page execute and read and write
|
||
829000
|
heap
|
page read and write
|
||
307E000
|
stack
|
page read and write
|
||
30F2000
|
heap
|
page read and write
|
||
2CB4000
|
heap
|
page read and write
|
||
2CD8000
|
heap
|
page read and write
|
||
315A000
|
heap
|
page read and write
|
||
2D9F000
|
heap
|
page read and write
|
||
E9E000
|
unkown
|
page read and write
|
||
DC6E000
|
stack
|
page read and write
|
||
A1E000
|
stack
|
page read and write
|
||
13F8000
|
heap
|
page read and write
|
||
25AA000
|
heap
|
page read and write
|
||
35CA000
|
heap
|
page read and write
|
||
1F08A471000
|
heap
|
page read and write
|
||
12E7000
|
unkown
|
page execute and read and write
|
||
2C58000
|
heap
|
page read and write
|
||
6C2E000
|
stack
|
page read and write
|
||
EEDBE7E000
|
stack
|
page read and write
|
||
31DB000
|
heap
|
page read and write
|
||
862E000
|
stack
|
page read and write
|
||
12252000
|
heap
|
page read and write
|
||
6CACE000
|
unkown
|
page execute and read and write
|
||
2C18000
|
heap
|
page read and write
|
||
3842000
|
heap
|
page read and write
|
||
CAEE000
|
stack
|
page read and write
|
||
2A32000
|
heap
|
page read and write
|
||
2977000
|
heap
|
page read and write
|
||
27BF000
|
heap
|
page read and write
|
||
6D0BD000
|
unkown
|
page execute and read and write
|
||
1BDF000
|
stack
|
page read and write
|
||
33E5000
|
heap
|
page read and write
|
||
C69AE7B000
|
stack
|
page read and write
|
||
321C000
|
heap
|
page read and write
|
||
31B0000
|
heap
|
page read and write
|
||
2451000
|
heap
|
page read and write
|
||
31B9000
|
heap
|
page read and write
|
||
1E7D1000
|
unkown
|
page execute and read and write
|
||
26EDB2FF000
|
heap
|
page read and write
|
||
315A000
|
heap
|
page read and write
|
||
3100000
|
heap
|
page read and write
|
||
259C000
|
heap
|
page read and write
|
||
21D1000
|
heap
|
page read and write
|
||
2F46000
|
heap
|
page read and write
|
||
1997AC08000
|
heap
|
page read and write
|
||
EEDB3FE000
|
unkown
|
page readonly
|
||
6C685000
|
unkown
|
page execute and write copy
|
||
BC2E000
|
stack
|
page read and write
|
||
22F1000
|
heap
|
page read and write
|
||
1180E000
|
stack
|
page read and write
|
||
320E000
|
heap
|
page read and write
|
||
2C30000
|
heap
|
page read and write
|
||
2C6B000
|
heap
|
page read and write
|
||
2218000
|
heap
|
page read and write
|
||
3F2E000
|
stack
|
page read and write
|
||
6CA7A000
|
unkown
|
page execute and read and write
|
||
201E000
|
stack
|
page read and write
|
||
6CCAB000
|
unkown
|
page execute and read and write
|
||
8DAE000
|
stack
|
page read and write
|
||
11ACE000
|
stack
|
page read and write
|
||
BD2E000
|
stack
|
page read and write
|
||
12D1000
|
unkown
|
page execute and read and write
|
||
2A9E000
|
heap
|
page read and write
|
||
835000
|
heap
|
page read and write
|
||
151F000
|
heap
|
page read and write
|
||
345B000
|
heap
|
page read and write
|
||
3A9E000
|
heap
|
page read and write
|
||
1335000
|
stack
|
page read and write
|
||
30F7000
|
heap
|
page read and write
|
||
1E28000
|
heap
|
page read and write
|
||
AE2E000
|
stack
|
page read and write
|
||
2FDB000
|
heap
|
page read and write
|
||
26ED5CFD000
|
heap
|
page read and write
|
||
25A0000
|
heap
|
page read and write
|
||
6C761000
|
unkown
|
page execute and read and write
|
||
880000
|
heap
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
2C6F000
|
stack
|
page read and write
|
||
1E8DF000
|
unkown
|
page execute and write copy
|
||
21E7000
|
unkown
|
page execute and read and write
|
||
887000
|
heap
|
page read and write
|
||
152E000
|
stack
|
page read and write
|
||
8D2000
|
heap
|
page read and write
|
||
6D0B7000
|
unkown
|
page execute and read and write
|
||
AAAE000
|
stack
|
page read and write
|
||
25AA000
|
heap
|
page read and write
|
||
22F4000
|
heap
|
page read and write
|
||
3029000
|
heap
|
page read and write
|
||
1ED4000
|
heap
|
page read and write
|
||
1997ABD0000
|
heap
|
page read and write
|
||
26AE000
|
heap
|
page read and write
|
||
33DD000
|
heap
|
page read and write
|
||
3890000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
57E000
|
stack
|
page read and write
|
||
D9ED000
|
stack
|
page read and write
|
||
1AF3000
|
heap
|
page read and write
|
||
15AF000
|
heap
|
page read and write
|
||
2C62000
|
heap
|
page read and write
|
||
5F5000
|
heap
|
page read and write
|
||
3250000
|
heap
|
page read and write
|
||
FDFE000
|
stack
|
page read and write
|
||
22C8000
|
heap
|
page read and write
|
||
3386000
|
heap
|
page read and write
|
||
A5034BB000
|
stack
|
page read and write
|
||
7DD000
|
stack
|
page read and write
|
||
260A000
|
heap
|
page read and write
|
||
86E000
|
heap
|
page read and write
|
||
73E000
|
unkown
|
page read and write
|
||
115CE000
|
stack
|
page read and write
|
||
302A000
|
heap
|
page read and write
|
||
1DDB000
|
heap
|
page read and write
|
||
F63E000
|
stack
|
page read and write
|
||
1E7D6000
|
unkown
|
page execute and read and write
|
||
398C000
|
heap
|
page read and write
|
||
2AA8000
|
heap
|
page read and write
|
||
325F000
|
unkown
|
page execute and read and write
|
||
26ED5CB3000
|
heap
|
page read and write
|
||
1575000
|
heap
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
6C33A000
|
unkown
|
page execute and read and write
|
||
2C2B000
|
heap
|
page read and write
|
||
34A6000
|
heap
|
page read and write
|
||
565217E000
|
unkown
|
page readonly
|
||
1DD4000
|
heap
|
page read and write
|
||
5C2E000
|
stack
|
page read and write
|
||
60EE000
|
stack
|
page read and write
|
||
26EDB470000
|
trusted library allocation
|
page read and write
|
||
CE0000
|
heap
|
page read and write
|
||
6D092000
|
unkown
|
page execute and read and write
|
||
3639000
|
heap
|
page read and write
|
||
21C1000
|
unkown
|
page execute and read and write
|
||
E42D000
|
stack
|
page read and write
|
||
31F0000
|
heap
|
page read and write
|
||
21D1000
|
heap
|
page read and write
|
||
28AE000
|
stack
|
page read and write
|
||
73A50000
|
unkown
|
page readonly
|
||
2B60000
|
heap
|
page read and write
|
||
250E000
|
heap
|
page read and write
|
||
2B16000
|
heap
|
page read and write
|
||
828000
|
heap
|
page read and write
|
||
24AF000
|
heap
|
page read and write
|
||
C12E000
|
stack
|
page read and write
|
||
2FB1000
|
heap
|
page read and write
|
||
26FA000
|
heap
|
page read and write
|
||
2E33000
|
heap
|
page read and write
|
||
2E4C000
|
heap
|
page read and write
|
||
98E000
|
stack
|
page read and write
|
||
C69B1FE000
|
stack
|
page read and write
|
||
24EE000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1586000
|
heap
|
page read and write
|
||
1515000
|
heap
|
page read and write
|
||
2B2D000
|
heap
|
page read and write
|
||
AF9087E000
|
unkown
|
page readonly
|
||
26EDB160000
|
trusted library allocation
|
page read and write
|
||
3428000
|
heap
|
page read and write
|
||
376A000
|
heap
|
page read and write
|
||
1997ABE6000
|
heap
|
page read and write
|
||
82A000
|
heap
|
page read and write
|
||
3AA6000
|
heap
|
page read and write
|
||
3AB1000
|
heap
|
page read and write
|
||
27C50CC0000
|
heap
|
page read and write
|
||
3991000
|
heap
|
page read and write
|
||
382A000
|
heap
|
page read and write
|
||
6CE1E000
|
unkown
|
page execute and read and write
|
||
6AEE000
|
stack
|
page read and write
|
||
3026000
|
heap
|
page read and write
|
||
55ED000
|
stack
|
page read and write
|
||
32B0000
|
heap
|
page read and write
|
||
2B69000
|
heap
|
page read and write
|
||
1F08A44F000
|
heap
|
page read and write
|
||
546D000
|
stack
|
page read and write
|
||
2462000
|
heap
|
page read and write
|
||
2BA4000
|
heap
|
page read and write
|
||
EEDB47E000
|
stack
|
page read and write
|
||
314D000
|
heap
|
page read and write
|
||
9DEE000
|
stack
|
page read and write
|
||
2D06000
|
heap
|
page read and write
|
||
11F5000
|
heap
|
page read and write
|
||
2D9B000
|
heap
|
page read and write
|
||
11E8E000
|
stack
|
page read and write
|
||
91AE000
|
stack
|
page read and write
|
||
2594000
|
heap
|
page read and write
|
||
27C0000
|
heap
|
page read and write
|
||
38F9000
|
heap
|
page read and write
|
||
DF2E000
|
stack
|
page read and write
|
||
302A000
|
heap
|
page read and write
|
||
2E50000
|
heap
|
page read and write
|
||
2F67000
|
heap
|
page read and write
|
||
1E9B6000
|
unkown
|
page execute and read and write
|
||
18D0000
|
heap
|
page read and write
|
||
27CD262D000
|
heap
|
page read and write
|
||
EDEE000
|
stack
|
page read and write
|
||
6C910000
|
unkown
|
page readonly
|
||
712E000
|
stack
|
page read and write
|
||
10004000
|
unkown
|
page execute and read and write
|
||
2CAE000
|
stack
|
page read and write
|
||
1997ABDF000
|
heap
|
page read and write
|
||
14B9000
|
heap
|
page read and write
|
||
369C000
|
heap
|
page read and write
|
||
2FB1000
|
heap
|
page read and write
|
||
18F3000
|
heap
|
page read and write
|
||
1DD8000
|
heap
|
page read and write
|
||
1500000
|
heap
|
page read and write
|
||
DB6E000
|
stack
|
page read and write
|
||
6C1C5000
|
unkown
|
page execute and read and write
|
||
3106000
|
heap
|
page read and write
|
||
13E0000
|
heap
|
page read and write
|
||
EB6D000
|
stack
|
page read and write
|
||
A96E000
|
stack
|
page read and write
|
||
2C8F000
|
heap
|
page read and write
|
||
6C58C000
|
unkown
|
page execute and read and write
|
||
389C000
|
heap
|
page read and write
|
||
375D000
|
heap
|
page read and write
|
||
3210000
|
heap
|
page read and write
|
||
6C88D000
|
unkown
|
page execute and read and write
|
||
251B000
|
heap
|
page read and write
|
||
BFEE000
|
stack
|
page read and write
|
||
812E000
|
stack
|
page read and write
|
||
260A000
|
heap
|
page read and write
|
||
3186000
|
heap
|
page read and write
|
||
30F1000
|
heap
|
page read and write
|
||
2503000
|
heap
|
page read and write
|
||
26EDB261000
|
heap
|
page read and write
|
||
26ED6513000
|
heap
|
page read and write
|
||
8A0000
|
heap
|
page read and write
|
||
1517000
|
heap
|
page read and write
|
||
872000
|
heap
|
page read and write
|
||
319A000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
396B000
|
heap
|
page read and write
|
||
31A0000
|
heap
|
page read and write
|
||
EEDB6FB000
|
stack
|
page read and write
|
||
27CD2659000
|
heap
|
page read and write
|
||
70ED000
|
stack
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
1E7C2000
|
unkown
|
page read and write
|
||
2D70000
|
heap
|
page read and write
|
||
3825000
|
heap
|
page read and write
|
||
1F08A45D000
|
heap
|
page read and write
|
||
249D000
|
stack
|
page read and write
|
||
251A000
|
heap
|
page read and write
|
||
887000
|
heap
|
page read and write
|
||
2591000
|
heap
|
page read and write
|
||
21D1000
|
heap
|
page read and write
|
||
260A000
|
heap
|
page read and write
|
||
2E70000
|
heap
|
page read and write
|
||
22CA000
|
heap
|
page read and write
|
||
6D0B9000
|
unkown
|
page execute and read and write
|
||
2593000
|
heap
|
page read and write
|
||
274C000
|
heap
|
page read and write
|
||
3201000
|
heap
|
page read and write
|
||
3260000
|
heap
|
page read and write
|
||
84E000
|
heap
|
page read and write
|
||
31C9000
|
heap
|
page read and write
|
||
6C120000
|
unkown
|
page readonly
|
||
25BC000
|
heap
|
page read and write
|
||
14FC000
|
stack
|
page read and write
|
||
2A3C000
|
heap
|
page read and write
|
||
31E2000
|
heap
|
page read and write
|
||
390E000
|
heap
|
page read and write
|
||
2A4D000
|
heap
|
page read and write
|
||
565207E000
|
stack
|
page read and write
|
||
306E000
|
stack
|
page read and write
|
||
36EF000
|
heap
|
page read and write
|
||
2F4E000
|
heap
|
page read and write
|
||
34A3000
|
heap
|
page read and write
|
||
1E7D6000
|
unkown
|
page execute and read and write
|
||
DFF000
|
unkown
|
page read and write
|
||
1997ABCD000
|
heap
|
page read and write
|
||
EEDC9FE000
|
unkown
|
page readonly
|
||
442E000
|
stack
|
page read and write
|
||
2BEA000
|
heap
|
page read and write
|
||
380000
|
heap
|
page read and write
|
||
26EDB1B0000
|
trusted library allocation
|
page read and write
|
||
A42E000
|
stack
|
page read and write
|
||
398F000
|
heap
|
page read and write
|
||
26EDB21C000
|
heap
|
page read and write
|
||
2A42000
|
heap
|
page read and write
|
||
2FC7000
|
heap
|
page read and write
|
||
2BEF000
|
heap
|
page read and write
|
||
2606000
|
heap
|
page read and write
|
||
AF8FF7E000
|
stack
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
334E000
|
heap
|
page read and write
|
||
249C000
|
heap
|
page read and write
|
||
1DD5000
|
heap
|
page read and write
|
||
2F80000
|
heap
|
page read and write
|
||
2A28000
|
heap
|
page read and write
|
||
157D000
|
heap
|
page read and write
|
||
8D4000
|
heap
|
page read and write
|
||
881000
|
heap
|
page read and write
|
||
26EDB2A0000
|
trusted library allocation
|
page read and write
|
||
11C0E000
|
stack
|
page read and write
|
||
1ECC0000
|
unkown
|
page read and write
|
||
1997ABA0000
|
heap
|
page read and write
|
||
23B4000
|
heap
|
page read and write
|
||
39FA000
|
heap
|
page read and write
|
||
1090E000
|
stack
|
page read and write
|
||
B46E000
|
stack
|
page read and write
|
||
626E000
|
stack
|
page read and write
|
||
2FC7000
|
unkown
|
page execute and read and write
|
||
26ED5C8D000
|
heap
|
page read and write
|
||
2FBD000
|
heap
|
page read and write
|
||
8862B3E000
|
stack
|
page read and write
|
||
22C4000
|
heap
|
page read and write
|
||
686E000
|
stack
|
page read and write
|
||
8DB000
|
heap
|
page read and write
|
||
53E000
|
unkown
|
page read and write
|
||
572E000
|
stack
|
page read and write
|
||
2B52000
|
heap
|
page read and write
|
||
1FB6000
|
heap
|
page read and write
|
||
BE6E000
|
stack
|
page read and write
|
||
1F08A487000
|
heap
|
page read and write
|
||
6CA9D000
|
unkown
|
page execute and read and write
|
||
3A33000
|
heap
|
page read and write
|
||
EEDAAFE000
|
unkown
|
page readonly
|
||
2D58000
|
heap
|
page read and write
|
||
27C7000
|
heap
|
page read and write
|
||
AFD000
|
stack
|
page read and write
|
||
122D3000
|
heap
|
page read and write
|
||
ECEE000
|
stack
|
page read and write
|
||
123C000
|
stack
|
page read and write
|
||
26A6000
|
heap
|
page read and write
|
||
A50467E000
|
unkown
|
page readonly
|
||
26ED6402000
|
heap
|
page read and write
|
||
56513AB000
|
stack
|
page read and write
|
||
2A4D000
|
heap
|
page read and write
|
||
6D0BD000
|
unkown
|
page execute and read and write
|
||
831000
|
heap
|
page read and write
|
||
F4FE000
|
stack
|
page read and write
|
||
26EDB4E0000
|
remote allocation
|
page read and write
|
||
6CADD000
|
unkown
|
page execute and read and write
|
||
36E3000
|
heap
|
page read and write
|
||
1E7AD000
|
unkown
|
page execute and read and write
|
||
1C3FA400000
|
heap
|
page read and write
|
||
3461000
|
heap
|
page read and write
|
||
5D6E000
|
stack
|
page read and write
|
||
12A4E000
|
stack
|
page read and write
|
||
B87000
|
heap
|
page read and write
|
||
1220E000
|
stack
|
page read and write
|
||
1390000
|
heap
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
6D0B9000
|
unkown
|
page execute and read and write
|
||
FC7E000
|
stack
|
page read and write
|
||
302A000
|
heap
|
page read and write
|
||
1DD7000
|
heap
|
page read and write
|
||
2964000
|
heap
|
page read and write
|
||
38AA000
|
heap
|
page read and write
|
||
1F08A47B000
|
heap
|
page read and write
|
||
2086000
|
heap
|
page read and write
|
||
1F08A476000
|
heap
|
page read and write
|
||
335D000
|
heap
|
page read and write
|
||
3B0000
|
unkown
|
page readonly
|
||
1380000
|
heap
|
page read and write
|
||
38F4000
|
heap
|
page read and write
|
||
EDE000
|
stack
|
page read and write
|
||
6C906000
|
unkown
|
page execute and write copy
|
||
27CD000
|
heap
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
EEDB57E000
|
stack
|
page read and write
|
||
73B30000
|
unkown
|
page readonly
|
||
2E45000
|
heap
|
page read and write
|
||
39A3000
|
heap
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
E66E000
|
stack
|
page read and write
|
||
BFAE000
|
stack
|
page read and write
|
||
1DD6000
|
heap
|
page read and write
|
||
372E000
|
heap
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
180F000
|
stack
|
page read and write
|
||
2595000
|
heap
|
page read and write
|
||
22DA000
|
heap
|
page read and write
|
||
375F000
|
heap
|
page read and write
|
||
3109000
|
heap
|
page read and write
|
||
25A1000
|
heap
|
page read and write
|
||
5651B7E000
|
unkown
|
page readonly
|
||
6C3B0000
|
unkown
|
page read and write
|
||
1DD7000
|
heap
|
page read and write
|
||
754000
|
heap
|
page read and write
|
||
30F1000
|
heap
|
page read and write
|
||
398F000
|
heap
|
page read and write
|
||
3B6E000
|
stack
|
page read and write
|
||
1DD4000
|
heap
|
page read and write
|
||
27D0000
|
heap
|
page read and write
|
||
6CB87000
|
unkown
|
page execute and read and write
|
||
2C68000
|
heap
|
page read and write
|
||
F1AE000
|
stack
|
page read and write
|
||
B4AE000
|
stack
|
page read and write
|
||
6C3D2000
|
unkown
|
page execute and read and write
|
||
1E7D0000
|
unkown
|
page readonly
|
||
316A000
|
heap
|
page read and write
|
||
1516000
|
heap
|
page read and write
|
||
6C77B000
|
unkown
|
page execute and read and write
|
||
D66E000
|
stack
|
page read and write
|
||
12B4F000
|
stack
|
page read and write
|
||
2A50000
|
heap
|
page read and write
|
||
259C000
|
heap
|
page read and write
|
||
27CD2616000
|
heap
|
page read and write
|
||
27C50CA0000
|
heap
|
page read and write
|
||
1E9B0000
|
unkown
|
page readonly
|
||
5AED000
|
stack
|
page read and write
|
||
6D077000
|
unkown
|
page execute and read and write
|
||
1516000
|
heap
|
page read and write
|
||
6CA5A000
|
unkown
|
page execute and read and write
|
||
3E9000
|
unkown
|
page read and write
|
||
26ED5C1F000
|
heap
|
page read and write
|
||
2D38000
|
heap
|
page read and write
|
||
1E7DA000
|
unkown
|
page execute and read and write
|
||
42EE000
|
stack
|
page read and write
|
||
86E000
|
heap
|
page read and write
|
||
9A6E000
|
stack
|
page read and write
|
||
D02E000
|
stack
|
page read and write
|
||
3148000
|
heap
|
page read and write
|
||
73B3A000
|
unkown
|
page execute and read and write
|
||
21E2000
|
heap
|
page read and write
|
||
3247000
|
heap
|
page read and write
|
||
88E000
|
heap
|
page read and write
|
||
6C56D000
|
unkown
|
page execute and read and write
|
||
13C000
|
stack
|
page read and write
|
||
259A000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
6CA6F000
|
unkown
|
page execute and read and write
|
||
2736000
|
heap
|
page read and write
|
||
1997ABDF000
|
heap
|
page read and write
|
||
26EDB27F000
|
heap
|
page read and write
|
||
2FB1000
|
heap
|
page read and write
|
||
3DEE000
|
stack
|
page read and write
|
||
88B000
|
heap
|
page read and write
|
||
C69B2FB000
|
stack
|
page read and write
|
||
316A000
|
heap
|
page read and write
|
||
217E000
|
stack
|
page read and write
|
||
14D0000
|
heap
|
page read and write
|
||
6D0AB000
|
unkown
|
page execute and read and write
|
||
3A11000
|
heap
|
page read and write
|
||
889000
|
heap
|
page read and write
|
||
2FB7000
|
heap
|
page read and write
|
||
21D1000
|
heap
|
page read and write
|
||
2ABD000
|
heap
|
page read and write
|
||
93EE000
|
stack
|
page read and write
|
||
350000
|
heap
|
page read and write
|
||
24DA000
|
heap
|
page read and write
|
||
1DD9000
|
heap
|
page read and write
|
||
2B10000
|
heap
|
page read and write
|
||
4E2E000
|
stack
|
page read and write
|
||
174E000
|
stack
|
page read and write
|
||
2E24000
|
heap
|
page read and write
|
||
3945000
|
heap
|
page read and write
|
||
26EDB2E2000
|
heap
|
page read and write
|
||
63E000
|
stack
|
page read and write
|
||
876E000
|
stack
|
page read and write
|
||
2FC1000
|
heap
|
page read and write
|
||
1997ABFC000
|
heap
|
page read and write
|
||
3800000
|
heap
|
page read and write
|
||
2BA6000
|
heap
|
page read and write
|
||
122CF000
|
heap
|
page read and write
|
||
260A000
|
heap
|
page read and write
|
||
3169000
|
heap
|
page read and write
|
||
C37000
|
heap
|
page read and write
|
||
AF902FE000
|
stack
|
page read and write
|
||
D52D000
|
stack
|
page read and write
|
||
71D000
|
stack
|
page read and write
|
||
3DC000
|
unkown
|
page read and write
|
||
2B85000
|
heap
|
page read and write
|
||
B0EE000
|
stack
|
page read and write
|
||
56EE000
|
stack
|
page read and write
|
||
6C1D7000
|
unkown
|
page execute and read and write
|
||
2E0A000
|
heap
|
page read and write
|
||
2B8B000
|
heap
|
page read and write
|
||
B10000
|
heap
|
page read and write
|
||
1054E000
|
stack
|
page read and write
|
||
1DFB000
|
heap
|
page read and write
|
||
1F08A48E000
|
heap
|
page read and write
|
||
2B86000
|
heap
|
page read and write
|
||
5BE000
|
stack
|
page read and write
|
||
3A3B000
|
heap
|
page read and write
|
||
2C7C000
|
heap
|
page read and write
|
||
33EE000
|
stack
|
page read and write
|
||
1ECBA000
|
unkown
|
page execute and read and write
|
||
138D000
|
stack
|
page read and write
|
||
6C209000
|
unkown
|
page execute and read and write
|
||
122C7000
|
heap
|
page read and write
|
||
2599000
|
heap
|
page read and write
|
||
122D8000
|
heap
|
page read and write
|
||
380E000
|
stack
|
page read and write
|
||
1DE2000
|
heap
|
page read and write
|
||
E52E000
|
stack
|
page read and write
|
||
225B7600000
|
heap
|
page read and write
|
||
2779000
|
heap
|
page read and write
|
||
814000
|
heap
|
page read and write
|
||
1F08A2F0000
|
heap
|
page read and write
|
||
1F0000
|
direct allocation
|
page read and write
|
||
992E000
|
stack
|
page read and write
|
||
255B000
|
unkown
|
page execute and read and write
|
||
122F5000
|
heap
|
page read and write
|
||
260A000
|
heap
|
page read and write
|
||
D26E000
|
stack
|
page read and write
|
||
84A000
|
heap
|
page read and write
|
||
316A000
|
heap
|
page read and write
|
||
38DA000
|
heap
|
page read and write
|
||
26EDB180000
|
trusted library allocation
|
page read and write
|
||
6C98000
|
heap
|
page read and write
|
||
E7EE000
|
stack
|
page read and write
|
||
26ED5D28000
|
heap
|
page read and write
|
||
21E0000
|
heap
|
page read and write
|
||
1ECBA000
|
unkown
|
page execute and read and write
|
||
2AD0000
|
heap
|
page read and write
|
||
1997ABE3000
|
heap
|
page read and write
|
||
6CE1B000
|
unkown
|
page execute and read and write
|
||
27C50E40000
|
heap
|
page read and write
|
||
1C3FA310000
|
heap
|
page read and write
|
||
A50497E000
|
unkown
|
page readonly
|
||
26EDB2A6000
|
heap
|
page read and write
|
||
1997CD30000
|
trusted library allocation
|
page read and write
|
||
10000000
|
unkown
|
page readonly
|
||
151E000
|
heap
|
page read and write
|
||
1F08A43A000
|
heap
|
page read and write
|
||
1F08A45B000
|
heap
|
page read and write
|
||
1DD4000
|
heap
|
page read and write
|
||
6C121000
|
unkown
|
page execute and read and write
|
||
672E000
|
stack
|
page read and write
|
||
991000
|
heap
|
page read and write
|
||
406E000
|
stack
|
page read and write
|
||
EEDADFC000
|
stack
|
page read and write
|
||
1DD1000
|
heap
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
6CCB2000
|
unkown
|
page execute and read and write
|
||
1F08A453000
|
heap
|
page read and write
|
||
2598000
|
heap
|
page read and write
|
||
27CE000
|
heap
|
page read and write
|
||
DEEE000
|
stack
|
page read and write
|
||
225B7602000
|
heap
|
page read and write
|
||
260A000
|
heap
|
page read and write
|
||
3903000
|
heap
|
page read and write
|
||
11BCE000
|
stack
|
page read and write
|
||
260A000
|
heap
|
page read and write
|
||
25BB000
|
heap
|
page read and write
|
||
2507000
|
heap
|
page read and write
|
||
3121000
|
heap
|
page read and write
|
||
27C50F13000
|
heap
|
page read and write
|
||
316A000
|
heap
|
page read and write
|
||
2A2D000
|
stack
|
page read and write
|
||
985000
|
unkown
|
page execute and read and write
|
||
1ECBD000
|
unkown
|
page execute and read and write
|
||
1ECBF000
|
unkown
|
page execute and write copy
|
||
F7BE000
|
stack
|
page read and write
|
||
827000
|
heap
|
page read and write
|
||
EEDB0FE000
|
unkown
|
page readonly
|
||
3DC000
|
unkown
|
page read and write
|
||
1305000
|
heap
|
page read and write
|
||
3989000
|
heap
|
page read and write
|
||
6C5B1000
|
unkown
|
page execute and read and write
|
||
34B3000
|
heap
|
page read and write
|
||
31B9000
|
heap
|
page read and write
|
||
A50477E000
|
unkown
|
page readonly
|
||
1040E000
|
stack
|
page read and write
|
||
6C1C2000
|
unkown
|
page execute and read and write
|
||
73A8B000
|
unkown
|
page execute and write copy
|
||
11F8E000
|
stack
|
page read and write
|
||
259A000
|
heap
|
page read and write
|
||
AAE000
|
stack
|
page read and write
|
||
1516000
|
heap
|
page read and write
|
||
2798000
|
heap
|
page read and write
|
||
C76E000
|
stack
|
page read and write
|
||
565237E000
|
unkown
|
page readonly
|
||
1997ABDF000
|
heap
|
page read and write
|
||
73A000
|
heap
|
page read and write
|
||
6C8B9000
|
unkown
|
page execute and read and write
|
||
824000
|
heap
|
page read and write
|
||
51EE000
|
stack
|
page read and write
|
||
B0F000
|
stack
|
page read and write
|
||
302A000
|
heap
|
page read and write
|
||
2816000
|
heap
|
page read and write
|
||
31BC000
|
heap
|
page read and write
|
||
54AE000
|
stack
|
page read and write
|
||
1D0000
|
heap
|
page read and write
|
||
2E35000
|
heap
|
page read and write
|
||
13D0000
|
heap
|
page read and write
|
||
3749000
|
heap
|
page read and write
|
||
6C3E1000
|
unkown
|
page execute and read and write
|
||
1558000
|
heap
|
page read and write
|
||
2271000
|
heap
|
page read and write
|
||
1ECC0000
|
unkown
|
page read and write
|
||
23A8000
|
heap
|
page read and write
|
||
1E01000
|
heap
|
page read and write
|
||
8DA000
|
heap
|
page read and write
|
||
1997AC01000
|
heap
|
page read and write
|
||
24D6000
|
heap
|
page read and write
|
||
D3AE000
|
stack
|
page read and write
|
||
2F82000
|
heap
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
1E7D6000
|
unkown
|
page execute and read and write
|
||
1E8C1000
|
unkown
|
page execute and read and write
|
||
10F9000
|
stack
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
87B000
|
heap
|
page read and write
|
||
2532000
|
heap
|
page read and write
|
||
87E000
|
heap
|
page read and write
|
||
2F7B000
|
heap
|
page read and write
|
||
2210000
|
heap
|
page read and write
|
||
536E000
|
stack
|
page read and write
|
||
123B000
|
stack
|
page read and write
|
||
6CA8F000
|
unkown
|
page execute and read and write
|
||
26ED6415000
|
heap
|
page read and write
|
||
1DE0000
|
heap
|
page read and write
|
||
6D05C000
|
unkown
|
page execute and read and write
|
||
16FE000
|
stack
|
page read and write
|
||
3810000
|
heap
|
page read and write
|
||
3914000
|
heap
|
page read and write
|
||
2960000
|
heap
|
page read and write
|
||
6C3DC000
|
unkown
|
page read and write
|
||
EDE000
|
stack
|
page read and write
|
||
3AA1000
|
heap
|
page read and write
|
||
5651C7B000
|
stack
|
page read and write
|
||
38E6000
|
heap
|
page read and write
|
||
2811000
|
heap
|
page read and write
|
||
151E000
|
heap
|
page read and write
|
||
321C000
|
heap
|
page read and write
|
||
6C30000
|
heap
|
page read and write
|
||
2561000
|
unkown
|
page execute and read and write
|
||
82F000
|
heap
|
page read and write
|
||
110CE000
|
stack
|
page read and write
|
||
26EDB295000
|
heap
|
page read and write
|
||
345B000
|
heap
|
page read and write
|
||
2FE3000
|
heap
|
page read and write
|
||
92EE000
|
stack
|
page read and write
|
||
1ECB0000
|
unkown
|
page readonly
|
||
26ED5C8B000
|
heap
|
page read and write
|
||
316A000
|
heap
|
page read and write
|
||
1E7A0000
|
unkown
|
page readonly
|
||
5D2000
|
stack
|
page read and write
|
||
2FBC000
|
heap
|
page read and write
|
||
2B7C000
|
heap
|
page read and write
|
||
620000
|
heap
|
page read and write
|
||
122CD000
|
heap
|
page read and write
|
||
3695000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
18A0000
|
heap
|
page read and write
|
||
AF903FD000
|
stack
|
page read and write
|
||
36F1000
|
heap
|
page read and write
|
||
1997C640000
|
heap
|
page read and write
|
||
30F1000
|
heap
|
page read and write
|
||
ACEE000
|
stack
|
page read and write
|
||
87E000
|
heap
|
page read and write
|
||
1997ABEE000
|
heap
|
page read and write
|
||
31F6000
|
heap
|
page read and write
|
||
2DAE000
|
stack
|
page read and write
|
||
2968000
|
heap
|
page read and write
|
||
10008000
|
unkown
|
page execute and read and write
|
||
151D000
|
heap
|
page read and write
|
||
151F000
|
heap
|
page read and write
|
||
E8EE000
|
stack
|
page read and write
|
||
E7AE000
|
stack
|
page read and write
|
||
3398000
|
heap
|
page read and write
|
||
EEDBDFE000
|
stack
|
page read and write
|
||
3870000
|
heap
|
page read and write
|
||
169E000
|
stack
|
page read and write
|
||
1E07000
|
heap
|
page read and write
|
||
11FCE000
|
stack
|
page read and write
|
||
343A000
|
heap
|
page read and write
|
||
B89000
|
heap
|
page read and write
|
||
316A000
|
heap
|
page read and write
|
||
31C0000
|
heap
|
page read and write
|
||
2EEE000
|
stack
|
page read and write
|
||
6C735000
|
unkown
|
page execute and read and write
|
||
CB0000
|
heap
|
page read and write
|
||
6C396000
|
unkown
|
page execute and write copy
|
||
225B7D50000
|
trusted library allocation
|
page read and write
|
||
2F9D000
|
heap
|
page read and write
|
||
31CE000
|
heap
|
page read and write
|
||
FEFE000
|
stack
|
page read and write
|
||
3999000
|
heap
|
page read and write
|
||
1E8E0000
|
unkown
|
page read and write
|
||
2E49000
|
heap
|
page read and write
|
||
73A71000
|
unkown
|
page execute and read and write
|
||
380000
|
heap
|
page read and write
|
||
8F5000
|
stack
|
page read and write
|
||
83EE000
|
stack
|
page read and write
|
||
3916000
|
heap
|
page read and write
|
||
2509000
|
heap
|
page read and write
|
||
DDAE000
|
stack
|
page read and write
|
||
3127000
|
heap
|
page read and write
|
||
1E8C0000
|
unkown
|
page readonly
|
||
122F1000
|
heap
|
page read and write
|
||
261F000
|
stack
|
page read and write
|
||
86E000
|
heap
|
page read and write
|
||
3220000
|
direct allocation
|
page execute and read and write
|
||
151C000
|
heap
|
page read and write
|
||
CD6E000
|
stack
|
page read and write
|
||
26ED5C70000
|
heap
|
page read and write
|
||
338D000
|
heap
|
page read and write
|
||
316A000
|
heap
|
page read and write
|
||
2AFA000
|
heap
|
page read and write
|
||
2FBA000
|
heap
|
page read and write
|
||
1E8D7000
|
unkown
|
page execute and read and write
|
||
871000
|
heap
|
page read and write
|
||
38FE000
|
heap
|
page read and write
|
||
2CE6000
|
heap
|
page read and write
|
||
25C3000
|
heap
|
page read and write
|
||
37FE000
|
heap
|
page read and write
|
||
AF6E000
|
stack
|
page read and write
|
||
3897000
|
heap
|
page read and write
|
||
9E5000
|
heap
|
page read and write
|
||
2D7D000
|
heap
|
page read and write
|
||
801000
|
heap
|
page read and write
|
||
DC5000
|
heap
|
page read and write
|
||
2FB9000
|
heap
|
page read and write
|
||
87E000
|
heap
|
page read and write
|
||
12F8000
|
stack
|
page read and write
|
||
2BC4000
|
heap
|
page read and write
|
||
6FD000
|
stack
|
page read and write
|
||
3ED000
|
stack
|
page read and write
|
||
4554A7B000
|
stack
|
page read and write
|
||
3EFE000
|
stack
|
page read and write
|
||
69AD000
|
stack
|
page read and write
|
||
CC6E000
|
stack
|
page read and write
|
||
6C43E000
|
unkown
|
page execute and read and write
|
||
339A000
|
heap
|
page read and write
|
||
21D1000
|
heap
|
page read and write
|
||
45AE000
|
stack
|
page read and write
|
||
74DE0000
|
unkown
|
page readonly
|
||
89EE000
|
stack
|
page read and write
|
||
36A0000
|
heap
|
page read and write
|
||
1DD3000
|
heap
|
page read and write
|
||
6C8AA000
|
unkown
|
page execute and read and write
|
||
1E7B9000
|
unkown
|
page execute and read and write
|
||
3198000
|
heap
|
page read and write
|
||
2FE2000
|
heap
|
page read and write
|
||
12E9000
|
unkown
|
page read and write
|
||
8D2000
|
heap
|
page read and write
|
||
3263000
|
unkown
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
26EDB303000
|
heap
|
page read and write
|
||
392F000
|
heap
|
page read and write
|
||
6C349000
|
unkown
|
page execute and read and write
|
||
7C0000
|
heap
|
page read and write
|
||
3453000
|
heap
|
page read and write
|
||
3100000
|
heap
|
page read and write
|
||
86D000
|
heap
|
page read and write
|
||
356E000
|
stack
|
page read and write
|
||
2596000
|
heap
|
page read and write
|
||
B7C000
|
heap
|
page read and write
|
||
2307000
|
heap
|
page read and write
|
||
2D63000
|
heap
|
page read and write
|
||
1230000
|
heap
|
page read and write
|
||
D8ED000
|
stack
|
page read and write
|
||
31B8000
|
heap
|
page read and write
|
||
2FB0000
|
heap
|
page read and write
|
||
3647000
|
heap
|
page read and write
|
||
1DD6000
|
heap
|
page read and write
|
||
2E9000
|
unkown
|
page readonly
|
||
6D05C000
|
unkown
|
page execute and read and write
|
||
2300000
|
heap
|
page read and write
|
||
84A000
|
heap
|
page read and write
|
||
2B61000
|
heap
|
page read and write
|
||
348C000
|
heap
|
page read and write
|
||
413E000
|
stack
|
page read and write
|
||
6CE1E000
|
unkown
|
page execute and read and write
|
||
14A9000
|
heap
|
page read and write
|
||
6C690000
|
unkown
|
page readonly
|
||
380E000
|
heap
|
page read and write
|
||
7DAE000
|
stack
|
page read and write
|
||
6D0BD000
|
unkown
|
page execute and read and write
|
||
2C33000
|
heap
|
page read and write
|
||
1DD2000
|
heap
|
page read and write
|
||
3982000
|
heap
|
page read and write
|
||
3660000
|
heap
|
page read and write
|
||
A0AE000
|
stack
|
page read and write
|
||
252D000
|
heap
|
page read and write
|
||
302A000
|
heap
|
page read and write
|
||
2FF8000
|
heap
|
page read and write
|
||
883000
|
heap
|
page read and write
|
||
6C545000
|
unkown
|
page execute and read and write
|
||
1F08A310000
|
heap
|
page read and write
|
||
BEAE000
|
stack
|
page read and write
|
||
6C52A000
|
unkown
|
page execute and read and write
|
||
6C617000
|
unkown
|
page execute and read and write
|
||
32B0000
|
heap
|
page read and write
|
||
291D000
|
stack
|
page read and write
|
||
2593000
|
heap
|
page read and write
|
||
EE0000
|
heap
|
page read and write
|
||
6D060000
|
unkown
|
page execute and read and write
|
||
73E000
|
heap
|
page read and write
|
||
A2F000
|
stack
|
page read and write
|
||
2BB6000
|
heap
|
page read and write
|
||
EEDB2FE000
|
unkown
|
page readonly
|
||
2A22000
|
heap
|
page read and write
|
||
1ECBA000
|
unkown
|
page execute and read and write
|
||
1997CE30000
|
trusted library allocation
|
page read and write
|
||
25D9000
|
heap
|
page read and write
|
||
888000
|
heap
|
page read and write
|
||
BFE000
|
heap
|
page read and write
|
||
6CCD1000
|
unkown
|
page execute and read and write
|
||
3E00000
|
heap
|
page read and write
|
||
21D9000
|
heap
|
page read and write
|
||
2A0000
|
heap
|
page read and write
|
||
31E7000
|
heap
|
page read and write
|
||
1F08A458000
|
heap
|
page read and write
|
||
2745000
|
heap
|
page read and write
|
||
22DA000
|
heap
|
page read and write
|
||
15C3000
|
heap
|
page read and write
|
||
26EDB313000
|
heap
|
page read and write
|
||
302A000
|
heap
|
page read and write
|
||
41AE000
|
stack
|
page read and write
|
||
21E0000
|
heap
|
page read and write
|
||
27C52802000
|
trusted library allocation
|
page read and write
|
||
2C28000
|
heap
|
page read and write
|
||
6C3D4000
|
unkown
|
page execute and read and write
|
||
73B31000
|
unkown
|
page execute and read and write
|
||
296E000
|
heap
|
page read and write
|
||
2C41000
|
heap
|
page read and write
|
||
1F08A47E000
|
heap
|
page read and write
|
||
3494000
|
heap
|
page read and write
|
||
23AE000
|
heap
|
page read and write
|
||
3F0000
|
heap
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
2FB1000
|
heap
|
page read and write
|
||
6C3AA000
|
unkown
|
page execute and read and write
|
||
26ED5C72000
|
heap
|
page read and write
|
||
225B7D40000
|
trusted library allocation
|
page read and write
|
||
1F08A43D000
|
heap
|
page read and write
|
||
73A5A000
|
unkown
|
page execute and read and write
|
||
7F5000
|
heap
|
page read and write
|
||
88AE000
|
stack
|
page read and write
|
||
2EC000
|
unkown
|
page read and write
|
||
1DD3000
|
heap
|
page read and write
|
||
27CD2648000
|
heap
|
page read and write
|
||
3844000
|
heap
|
page read and write
|
||
1E7C0000
|
unkown
|
page execute and write copy
|
||
1E8E0000
|
unkown
|
page read and write
|
||
3422000
|
heap
|
page read and write
|
||
6C73F000
|
unkown
|
page execute and read and write
|
||
A5E000
|
stack
|
page read and write
|
||
1F08A483000
|
heap
|
page read and write
|
||
EFC000
|
stack
|
page read and write
|
||
24DE000
|
stack
|
page read and write
|
||
1030E000
|
stack
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
1516000
|
heap
|
page read and write
|
||
86F000
|
heap
|
page read and write
|
||
45FE000
|
stack
|
page read and write
|
||
CAE000
|
stack
|
page read and write
|
||
1F08A444000
|
heap
|
page read and write
|
||
2597000
|
heap
|
page read and write
|
||
2AD5000
|
heap
|
page read and write
|
||
3009000
|
heap
|
page read and write
|
||
26B6000
|
heap
|
page read and write
|
||
6C691000
|
unkown
|
page execute and read and write
|
||
131D000
|
stack
|
page read and write
|
||
EEDB87E000
|
stack
|
page read and write
|
||
A503F7E000
|
stack
|
page read and write
|
||
2818000
|
heap
|
page read and write
|
||
3111000
|
heap
|
page read and write
|
||
AF9097B000
|
stack
|
page read and write
|
||
26EDB1B3000
|
trusted library allocation
|
page read and write
|
||
340B000
|
heap
|
page read and write
|
||
1DE0000
|
heap
|
page read and write
|
||
1530000
|
heap
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
6C55B000
|
unkown
|
page execute and read and write
|
||
2202000
|
heap
|
page read and write
|
||
316A000
|
heap
|
page read and write
|
||
6C897000
|
unkown
|
page execute and read and write
|
||
18C2000
|
heap
|
page read and write
|
||
38EE000
|
stack
|
page read and write
|
||
74DF4000
|
unkown
|
page execute and read and write
|
||
151E000
|
heap
|
page read and write
|
||
1E3A000
|
heap
|
page read and write
|
||
3724000
|
heap
|
page read and write
|
||
297E000
|
heap
|
page read and write
|
||
1E02000
|
heap
|
page read and write
|
||
10008000
|
unkown
|
page execute and read and write
|
||
2FAB000
|
unkown
|
page execute and read and write
|
||
6D077000
|
unkown
|
page execute and read and write
|
||
3267000
|
heap
|
page read and write
|
||
77E000
|
stack
|
page read and write
|
||
EEDBF7E000
|
unkown
|
page readonly
|
||
31D7000
|
heap
|
page read and write
|
||
22FB000
|
heap
|
page read and write
|
||
15CA000
|
heap
|
page read and write
|
||
384E000
|
heap
|
page read and write
|
||
8B6E000
|
stack
|
page read and write
|
||
4FE000
|
stack
|
page read and write
|
||
C5D000
|
unkown
|
page read and write
|
||
38CB000
|
heap
|
page read and write
|
||
6C779000
|
unkown
|
page execute and read and write
|
||
3900000
|
heap
|
page read and write
|
||
F51000
|
heap
|
page read and write
|
||
65EE000
|
stack
|
page read and write
|
||
4F3000
|
stack
|
page read and write
|
||
B96E000
|
stack
|
page read and write
|
||
2A44000
|
heap
|
page read and write
|
||
21D5000
|
heap
|
page read and write
|
||
45550FE000
|
stack
|
page read and write
|
||
33FD000
|
heap
|
page read and write
|
||
E92E000
|
stack
|
page read and write
|
||
22D7000
|
heap
|
page read and write
|
||
10008000
|
unkown
|
page execute and read and write
|
||
237D000
|
stack
|
page read and write
|
||
15AE000
|
heap
|
page read and write
|
||
314A000
|
heap
|
page read and write
|
||
ABAE000
|
stack
|
page read and write
|
||
6C5B9000
|
unkown
|
page execute and read and write
|
||
6D094000
|
unkown
|
page execute and read and write
|
||
3689000
|
heap
|
page read and write
|
||
310A000
|
heap
|
page read and write
|
||
32D3000
|
heap
|
page read and write
|
||
6C1F1000
|
unkown
|
page execute and read and write
|
||
87D000
|
heap
|
page read and write
|
||
155E000
|
stack
|
page read and write
|
||
1B0000
|
heap
|
page read and write
|
||
3103000
|
heap
|
page read and write
|
||
242E000
|
heap
|
page read and write
|
||
1E9B6000
|
unkown
|
page execute and read and write
|
||
2B65000
|
heap
|
page read and write
|
||
C69B3FC000
|
stack
|
page read and write
|
||
AE6E000
|
stack
|
page read and write
|
||
21D8000
|
heap
|
page read and write
|
||
3050000
|
heap
|
page read and write
|
||
5651E7E000
|
stack
|
page read and write
|
||
30FB000
|
heap
|
page read and write
|
||
1E8D7000
|
unkown
|
page execute and read and write
|
||
3984000
|
heap
|
page read and write
|
||
FCBE000
|
stack
|
page read and write
|
||
27CD267E000
|
heap
|
page read and write
|
||
2C24000
|
heap
|
page read and write
|
||
3A0C000
|
heap
|
page read and write
|
||
869000
|
heap
|
page read and write
|
||
36B0000
|
heap
|
page read and write
|
||
2804000
|
heap
|
page read and write
|
||
8C5000
|
heap
|
page read and write
|
||
878000
|
heap
|
page read and write
|
||
229E000
|
stack
|
page read and write
|
||
2452000
|
heap
|
page read and write
|
||
1DD6000
|
heap
|
page read and write
|
||
316A000
|
heap
|
page read and write
|
||
12C8F000
|
stack
|
page read and write
|
||
30BC000
|
heap
|
page read and write
|
||
3403000
|
heap
|
page read and write
|
||
6CB80000
|
unkown
|
page execute and read and write
|
||
239000
|
stack
|
page read and write
|
||
26EDB0C0000
|
trusted library allocation
|
page read and write
|
||
952E000
|
stack
|
page read and write
|
||
BD6E000
|
stack
|
page read and write
|
||
BED000
|
stack
|
page read and write
|
||
84A000
|
heap
|
page read and write
|
||
1997ABD4000
|
heap
|
page read and write
|
||
B0AE000
|
stack
|
page read and write
|
||
36A7000
|
heap
|
page read and write
|
||
2502000
|
heap
|
page read and write
|
||
1997ABD9000
|
heap
|
page read and write
|
||
92AE000
|
stack
|
page read and write
|
||
6C31D000
|
unkown
|
page execute and read and write
|
||
3D0000
|
unkown
|
page readonly
|
||
2E47000
|
heap
|
page read and write
|
||
3744000
|
heap
|
page read and write
|
||
6CAA4000
|
unkown
|
page execute and read and write
|
||
27C50E81000
|
heap
|
page read and write
|
||
81F000
|
heap
|
page read and write
|
||
2B78000
|
heap
|
page read and write
|
||
12FC000
|
stack
|
page read and write
|
||
27C5000
|
heap
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
73A60000
|
unkown
|
page read and write
|
||
C0EE000
|
stack
|
page read and write
|
||
26ED5C9F000
|
heap
|
page read and write
|
||
6C231000
|
unkown
|
page execute and read and write
|
||
27C50E2B000
|
heap
|
page read and write
|
||
2FCA000
|
heap
|
page read and write
|
||
C11000
|
heap
|
page read and write
|
||
2E82000
|
heap
|
page read and write
|
||
6CAB5000
|
unkown
|
page execute and read and write
|
||
31AE000
|
stack
|
page read and write
|
||
38A5000
|
heap
|
page read and write
|
||
2527000
|
heap
|
page read and write
|
||
6C883000
|
unkown
|
page execute and read and write
|
||
3A99000
|
heap
|
page read and write
|
||
1F08A497000
|
heap
|
page read and write
|
||
1A63000
|
heap
|
page read and write
|
||
302A000
|
heap
|
page read and write
|
||
2221000
|
heap
|
page read and write
|
||
2D9D000
|
heap
|
page read and write
|
||
9E7000
|
heap
|
page read and write
|
||
6D0B7000
|
unkown
|
page execute and read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
44BE000
|
stack
|
page read and write
|
||
3828000
|
heap
|
page read and write
|
||
31B6000
|
heap
|
page read and write
|
||
37EE000
|
stack
|
page read and write
|
||
1E9B6000
|
unkown
|
page execute and read and write
|
||
27CD264E000
|
heap
|
page read and write
|
||
18D5000
|
heap
|
page read and write
|
||
9CAE000
|
stack
|
page read and write
|
||
1517000
|
heap
|
page read and write
|
||
2C9D000
|
heap
|
page read and write
|
||
1DDB000
|
heap
|
page read and write
|
||
32C1000
|
heap
|
page read and write
|
||
2F92000
|
heap
|
page read and write
|
||
2F9000
|
unkown
|
page read and write
|
||
2D58000
|
heap
|
page read and write
|
||
1058E000
|
stack
|
page read and write
|
||
26EDB4E0000
|
remote allocation
|
page read and write
|
||
7EAE000
|
stack
|
page read and write
|
||
393D000
|
heap
|
page read and write
|
||
4554F7F000
|
stack
|
page read and write
|
||
6C55F000
|
unkown
|
page execute and read and write
|
||
6C1D5000
|
unkown
|
page execute and read and write
|
||
879000
|
heap
|
page read and write
|
||
4FC000
|
stack
|
page read and write
|
||
32D1000
|
heap
|
page read and write
|
||
38BE000
|
heap
|
page read and write
|
||
C62E000
|
stack
|
page read and write
|
||
24F8000
|
heap
|
page read and write
|
||
3109000
|
heap
|
page read and write
|
||
5FED000
|
stack
|
page read and write
|
||
2528000
|
heap
|
page read and write
|
||
EEDB4FE000
|
unkown
|
page readonly
|
||
37A3000
|
heap
|
page read and write
|
||
83E000
|
heap
|
page read and write
|
||
26EDB410000
|
trusted library allocation
|
page read and write
|
||
151A000
|
heap
|
page read and write
|
||
FB3E000
|
stack
|
page read and write
|
||
2599000
|
heap
|
page read and write
|
||
8DEE000
|
stack
|
page read and write
|
||
39F2000
|
heap
|
page read and write
|
||
82A000
|
heap
|
page read and write
|
||
225B7702000
|
heap
|
page read and write
|
||
2A98000
|
heap
|
page read and write
|
||
2E11000
|
heap
|
page read and write
|
||
4FAE000
|
stack
|
page read and write
|
||
10CCE000
|
stack
|
page read and write
|
||
84E000
|
stack
|
page read and write
|
||
26EDB0B0000
|
trusted library allocation
|
page read and write
|
||
1ECBA000
|
unkown
|
page execute and read and write
|
||
10E4E000
|
stack
|
page read and write
|
||
352E000
|
stack
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
227A000
|
stack
|
page read and write
|
||
266000
|
heap
|
page read and write
|
||
EEDABFE000
|
stack
|
page read and write
|
||
2EC000
|
unkown
|
page read and write
|
||
278B000
|
heap
|
page read and write
|
||
8EEE000
|
stack
|
page read and write
|
||
612E000
|
stack
|
page read and write
|
||
C12000
|
heap
|
page read and write
|
||
2571000
|
unkown
|
page execute and read and write
|
||
4AAE000
|
stack
|
page read and write
|
||
26ED5C6B000
|
heap
|
page read and write
|
||
21D1000
|
heap
|
page read and write
|
||
622E000
|
stack
|
page read and write
|
||
2F49000
|
heap
|
page read and write
|
||
1997ABF5000
|
heap
|
page read and write
|
||
6CCBE000
|
unkown
|
page execute and read and write
|
||
2866000
|
heap
|
page read and write
|
||
27CD2613000
|
heap
|
page read and write
|
||
21D4000
|
heap
|
page read and write
|
||
10A4E000
|
stack
|
page read and write
|
||
8862E7F000
|
stack
|
page read and write
|
||
D6C000
|
stack
|
page read and write
|
||
232000
|
stack
|
page read and write
|
||
366E000
|
stack
|
page read and write
|
||
1701000
|
heap
|
page read and write
|
||
389F000
|
heap
|
page read and write
|
||
1F08A45A000
|
heap
|
page read and write
|
||
1F08A502000
|
heap
|
page read and write
|
||
23CC000
|
heap
|
page read and write
|
||
338B000
|
heap
|
page read and write
|
||
73E000
|
unkown
|
page read and write
|
||
1E9B4000
|
unkown
|
page execute and read and write
|
||
B5F000
|
heap
|
page read and write
|
||
302A000
|
heap
|
page read and write
|
||
8D2000
|
heap
|
page read and write
|
||
2313000
|
heap
|
page read and write
|
||
1997ABE3000
|
heap
|
page read and write
|
||
6CA64000
|
unkown
|
page execute and read and write
|
||
3265000
|
heap
|
page read and write
|
||
11D0E000
|
stack
|
page read and write
|
||
36C0000
|
heap
|
page read and write
|
||
2EC000
|
unkown
|
page write copy
|
||
A6EE000
|
stack
|
page read and write
|
||
2594000
|
heap
|
page read and write
|
||
ABED000
|
stack
|
page read and write
|
||
1000D000
|
unkown
|
page read and write
|
||
1F08A45E000
|
heap
|
page read and write
|
||
1E7B9000
|
unkown
|
page execute and read and write
|
||
1DD9000
|
heap
|
page read and write
|
||
259C000
|
heap
|
page read and write
|
||
2F50000
|
heap
|
page read and write
|
||
151E000
|
heap
|
page read and write
|
||
21D1000
|
unkown
|
page execute and read and write
|
||
1000D000
|
unkown
|
page read and write
|
||
26EDB27C000
|
heap
|
page read and write
|
||
2FE7000
|
heap
|
page read and write
|
||
398C000
|
heap
|
page read and write
|
||
25B5000
|
heap
|
page read and write
|
||
E6AE000
|
stack
|
page read and write
|
||
6B2E000
|
stack
|
page read and write
|
||
2501000
|
heap
|
page read and write
|
||
2B62000
|
heap
|
page read and write
|
||
2D21000
|
heap
|
page read and write
|
||
966E000
|
stack
|
page read and write
|
||
2A60000
|
heap
|
page read and write
|
||
2D0C000
|
heap
|
page read and write
|
||
1EFD2CF0000
|
heap
|
page read and write
|
||
1997C6C4000
|
heap
|
page read and write
|
||
4B3CAFE000
|
stack
|
page read and write
|
||
B48000
|
heap
|
page read and write
|
||
736E000
|
stack
|
page read and write
|
||
3434000
|
heap
|
page read and write
|
||
10001000
|
unkown
|
page execute and read and write
|
||
2FE8000
|
heap
|
page read and write
|
||
662E000
|
stack
|
page read and write
|
||
27CD2430000
|
heap
|
page read and write
|
||
1511000
|
heap
|
page read and write
|
||
86E000
|
heap
|
page read and write
|
||
39AD000
|
heap
|
page read and write
|
||
31D2000
|
heap
|
page read and write
|
||
2C0E000
|
heap
|
page read and write
|
||
2A56000
|
heap
|
page read and write
|
||
6D09C000
|
unkown
|
page execute and read and write
|
||
34AC000
|
heap
|
page read and write
|
||
88EE000
|
stack
|
page read and write
|
||
262E000
|
stack
|
page read and write
|
||
2180000
|
direct allocation
|
page execute and read and write
|
||
6C53F000
|
unkown
|
page execute and read and write
|
||
2507000
|
heap
|
page read and write
|
||
3909000
|
heap
|
page read and write
|
||
21D1000
|
heap
|
page read and write
|
||
21E9000
|
unkown
|
page read and write
|
||
398C000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
4CEE000
|
stack
|
page read and write
|
||
C22E000
|
stack
|
page read and write
|
||
23F0000
|
heap
|
page read and write
|
||
29F3000
|
heap
|
page read and write
|
||
3823000
|
heap
|
page read and write
|
||
F28000
|
heap
|
page read and write
|
||
23A8000
|
unkown
|
page read and write
|
||
64EE000
|
stack
|
page read and write
|
||
2B6E000
|
heap
|
page read and write
|
||
4B3C8FD000
|
stack
|
page read and write
|
||
3876000
|
heap
|
page read and write
|
||
2E90000
|
heap
|
page read and write
|
||
151A000
|
heap
|
page read and write
|
||
26EDB200000
|
heap
|
page read and write
|
||
4B3C5DA000
|
stack
|
page read and write
|
||
D2AE000
|
stack
|
page read and write
|
||
1F08A457000
|
heap
|
page read and write
|
||
3162000
|
heap
|
page read and write
|
||
38A7000
|
heap
|
page read and write
|
||
1158E000
|
stack
|
page read and write
|
||
2E43000
|
heap
|
page read and write
|
||
2A38000
|
heap
|
page read and write
|
||
34BE000
|
heap
|
page read and write
|
||
2274000
|
heap
|
page read and write
|
||
1997AB00000
|
heap
|
page read and write
|
||
3ACA000
|
heap
|
page read and write
|
||
260000
|
heap
|
page read and write
|
||
21E1000
|
heap
|
page read and write
|
||
2591000
|
heap
|
page read and write
|
||
39F6000
|
heap
|
page read and write
|
||
25A7000
|
heap
|
page read and write
|
||
1DE0000
|
heap
|
page read and write
|
||
2BE7000
|
heap
|
page read and write
|
||
751000
|
heap
|
page read and write
|
||
2501000
|
heap
|
page read and write
|
||
6C5F2000
|
unkown
|
page execute and read and write
|
||
800000
|
heap
|
page read and write
|
||
2446000
|
heap
|
page read and write
|
||
FC5000
|
stack
|
page read and write
|
||
111CE000
|
stack
|
page read and write
|
||
3A36000
|
heap
|
page read and write
|
||
3260000
|
heap
|
page read and write
|
||
30F0000
|
heap
|
page read and write
|
||
1F08A46C000
|
heap
|
page read and write
|
||
36AD000
|
stack
|
page read and write
|
||
31DB000
|
heap
|
page read and write
|
||
4BEE000
|
stack
|
page read and write
|
||
2D97000
|
heap
|
page read and write
|
||
45552FE000
|
stack
|
page read and write
|
||
107CE000
|
stack
|
page read and write
|
||
260A000
|
heap
|
page read and write
|
||
885000
|
heap
|
page read and write
|
||
6CCAB000
|
unkown
|
page execute and read and write
|
||
AF9057E000
|
stack
|
page read and write
|
||
38AC000
|
heap
|
page read and write
|
||
15FD000
|
heap
|
page read and write
|
||
1170E000
|
stack
|
page read and write
|
||
374E000
|
heap
|
page read and write
|
||
EA6E000
|
stack
|
page read and write
|
||
23A6000
|
unkown
|
page execute and read and write
|
||
27CD2510000
|
heap
|
page read and write
|
||
D3EE000
|
stack
|
page read and write
|
||
1890000
|
heap
|
page read and write
|
||
122E4000
|
heap
|
page read and write
|
||
33CC000
|
heap
|
page read and write
|
||
1ECBA000
|
unkown
|
page execute and read and write
|
||
2D1000
|
stack
|
page read and write
|
||
6C890000
|
unkown
|
page execute and read and write
|
||
260A000
|
heap
|
page read and write
|
||
4554BFE000
|
unkown
|
page readonly
|
||
B30000
|
heap
|
page read and write
|
||
1997ABD0000
|
heap
|
page read and write
|
||
21D9000
|
heap
|
page read and write
|
||
3260000
|
heap
|
page read and write
|
||
248A000
|
heap
|
page read and write
|
||
2595000
|
heap
|
page read and write
|
||
802D000
|
stack
|
page read and write
|
||
1F08A44E000
|
heap
|
page read and write
|
||
36C6000
|
heap
|
page read and write
|
||
122E7000
|
heap
|
page read and write
|
||
259D000
|
heap
|
page read and write
|
||
2594000
|
heap
|
page read and write
|
||
3977000
|
heap
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
27C50E7C000
|
heap
|
page read and write
|
||
6C585000
|
unkown
|
page execute and read and write
|
||
1E9BC000
|
unkown
|
page read and write
|
||
2598000
|
heap
|
page read and write
|
||
10D0E000
|
stack
|
page read and write
|
||
1DD8000
|
heap
|
page read and write
|
||
94E000
|
stack
|
page read and write
|
||
122E0000
|
heap
|
page read and write
|
||
1C3FA476000
|
heap
|
page read and write
|
||
83E000
|
heap
|
page read and write
|
||
31CF000
|
unkown
|
page read and write
|
||
316A000
|
heap
|
page read and write
|
||
ECC000
|
stack
|
page read and write
|
||
2551000
|
unkown
|
page execute and read and write
|
||
C60000
|
heap
|
page read and write
|
||
73AE000
|
stack
|
page read and write
|
||
1997C680000
|
trusted library allocation
|
page read and write
|
||
8D9000
|
heap
|
page read and write
|
||
2675000
|
heap
|
page read and write
|
||
BBED000
|
stack
|
page read and write
|
||
69EE000
|
stack
|
page read and write
|
||
3358000
|
heap
|
page read and write
|
||
AED000
|
stack
|
page read and write
|
||
1F08A46F000
|
heap
|
page read and write
|
||
6C577000
|
unkown
|
page execute and read and write
|
||
754000
|
heap
|
page read and write
|
||
2CD4000
|
heap
|
page read and write
|
||
392E000
|
stack
|
page read and write
|
||
6D0E5000
|
unkown
|
page execute and write copy
|
||
387A000
|
heap
|
page read and write
|
||
33B2000
|
heap
|
page read and write
|
||
27E4000
|
heap
|
page read and write
|
||
7CE000
|
unkown
|
page read and write
|
||
1F08A432000
|
heap
|
page read and write
|
||
6CCB2000
|
unkown
|
page execute and read and write
|
||
231D000
|
heap
|
page read and write
|
||
26ED70B0000
|
trusted library allocation
|
page read and write
|
||
1F08AA80000
|
trusted library allocation
|
page read and write
|
||
120CE000
|
stack
|
page read and write
|
||
A1E000
|
stack
|
page read and write
|
||
B1EE000
|
stack
|
page read and write
|
||
252E000
|
stack
|
page read and write
|
||
2D2C000
|
heap
|
page read and write
|
||
396B000
|
heap
|
page read and write
|
||
6D06C000
|
unkown
|
page execute and read and write
|
||
26EDB410000
|
trusted library allocation
|
page read and write
|
||
C8AE000
|
stack
|
page read and write
|
||
902E000
|
stack
|
page read and write
|
||
2CD0000
|
heap
|
page read and write
|
||
3F6E000
|
stack
|
page read and write
|
||
B40000
|
heap
|
page read and write
|
||
2EC000
|
unkown
|
page read and write
|
||
3457000
|
heap
|
page read and write
|
||
27CD2602000
|
heap
|
page read and write
|
||
1F08A413000
|
heap
|
page read and write
|
||
36DA000
|
heap
|
page read and write
|
||
2BFB000
|
heap
|
page read and write
|
||
37A4000
|
heap
|
page read and write
|
||
205E000
|
stack
|
page read and write
|
||
3060000
|
heap
|
page read and write
|
||
6CBB5000
|
unkown
|
page execute and write copy
|
||
6C398000
|
unkown
|
page read and write
|
||
7D6000
|
heap
|
page read and write
|
||
1F08A460000
|
heap
|
page read and write
|
||
2593000
|
heap
|
page read and write
|
||
DB2E000
|
stack
|
page read and write
|
||
F8FE000
|
stack
|
page read and write
|
||
1E8CF000
|
unkown
|
page execute and read and write
|
||
2A34000
|
heap
|
page read and write
|
||
80E000
|
stack
|
page read and write
|
||
7F0000
|
direct allocation
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
2484000
|
heap
|
page read and write
|
||
2C76000
|
heap
|
page read and write
|
||
2FD6000
|
heap
|
page read and write
|
||
F3D000
|
heap
|
page read and write
|
||
870000
|
heap
|
page read and write
|
||
CEEE000
|
stack
|
page read and write
|
||
B32E000
|
stack
|
page read and write
|
||
3100000
|
heap
|
page read and write
|
||
26EDC000000
|
heap
|
page read and write
|
||
2F80000
|
heap
|
page read and write
|
||
30FC000
|
heap
|
page read and write
|
||
1517000
|
heap
|
page read and write
|
||
15B8000
|
heap
|
page read and write
|
||
1DD1000
|
heap
|
page read and write
|
||
36AA000
|
heap
|
page read and write
|
||
24FE000
|
heap
|
page read and write
|
||
EEDC3FE000
|
unkown
|
page readonly
|
||
3346000
|
heap
|
page read and write
|
||
7B2E000
|
stack
|
page read and write
|
||
1340000
|
heap
|
page read and write
|
||
31C0000
|
heap
|
page read and write
|
||
7D6E000
|
stack
|
page read and write
|
||
2C72000
|
heap
|
page read and write
|
||
A50427E000
|
unkown
|
page readonly
|
||
2AC6000
|
heap
|
page read and write
|
||
1F08A459000
|
heap
|
page read and write
|
||
1E9BC000
|
unkown
|
page read and write
|
||
1ECB1000
|
unkown
|
page execute and read and write
|
||
2798000
|
heap
|
page read and write
|
||
2D30000
|
heap
|
page read and write
|
||
30FC000
|
heap
|
page read and write
|
||
6C53000
|
heap
|
page read and write
|
||
1997AB40000
|
heap
|
page read and write
|
||
AFC000
|
stack
|
page read and write
|
||
21D4000
|
heap
|
page read and write
|
||
86E000
|
heap
|
page read and write
|
||
6C333000
|
unkown
|
page execute and read and write
|
||
2B6C000
|
heap
|
page read and write
|
||
1F08A44D000
|
heap
|
page read and write
|
||
2CFA000
|
heap
|
page read and write
|
||
3230000
|
heap
|
page read and write
|
||
1E9B6000
|
unkown
|
page execute and read and write
|
||
886000
|
heap
|
page read and write
|
||
2692000
|
heap
|
page read and write
|
||
B22E000
|
stack
|
page read and write
|
||
1210E000
|
stack
|
page read and write
|
||
1F08A449000
|
heap
|
page read and write
|
||
2381000
|
unkown
|
page execute and read and write
|
||
2FC0000
|
heap
|
page read and write
|
||
1300000
|
heap
|
page read and write
|
||
A50417E000
|
unkown
|
page readonly
|
||
11E0000
|
heap
|
page read and write
|
||
39BE000
|
heap
|
page read and write
|
||
B8A000
|
heap
|
page read and write
|
||
26ED6400000
|
heap
|
page read and write
|
||
1E8E0000
|
unkown
|
page read and write
|
||
320A000
|
heap
|
page read and write
|
||
307F000
|
unkown
|
page read and write
|
||
398C000
|
heap
|
page read and write
|
||
1DD3000
|
heap
|
page read and write
|
||
1997ABE5000
|
heap
|
page read and write
|
||
24D1000
|
heap
|
page read and write
|
||
995000
|
heap
|
page read and write
|
||
2CD4000
|
heap
|
page read and write
|
||
776D000
|
stack
|
page read and write
|
||
372D000
|
heap
|
page read and write
|
||
36C2000
|
heap
|
page read and write
|
||
116CE000
|
stack
|
page read and write
|
||
30F9000
|
heap
|
page read and write
|
||
122FA000
|
heap
|
page read and write
|
||
87E000
|
heap
|
page read and write
|
||
251C000
|
heap
|
page read and write
|
||
370A000
|
heap
|
page read and write
|
||
6D07B000
|
unkown
|
page execute and read and write
|
||
6CCB0000
|
unkown
|
page execute and read and write
|
||
6CB69000
|
unkown
|
page execute and read and write
|
||
2E30000
|
heap
|
page read and write
|
||
2D99000
|
heap
|
page read and write
|
||
1F08A469000
|
heap
|
page read and write
|
||
2FB1000
|
heap
|
page read and write
|
||
A92E000
|
stack
|
page read and write
|
||
827000
|
heap
|
page read and write
|
||
826E000
|
stack
|
page read and write
|
||
4EE000
|
stack
|
page read and write
|
||
31EE000
|
heap
|
page read and write
|
||
9A2E000
|
stack
|
page read and write
|
||
2C86000
|
heap
|
page read and write
|
||
2C24000
|
heap
|
page read and write
|
||
324F000
|
heap
|
page read and write
|
||
134E000
|
stack
|
page read and write
|
||
942D000
|
stack
|
page read and write
|
||
13F0000
|
heap
|
page read and write
|
||
86B000
|
heap
|
page read and write
|
||
31F8000
|
heap
|
page read and write
|
||
EEDC97E000
|
stack
|
page read and write
|
||
6CB2C000
|
unkown
|
page execute and read and write
|
||
21D0000
|
heap
|
page read and write
|
||
6D089000
|
unkown
|
page execute and read and write
|
||
3678000
|
heap
|
page read and write
|
||
1EFD2B40000
|
heap
|
page read and write
|
||
B7E000
|
stack
|
page read and write
|
||
2C18000
|
heap
|
page read and write
|
||
316A000
|
heap
|
page read and write
|
||
1401000
|
heap
|
page read and write
|
||
2A84000
|
heap
|
page read and write
|
||
E1AE000
|
stack
|
page read and write
|
||
100000
|
heap
|
page read and write
|
||
26EDB4E0000
|
remote allocation
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
2BF6000
|
heap
|
page read and write
|
||
6D0B7000
|
unkown
|
page execute and read and write
|
||
3820000
|
heap
|
page read and write
|
||
906E000
|
stack
|
page read and write
|
||
2981000
|
heap
|
page read and write
|
||
2B67000
|
heap
|
page read and write
|
||
37AE000
|
stack
|
page read and write
|
||
E06E000
|
stack
|
page read and write
|
||
1508000
|
heap
|
page read and write
|
||
893000
|
heap
|
page read and write
|
||
2724000
|
heap
|
page read and write
|
||
C9EE000
|
stack
|
page read and write
|
||
39BC000
|
heap
|
page read and write
|
||
26ED5C0A000
|
heap
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
1E7DB000
|
unkown
|
page execute and write copy
|
||
AF90A7E000
|
unkown
|
page readonly
|
||
225B7646000
|
heap
|
page read and write
|
||
79AE000
|
stack
|
page read and write
|
||
2487000
|
heap
|
page read and write
|
||
122ED000
|
heap
|
page read and write
|
||
1424000
|
heap
|
page read and write
|
||
26EDB30F000
|
heap
|
page read and write
|
||
C26E000
|
stack
|
page read and write
|
||
A7EE000
|
stack
|
page read and write
|
||
1350000
|
trusted library allocation
|
page read and write
|
||
3100000
|
heap
|
page read and write
|
||
EA2E000
|
stack
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
28EE000
|
stack
|
page read and write
|
||
6C32B000
|
unkown
|
page execute and read and write
|
||
30FE000
|
heap
|
page read and write
|
||
73A5F000
|
unkown
|
page execute and write copy
|
||
80F000
|
heap
|
page read and write
|
||
36F8000
|
heap
|
page read and write
|
||
302E000
|
stack
|
page read and write
|
||
5AAE000
|
stack
|
page read and write
|
||
2FB7000
|
heap
|
page read and write
|
||
1DD1000
|
heap
|
page read and write
|
||
1EFD2B60000
|
heap
|
page read and write
|
||
342E000
|
heap
|
page read and write
|
||
13CE000
|
stack
|
page read and write
|
||
26B3000
|
heap
|
page read and write
|
||
1997AB10000
|
heap
|
page read and write
|
||
1C3FA44B000
|
heap
|
page read and write
|
||
316A000
|
heap
|
page read and write
|
||
27B6000
|
heap
|
page read and write
|
||
4554C7E000
|
stack
|
page read and write
|
||
83AE000
|
stack
|
page read and write
|
||
1C3FA513000
|
heap
|
page read and write
|
||
6D09C000
|
unkown
|
page execute and read and write
|
||
889000
|
heap
|
page read and write
|
||
2F64000
|
heap
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
122D5000
|
heap
|
page read and write
|
||
2A54000
|
heap
|
page read and write
|
||
BFA000
|
heap
|
page read and write
|
||
31B4000
|
heap
|
page read and write
|
||
225B762F000
|
heap
|
page read and write
|
||
4140000
|
heap
|
page read and write
|
||
122DA000
|
heap
|
page read and write
|
||
8FC000
|
stack
|
page read and write
|
||
AF9047E000
|
unkown
|
page readonly
|
||
EEDBCFE000
|
unkown
|
page readonly
|
||
14A6000
|
heap
|
page read and write
|
||
BAAE000
|
stack
|
page read and write
|
||
26ED5C24000
|
heap
|
page read and write
|
||
6CB22000
|
unkown
|
page execute and read and write
|
||
5EAD000
|
stack
|
page read and write
|
||
26EDB1A2000
|
trusted library allocation
|
page read and write
|
||
260A000
|
heap
|
page read and write
|
||
C17000
|
heap
|
page read and write
|
||
6C911000
|
unkown
|
page execute and read and write
|
||
852E000
|
stack
|
page read and write
|
||
3263000
|
heap
|
page read and write
|
||
6C759000
|
unkown
|
page execute and read and write
|
||
1997ABE0000
|
heap
|
page read and write
|
||
393B000
|
heap
|
page read and write
|
||
6C36F000
|
unkown
|
page execute and read and write
|
||
A504A7D000
|
stack
|
page read and write
|
||
4DC000
|
stack
|
page read and write
|
||
34A5000
|
heap
|
page read and write
|
||
14FE000
|
stack
|
page read and write
|
||
2FA1000
|
unkown
|
page execute and read and write
|
||
A503B7E000
|
stack
|
page readonly
|
||
2F96000
|
heap
|
page read and write
|
||
2420000
|
heap
|
page read and write
|
||
1DDC000
|
heap
|
page read and write
|
||
2F59000
|
heap
|
page read and write
|
||
90F000
|
unkown
|
page read and write
|
||
23A6000
|
heap
|
page read and write
|
||
1DE0000
|
heap
|
page read and write
|
||
2FB6000
|
heap
|
page read and write
|
||
AF9007E000
|
unkown
|
page readonly
|
||
387F000
|
heap
|
page read and write
|
||
1ECC0000
|
unkown
|
page read and write
|
||
6C639000
|
unkown
|
page execute and read and write
|
||
26ED5BC0000
|
trusted library allocation
|
page read and write
|
||
2F59000
|
heap
|
page read and write
|
||
1EFD2CF5000
|
heap
|
page read and write
|
||
1550000
|
heap
|
page read and write
|
||
3261000
|
heap
|
page read and write
|
||
225B763B000
|
heap
|
page read and write
|
||
839000
|
heap
|
page read and write
|
||
2B8A000
|
heap
|
page read and write
|
||
3A2E000
|
heap
|
page read and write
|
||
147A000
|
heap
|
page read and write
|
||
21D1000
|
heap
|
page read and write
|
||
38E0000
|
heap
|
page read and write
|
||
6C8DF000
|
unkown
|
page execute and read and write
|
||
30F1000
|
heap
|
page read and write
|
||
36BB000
|
heap
|
page read and write
|
||
301D000
|
heap
|
page read and write
|
||
2FB9000
|
heap
|
page read and write
|
||
278C000
|
heap
|
page read and write
|
||
EEDAFFC000
|
stack
|
page read and write
|
||
26ED5D02000
|
heap
|
page read and write
|
||
1F08A473000
|
heap
|
page read and write
|
||
260A000
|
heap
|
page read and write
|
||
1490000
|
heap
|
page read and write
|
||
1ECB6000
|
unkown
|
page execute and read and write
|
||
CEAE000
|
stack
|
page read and write
|
||
2F23000
|
heap
|
page read and write
|
||
6C9000
|
heap
|
page read and write
|
||
722E000
|
stack
|
page read and write
|
||
9F2E000
|
stack
|
page read and write
|
||
6CABC000
|
unkown
|
page execute and read and write
|
||
122CB000
|
heap
|
page read and write
|
||
73A70000
|
unkown
|
page readonly
|
||
6CA92000
|
unkown
|
page execute and read and write
|
||
6D05C000
|
unkown
|
page execute and read and write
|
||
21D1000
|
heap
|
page read and write
|
||
1C3FA210000
|
heap
|
page read and write
|
||
772E000
|
stack
|
page read and write
|
||
25D8000
|
heap
|
page read and write
|
||
889000
|
heap
|
page read and write
|
||
2FC0000
|
heap
|
page read and write
|
||
1000A000
|
unkown
|
page execute and read and write
|
||
122E9000
|
heap
|
page read and write
|
||
2BB6000
|
heap
|
page read and write
|
||
98EE000
|
stack
|
page read and write
|
||
22DB000
|
heap
|
page read and write
|
||
6E6E000
|
stack
|
page read and write
|
||
25E9000
|
heap
|
page read and write
|
||
26AD000
|
heap
|
page read and write
|
||
8DE000
|
heap
|
page read and write
|
||
A50457D000
|
stack
|
page read and write
|
||
2B64000
|
heap
|
page read and write
|
||
6C5AD000
|
unkown
|
page execute and read and write
|
||
10E0E000
|
stack
|
page read and write
|
||
6C747000
|
unkown
|
page execute and read and write
|
||
CDD000
|
heap
|
page read and write
|
||
890000
|
heap
|
page read and write
|
||
6C3C0000
|
unkown
|
page readonly
|
||
81F000
|
heap
|
page read and write
|
||
2A8E000
|
heap
|
page read and write
|
||
1517000
|
heap
|
page read and write
|
||
A56E000
|
stack
|
page read and write
|
||
30F1000
|
heap
|
page read and write
|
||
1517000
|
heap
|
page read and write
|
||
122D1000
|
heap
|
page read and write
|
||
15C9000
|
heap
|
page read and write
|
||
EEDB37E000
|
stack
|
page read and write
|
||
3186000
|
heap
|
page read and write
|
||
38A3000
|
heap
|
page read and write
|
||
3EB000
|
unkown
|
page readonly
|
||
AD2D000
|
stack
|
page read and write
|
||
1E8DC000
|
unkown
|
page execute and read and write
|
||
3173000
|
heap
|
page read and write
|
||
3060000
|
heap
|
page read and write
|
||
2412000
|
heap
|
page read and write
|
||
2712000
|
heap
|
page read and write
|
||
381E000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
260A000
|
heap
|
page read and write
|
||
FFBE000
|
stack
|
page read and write
|
||
82E000
|
heap
|
page read and write
|
||
2A15000
|
heap
|
page read and write
|
||
10A8E000
|
stack
|
page read and write
|
||
20B4000
|
heap
|
page read and write
|
||
6C830000
|
unkown
|
page execute and read and write
|
||
26ED5CA5000
|
heap
|
page read and write
|
||
456E000
|
stack
|
page read and write
|
||
2BEC000
|
heap
|
page read and write
|
||
151D000
|
heap
|
page read and write
|
||
276D000
|
stack
|
page read and write
|
||
18E8000
|
heap
|
page read and write
|
||
271E000
|
heap
|
page read and write
|
||
806000
|
heap
|
page read and write
|
||
DCAE000
|
stack
|
page read and write
|
||
302A000
|
heap
|
page read and write
|
||
35CA000
|
heap
|
page read and write
|
||
2BAE000
|
heap
|
page read and write
|
||
3717000
|
heap
|
page read and write
|
||
36BD000
|
heap
|
page read and write
|
||
6CB89000
|
unkown
|
page execute and read and write
|
||
E7E000
|
stack
|
page read and write
|
||
10B8E000
|
stack
|
page read and write
|
||
1020E000
|
stack
|
page read and write
|
||
2E38000
|
heap
|
page read and write
|
||
9CEE000
|
stack
|
page read and write
|
||
31F2000
|
heap
|
page read and write
|
||
2FDC000
|
heap
|
page read and write
|
||
27C50DD0000
|
trusted library allocation
|
page read and write
|
||
302A000
|
heap
|
page read and write
|
||
2758000
|
heap
|
page read and write
|
||
2D9B000
|
heap
|
page read and write
|
||
122F8000
|
heap
|
page read and write
|
||
1E7B9000
|
unkown
|
page execute and read and write
|
||
4BAE000
|
stack
|
page read and write
|
||
3071000
|
heap
|
page read and write
|
||
33E4000
|
heap
|
page read and write
|
||
35B0000
|
heap
|
page read and write
|
||
141E000
|
stack
|
page read and write
|
||
7FEE000
|
stack
|
page read and write
|
||
3CAE000
|
stack
|
page read and write
|
||
27AE000
|
stack
|
page read and write
|
||
21DC000
|
heap
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
40AE000
|
stack
|
page read and write
|
||
1F08A491000
|
heap
|
page read and write
|
||
1E7DD000
|
unkown
|
page read and write
|
||
151D000
|
heap
|
page read and write
|
||
A46E000
|
stack
|
page read and write
|
||
385D000
|
heap
|
page read and write
|
||
4554CFE000
|
unkown
|
page readonly
|
||
3783000
|
heap
|
page read and write
|
||
1997C6C0000
|
heap
|
page read and write
|
||
DDEE000
|
stack
|
page read and write
|
||
25A3000
|
heap
|
page read and write
|
||
26ED651A000
|
heap
|
page read and write
|
||
316A000
|
heap
|
page read and write
|
||
88F000
|
heap
|
page read and write
|
||
E2EE000
|
stack
|
page read and write
|
||
27CD2669000
|
heap
|
page read and write
|
||
2B4A000
|
heap
|
page read and write
|
||
B86E000
|
stack
|
page read and write
|
||
2E29000
|
heap
|
page read and write
|
||
3981000
|
heap
|
page read and write
|
||
3A5000
|
heap
|
page read and write
|
||
2E4000
|
unkown
|
page readonly
|
||
754000
|
heap
|
page read and write
|
||
6C794000
|
unkown
|
page execute and write copy
|
||
6CAC0000
|
unkown
|
page execute and read and write
|
||
34B3000
|
heap
|
page read and write
|
||
82E000
|
heap
|
page read and write
|
||
26FD000
|
heap
|
page read and write
|
||
FF7E000
|
stack
|
page read and write
|
||
1E7D4000
|
unkown
|
page execute and read and write
|
||
64C000
|
heap
|
page read and write
|
||
26ED6B40000
|
trusted library section
|
page readonly
|
||
B6EE000
|
stack
|
page read and write
|
||
1E7B9000
|
unkown
|
page execute and read and write
|
||
9F6D000
|
stack
|
page read and write
|
||
2081000
|
heap
|
page read and write
|
||
1DD4000
|
heap
|
page read and write
|
||
2981000
|
heap
|
page read and write
|
||
1582000
|
heap
|
page read and write
|
||
3121000
|
heap
|
page read and write
|
||
86F000
|
heap
|
page read and write
|
||
21D1000
|
heap
|
page read and write
|
||
6FAE000
|
stack
|
page read and write
|
||
73B3A000
|
unkown
|
page execute and read and write
|
||
3478000
|
heap
|
page read and write
|
||
27C50F02000
|
heap
|
page read and write
|
||
690000
|
heap
|
page read and write
|
||
343C000
|
heap
|
page read and write
|
||
2961000
|
heap
|
page read and write
|
||
2F57000
|
heap
|
page read and write
|
||
266E000
|
stack
|
page read and write
|
||
1DD9000
|
heap
|
page read and write
|
||
6D0B0000
|
unkown
|
page execute and read and write
|
||
2A22000
|
heap
|
page read and write
|
||
B30000
|
direct allocation
|
page execute and read and write
|
||
34B1000
|
heap
|
page read and write
|
||
E50000
|
heap
|
page read and write
|
||
373F000
|
heap
|
page read and write
|
||
2FB7000
|
heap
|
page read and write
|
||
92F000
|
stack
|
page read and write
|
||
33CF000
|
heap
|
page read and write
|
||
6F9000
|
stack
|
page read and write
|
||
B5AE000
|
stack
|
page read and write
|
||
26ED63E1000
|
trusted library allocation
|
page read and write
|
||
23AD000
|
heap
|
page read and write
|
||
5BEE000
|
stack
|
page read and write
|
||
7F1000
|
heap
|
page read and write
|
||
B36E000
|
stack
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
1E49000
|
heap
|
page read and write
|
||
1597000
|
heap
|
page read and write
|
||
6CE2E000
|
unkown
|
page execute and read and write
|
||
F77E000
|
stack
|
page read and write
|
||
2E60000
|
direct allocation
|
page execute and read and write
|
||
3979000
|
heap
|
page read and write
|
||
316A000
|
heap
|
page read and write
|
||
8DE000
|
heap
|
page read and write
|
||
1C3FA424000
|
heap
|
page read and write
|
||
5651D7E000
|
unkown
|
page readonly
|
||
186C000
|
stack
|
page read and write
|
||
6CB8D000
|
unkown
|
page execute and read and write
|
||
9AF000
|
unkown
|
page execute and read and write
|
||
39E000
|
stack
|
page read and write
|
||
1C3FA48C000
|
heap
|
page read and write
|
||
1E7DD000
|
unkown
|
page read and write
|
||
6D094000
|
unkown
|
page execute and read and write
|
||
30F9000
|
heap
|
page read and write
|
||
316A000
|
heap
|
page read and write
|
||
24FA000
|
heap
|
page read and write
|
||
225B763F000
|
heap
|
page read and write
|
||
6C230000
|
unkown
|
page readonly
|
||
2FC1000
|
heap
|
page read and write
|
||
33CC000
|
heap
|
page read and write
|
||
170F000
|
stack
|
page read and write
|
||
35AF000
|
stack
|
page read and write
|
||
6C1CF000
|
unkown
|
page execute and read and write
|
||
881000
|
heap
|
page read and write
|
||
751000
|
heap
|
page read and write
|
||
F53E000
|
stack
|
page read and write
|
||
1DD4000
|
heap
|
page read and write
|
||
23A4000
|
unkown
|
page execute and read and write
|
||
3849000
|
heap
|
page read and write
|
||
74DF4000
|
unkown
|
page execute and read and write
|
||
2970000
|
heap
|
page read and write
|
||
804000
|
heap
|
page read and write
|
||
2F9000
|
unkown
|
page read and write
|
||
2AF4000
|
heap
|
page read and write
|
||
1DE1000
|
heap
|
page read and write
|
||
3881000
|
heap
|
page read and write
|
||
2E82000
|
heap
|
page read and write
|
||
EEDC1FE000
|
unkown
|
page readonly
|
||
2748000
|
heap
|
page read and write
|
||
D6F000
|
stack
|
page read and write
|
||
122EF000
|
heap
|
page read and write
|
||
1DD1000
|
heap
|
page read and write
|
||
1519000
|
heap
|
page read and write
|
||
74E000
|
heap
|
page read and write
|
||
1DD4000
|
heap
|
page read and write
|
||
26EDB25B000
|
heap
|
page read and write
|
||
345C000
|
heap
|
page read and write
|
||
1997C510000
|
heap
|
page read and write
|
||
2AB1000
|
heap
|
page read and write
|
||
1DE6000
|
heap
|
page read and write
|
||
21E1000
|
heap
|
page read and write
|
||
122DE000
|
heap
|
page read and write
|
||
30F1000
|
heap
|
page read and write
|
||
26ED000
|
heap
|
page read and write
|
||
2B67000
|
heap
|
page read and write
|
||
1997C6A0000
|
trusted library allocation
|
page read and write
|
||
6CE11000
|
unkown
|
page execute and read and write
|
||
3009000
|
heap
|
page read and write
|
||
398E000
|
heap
|
page read and write
|
||
C5EE000
|
stack
|
page read and write
|
||
A70000
|
heap
|
page read and write
|
||
E9E000
|
unkown
|
page read and write
|
||
730000
|
heap
|
page read and write
|
||
1F08A451000
|
heap
|
page read and write
|
||
24D4000
|
heap
|
page read and write
|
||
2724000
|
heap
|
page read and write
|
||
1210000
|
heap
|
page read and write
|
||
EFF000
|
stack
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
8B2E000
|
stack
|
page read and write
|
||
FCC000
|
stack
|
page read and write
|
||
6C316000
|
unkown
|
page execute and read and write
|
||
337A000
|
heap
|
page read and write
|
||
1F08A465000
|
heap
|
page read and write
|
||
26ED5C13000
|
heap
|
page read and write
|
||
1DD9000
|
heap
|
page read and write
|
||
184E000
|
stack
|
page read and write
|
||
2D5D000
|
heap
|
page read and write
|
||
1F08A466000
|
heap
|
page read and write
|
||
2C6E000
|
heap
|
page read and write
|
||
2B5F000
|
heap
|
page read and write
|
||
38E0000
|
heap
|
page read and write
|
||
96AE000
|
stack
|
page read and write
|
||
883000
|
heap
|
page read and write
|
||
8B2000
|
heap
|
page read and write
|
||
890000
|
heap
|
page read and write
|
||
1E7AD000
|
unkown
|
page execute and read and write
|
||
1369000
|
trusted library allocation
|
page read and write
|
||
2C5F000
|
heap
|
page read and write
|
||
27CD2637000
|
heap
|
page read and write
|
||
2EC000
|
unkown
|
page read and write
|
||
2546000
|
heap
|
page read and write
|
||
2CD4000
|
heap
|
page read and write
|
||
394E000
|
heap
|
page read and write
|
||
38D6000
|
heap
|
page read and write
|
||
398C000
|
heap
|
page read and write
|
||
13CE000
|
stack
|
page read and write
|
||
2FCA000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
3253000
|
heap
|
page read and write
|
||
752000
|
heap
|
page read and write
|
||
78AE000
|
stack
|
page read and write
|
||
C4EE000
|
stack
|
page read and write
|
||
4554B7E000
|
stack
|
page read and write
|
||
26DD000
|
stack
|
page read and write
|
||
832000
|
heap
|
page read and write
|
||
1997AC0D000
|
heap
|
page read and write
|
||
1C3FA402000
|
heap
|
page read and write
|
||
14EE000
|
stack
|
page read and write
|
||
9AC000
|
unkown
|
page execute and read and write
|
||
30F1000
|
heap
|
page read and write
|
||
2B58000
|
heap
|
page read and write
|
||
AF8FE7E000
|
unkown
|
page readonly
|
||
302A000
|
heap
|
page read and write
|
||
1DE0000
|
heap
|
page read and write
|
||
5651A76000
|
stack
|
page read and write
|
||
2BC8000
|
heap
|
page read and write
|
||
38D8000
|
heap
|
page read and write
|
||
34B1000
|
heap
|
page read and write
|
||
26EDB24E000
|
heap
|
page read and write
|
||
1418000
|
heap
|
page read and write
|
||
26FA000
|
heap
|
page read and write
|
||
26ED5B80000
|
heap
|
page read and write
|
||
30FC000
|
heap
|
page read and write
|
||
21E1000
|
unkown
|
page execute and read and write
|
||
3E2E000
|
stack
|
page read and write
|
||
1582000
|
heap
|
page read and write
|
||
1997ABE2000
|
heap
|
page read and write
|
||
21D1000
|
heap
|
page read and write
|
||
2AD0000
|
heap
|
page read and write
|
||
39B8000
|
heap
|
page read and write
|
||
34AE000
|
heap
|
page read and write
|
||
7E4000
|
unkown
|
page execute and write copy
|
||
2ABF000
|
heap
|
page read and write
|
||
2F2E000
|
stack
|
page read and write
|
||
271E000
|
stack
|
page read and write
|
||
A504B7E000
|
unkown
|
page readonly
|
||
9DF000
|
stack
|
page read and write
|
||
2F6E000
|
heap
|
page read and write
|
||
B5ED000
|
stack
|
page read and write
|
||
1E7C2000
|
unkown
|
page read and write
|
||
1F08A46D000
|
heap
|
page read and write
|
||
2768000
|
heap
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
87B000
|
heap
|
page read and write
|
||
26AB000
|
heap
|
page read and write
|
||
150000
|
heap
|
page read and write
|
||
6C20B000
|
unkown
|
page execute and read and write
|
||
CFEE000
|
stack
|
page read and write
|
||
1C3FA413000
|
heap
|
page read and write
|
||
6C650000
|
unkown
|
page execute and read and write
|
||
38D000
|
stack
|
page read and write
|
||
CAE000
|
stack
|
page read and write
|
||
1997C519000
|
heap
|
page read and write
|
||
316E000
|
stack
|
page read and write
|
||
63E000
|
unkown
|
page read and write
|
||
31E0000
|
heap
|
page read and write
|
||
816E000
|
stack
|
page read and write
|
||
8D2000
|
heap
|
page read and write
|
||
2A81000
|
heap
|
page read and write
|
||
366C000
|
heap
|
page read and write
|
||
31E8000
|
heap
|
page read and write
|
||
31D5000
|
heap
|
page read and write
|
||
2965000
|
heap
|
page read and write
|
||
EF6E000
|
stack
|
page read and write
|
||
2A23000
|
heap
|
page read and write
|
||
9FD000
|
stack
|
page read and write
|
||
1516000
|
heap
|
page read and write
|
||
73A84000
|
unkown
|
page execute and read and write
|
||
12B8E000
|
stack
|
page read and write
|
||
EEDB97E000
|
stack
|
page read and write
|
||
1501000
|
heap
|
page read and write
|
||
97AE000
|
stack
|
page read and write
|
||
C3AE000
|
stack
|
page read and write
|
||
1598000
|
heap
|
page read and write
|
||
7C6E000
|
stack
|
page read and write
|
||
828000
|
heap
|
page read and write
|
||
6CB3B000
|
unkown
|
page execute and read and write
|
||
88A000
|
heap
|
page read and write
|
||
DEF000
|
stack
|
page read and write
|
||
225E000
|
stack
|
page read and write
|
||
1519000
|
heap
|
page read and write
|
||
2736000
|
heap
|
page read and write
|
||
6C745000
|
unkown
|
page execute and read and write
|
||
3715000
|
heap
|
page read and write
|
||
1997ABE0000
|
heap
|
page read and write
|
||
2597000
|
heap
|
page read and write
|
||
1E9B1000
|
unkown
|
page execute and read and write
|
||
6CAF4000
|
unkown
|
page execute and read and write
|
||
249F000
|
heap
|
page read and write
|
||
1997CC30000
|
trusted library allocation
|
page read and write
|
||
1DD2000
|
heap
|
page read and write
|
||
8C6E000
|
stack
|
page read and write
|
||
11E4E000
|
stack
|
page read and write
|
||
73B40000
|
unkown
|
page read and write
|
||
AF9037E000
|
unkown
|
page readonly
|
||
80B000
|
heap
|
page read and write
|
||
3A32000
|
heap
|
page read and write
|
||
43BE000
|
stack
|
page read and write
|
||
371A000
|
heap
|
page read and write
|
||
6C226000
|
unkown
|
page read and write
|
||
B72E000
|
stack
|
page read and write
|
||
3477000
|
heap
|
page read and write
|
||
26A8000
|
heap
|
page read and write
|
||
3356000
|
heap
|
page read and write
|
||
2610000
|
heap
|
page read and write
|
||
3E9000
|
unkown
|
page read and write
|
||
260A000
|
heap
|
page read and write
|
||
2FC0000
|
heap
|
page read and write
|
||
15CA000
|
heap
|
page read and write
|
||
68AE000
|
stack
|
page read and write
|
||
376F000
|
heap
|
page read and write
|
||
1EFD2969000
|
heap
|
page read and write
|
||
ECAE000
|
stack
|
page read and write
|
||
6CAA7000
|
unkown
|
page execute and read and write
|
||
21D1000
|
heap
|
page read and write
|
||
122A7000
|
heap
|
page read and write
|
||
6C54A000
|
unkown
|
page execute and read and write
|
||
1F08A400000
|
heap
|
page read and write
|
||
6D06C000
|
unkown
|
page execute and read and write
|
||
8A2E000
|
stack
|
page read and write
|
||
2621000
|
heap
|
page read and write
|
||
446E000
|
stack
|
page read and write
|
||
B7C000
|
heap
|
page read and write
|
||
2B62000
|
heap
|
page read and write
|
||
1997AC04000
|
heap
|
page read and write
|
||
2441000
|
heap
|
page read and write
|
||
26ED5D13000
|
heap
|
page read and write
|
||
30F1000
|
heap
|
page read and write
|
||
38A5000
|
heap
|
page read and write
|
||
F9FE000
|
stack
|
page read and write
|
||
342A000
|
heap
|
page read and write
|
||
225B7E02000
|
trusted library allocation
|
page read and write
|
||
6C886000
|
unkown
|
page execute and read and write
|
||
47EE000
|
stack
|
page read and write
|
||
26EDB20B000
|
heap
|
page read and write
|
||
FDBE000
|
stack
|
page read and write
|
||
2FB9000
|
heap
|
page read and write
|
||
26EDB420000
|
trusted library allocation
|
page read and write
|
||
2D5000
|
stack
|
page read and write
|
||
1424000
|
heap
|
page read and write
|
||
2A2C000
|
heap
|
page read and write
|
||
2FBC000
|
heap
|
page read and write
|
||
64AE000
|
stack
|
page read and write
|
||
31F4000
|
heap
|
page read and write
|
||
6CA75000
|
unkown
|
page execute and read and write
|
||
316E000
|
heap
|
page read and write
|
||
A50437E000
|
stack
|
page read and write
|
||
1120D000
|
stack
|
page read and write
|
||
1DE0000
|
heap
|
page read and write
|
||
2EA1000
|
heap
|
page read and write
|
||
6CCAB000
|
unkown
|
page execute and read and write
|
||
6D060000
|
unkown
|
page execute and read and write
|
||
586E000
|
stack
|
page read and write
|
||
340000
|
heap
|
page read and write
|
||
2D7A000
|
heap
|
page read and write
|
||
11A8E000
|
stack
|
page read and write
|
||
31D9000
|
heap
|
page read and write
|
||
2736000
|
heap
|
page read and write
|
||
15B2000
|
heap
|
page read and write
|
||
B55000
|
heap
|
page read and write
|
||
13CE000
|
stack
|
page read and write
|
||
21D1000
|
heap
|
page read and write
|
||
1380000
|
heap
|
page read and write
|
||
31D5000
|
heap
|
page read and write
|
||
88E000
|
stack
|
page read and write
|
||
3632000
|
heap
|
page read and write
|
||
884000
|
heap
|
page read and write
|
||
84C000
|
heap
|
page read and write
|
||
876000
|
heap
|
page read and write
|
||
C11000
|
heap
|
page read and write
|
||
29E7000
|
heap
|
page read and write
|
||
160E000
|
stack
|
page read and write
|
||
3AC6000
|
heap
|
page read and write
|
||
1332000
|
stack
|
page read and write
|
||
1997AC09000
|
heap
|
page read and write
|
||
D16E000
|
stack
|
page read and write
|
||
698000
|
heap
|
page read and write
|
||
23FA000
|
heap
|
page read and write
|
||
6C61A000
|
unkown
|
page execute and read and write
|
||
BAE000
|
stack
|
page read and write
|
||
EEDB7FE000
|
unkown
|
page readonly
|
||
21B0000
|
heap
|
page read and write
|
||
1010E000
|
stack
|
page read and write
|
||
302A000
|
heap
|
page read and write
|
||
3194000
|
heap
|
page read and write
|
||
8F1000
|
stack
|
page read and write
|
||
45554FD000
|
stack
|
page read and write
|
||
3CEE000
|
stack
|
page read and write
|
||
12210000
|
heap
|
page read and write
|
||
24EE000
|
stack
|
page read and write
|
||
390000
|
heap
|
page read and write
|
||
1DEA000
|
heap
|
page read and write
|
||
3960000
|
heap
|
page read and write
|
||
E02E000
|
stack
|
page read and write
|
||
2BA3000
|
heap
|
page read and write
|
||
26ED651A000
|
heap
|
page read and write
|
||
884000
|
heap
|
page read and write
|
||
32AE000
|
stack
|
page read and write
|
||
5651F7E000
|
unkown
|
page readonly
|
||
4A6E000
|
stack
|
page read and write
|
||
6CB47000
|
unkown
|
page execute and read and write
|
||
891000
|
heap
|
page read and write
|
||
EEDA9F7000
|
stack
|
page read and write
|
||
23B6000
|
heap
|
page read and write
|
||
EEDB5FE000
|
unkown
|
page readonly
|
||
2FBA000
|
heap
|
page read and write
|
||
84E000
|
heap
|
page read and write
|
||
CC2E000
|
stack
|
page read and write
|
||
636E000
|
stack
|
page read and write
|
||
EEDBC7E000
|
stack
|
page read and write
|
||
6D0B0000
|
unkown
|
page execute and read and write
|
||
21D5000
|
heap
|
page read and write
|
||
EE2E000
|
stack
|
page read and write
|
||
183E000
|
stack
|
page read and write
|
||
6CBC0000
|
unkown
|
page readonly
|
||
6D092000
|
unkown
|
page execute and read and write
|
||
EEDAEFE000
|
unkown
|
page readonly
|
||
27C50F29000
|
heap
|
page read and write
|
||
E2AE000
|
stack
|
page read and write
|
||
151D000
|
heap
|
page read and write
|
||
45551FE000
|
unkown
|
page readonly
|
||
D7AE000
|
stack
|
page read and write
|
||
1997ABA7000
|
heap
|
page read and write
|
||
4B3C9FD000
|
stack
|
page read and write
|
||
1997ABE6000
|
heap
|
page read and write
|
||
1DD8000
|
heap
|
page read and write
|
||
6CCD0000
|
unkown
|
page readonly
|
||
2577000
|
unkown
|
page execute and read and write
|
||
391C000
|
heap
|
page read and write
|
||
3861000
|
heap
|
page read and write
|
||
26EDB241000
|
heap
|
page read and write
|
||
1F08A462000
|
heap
|
page read and write
|
||
26ED5C94000
|
heap
|
page read and write
|
||
342D000
|
stack
|
page read and write
|
||
41EE000
|
stack
|
page read and write
|
||
2FB3000
|
heap
|
page read and write
|
||
13D0000
|
heap
|
page read and write
|
||
916E000
|
stack
|
page read and write
|
||
A2EE000
|
stack
|
page read and write
|
||
86E000
|
heap
|
page read and write
|
||
6C60B000
|
unkown
|
page execute and read and write
|
||
6C327000
|
unkown
|
page execute and read and write
|
||
3724000
|
heap
|
page read and write
|
||
3954000
|
heap
|
page read and write
|
||
1010000
|
heap
|
page read and write
|
||
4E6E000
|
stack
|
page read and write
|
||
26EDB2F5000
|
heap
|
page read and write
|
||
1C3FA9A0000
|
trusted library allocation
|
page read and write
|
||
337D000
|
heap
|
page read and write
|
||
1C3FA41D000
|
heap
|
page read and write
|
||
151D000
|
heap
|
page read and write
|
||
82E000
|
heap
|
page read and write
|
||
30F7000
|
heap
|
page read and write
|
||
12D3000
|
unkown
|
page read and write
|
||
23AB000
|
heap
|
page read and write
|
||
6C5C4000
|
unkown
|
page execute and read and write
|
||
26ED5C89000
|
heap
|
page read and write
|
||
27C50F17000
|
heap
|
page read and write
|
||
1DD4000
|
heap
|
page read and write
|
||
17FE000
|
stack
|
page read and write
|
||
26ED5C5B000
|
heap
|
page read and write
|
||
2E05000
|
heap
|
page read and write
|
||
1684000
|
heap
|
page read and write
|
||
2FB5000
|
heap
|
page read and write
|
||
3271000
|
unkown
|
page execute and read and write
|
||
26B5000
|
heap
|
page read and write
|
||
207D000
|
stack
|
page read and write
|
||
84EE000
|
stack
|
page read and write
|
||
3233000
|
heap
|
page read and write
|
||
1F08A44B000
|
heap
|
page read and write
|
||
3159000
|
heap
|
page read and write
|
||
10008000
|
unkown
|
page execute and read and write
|
||
3276000
|
unkown
|
page execute and read and write
|
||
1335000
|
stack
|
page read and write
|
||
26EDB293000
|
heap
|
page read and write
|
||
7EED000
|
stack
|
page read and write
|
||
151D000
|
heap
|
page read and write
|
||
6D07B000
|
unkown
|
page execute and read and write
|
||
151A000
|
heap
|
page read and write
|
||
5E6E000
|
stack
|
page read and write
|
||
27CD2C02000
|
trusted library allocation
|
page read and write
|
||
1C3FA464000
|
heap
|
page read and write
|
||
3A36000
|
heap
|
page read and write
|
||
A82E000
|
stack
|
page read and write
|
||
596E000
|
stack
|
page read and write
|
||
4760000
|
heap
|
page read and write
|
||
26EDB31D000
|
heap
|
page read and write
|
||
982000
|
unkown
|
page execute and read and write
|
||
879000
|
heap
|
page read and write
|
||
79EE000
|
stack
|
page read and write
|
||
FFFE000
|
stack
|
page read and write
|
||
2FB5000
|
heap
|
page read and write
|
||
3A15000
|
heap
|
page read and write
|
||
38CE000
|
heap
|
page read and write
|
||
398D000
|
heap
|
page read and write
|
||
6D0B0000
|
unkown
|
page execute and read and write
|
||
1DC000
|
stack
|
page read and write
|
||
3260000
|
heap
|
page read and write
|
||
3906000
|
heap
|
page read and write
|
||
FC1000
|
stack
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
26EDB140000
|
trusted library allocation
|
page read and write
|
||
2EE9000
|
heap
|
page read and write
|
||
CDAE000
|
stack
|
page read and write
|
||
74DF4000
|
unkown
|
page execute and read and write
|
||
C0D000
|
heap
|
page read and write
|
||
1DD1000
|
heap
|
page read and write
|
||
6D0A6000
|
unkown
|
page execute and read and write
|
||
427E000
|
stack
|
page read and write
|
||
1068E000
|
stack
|
page read and write
|
||
302A000
|
heap
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
2F48000
|
heap
|
page read and write
|
||
382A000
|
heap
|
page read and write
|
||
3251000
|
unkown
|
page execute and read and write
|
||
6C1BF000
|
unkown
|
page execute and read and write
|
||
CB2E000
|
stack
|
page read and write
|
||
1E7DD000
|
unkown
|
page read and write
|
||
3A07000
|
heap
|
page read and write
|
||
1DDF000
|
stack
|
page read and write
|
||
25FB000
|
heap
|
page read and write
|
||
2BF1000
|
heap
|
page read and write
|
||
A5041FE000
|
stack
|
page read and write
|
||
313D000
|
heap
|
page read and write
|
||
2FB9000
|
heap
|
page read and write
|
||
827000
|
heap
|
page read and write
|
||
36B5000
|
heap
|
page read and write
|
||
260A000
|
heap
|
page read and write
|
||
1DD7000
|
heap
|
page read and write
|
||
AEE000
|
stack
|
page read and write
|
||
16D000
|
stack
|
page read and write
|
||
34AE000
|
stack
|
page read and write
|
||
36D0000
|
heap
|
page read and write
|
||
2F53000
|
heap
|
page read and write
|
||
21D5000
|
heap
|
page read and write
|
||
26ED655A000
|
heap
|
page read and write
|
||
82C000
|
heap
|
page read and write
|
||
6C5FC000
|
unkown
|
page execute and read and write
|
||
3995000
|
heap
|
page read and write
|
||
4554FFE000
|
unkown
|
page readonly
|
||
122F3000
|
heap
|
page read and write
|
||
22D5000
|
heap
|
page read and write
|
||
27C50DA0000
|
heap
|
page read and write
|
||
44FE000
|
stack
|
page read and write
|
||
A1AE000
|
stack
|
page read and write
|
||
3127000
|
heap
|
page read and write
|
||
74DE1000
|
unkown
|
page execute and read and write
|
||
8B0000
|
heap
|
page read and write
|
||
1DD3000
|
heap
|
page read and write
|
||
73A82000
|
unkown
|
page execute and read and write
|
||
3100000
|
heap
|
page read and write
|
||
241E000
|
heap
|
page read and write
|
||
230E000
|
heap
|
page read and write
|
||
134D000
|
stack
|
page read and write
|
||
1396000
|
heap
|
page read and write
|
||
31A4000
|
heap
|
page read and write
|
||
24D3000
|
heap
|
page read and write
|
||
1C3FAA00000
|
heap
|
page read and write
|
||
C12000
|
heap
|
page read and write
|
||
6CB4A000
|
unkown
|
page execute and read and write
|
||
F06E000
|
stack
|
page read and write
|
||
122E2000
|
heap
|
page read and write
|
||
D4EE000
|
stack
|
page read and write
|
||
1DF5000
|
heap
|
page read and write
|
||
3D0000
|
unkown
|
page readonly
|
||
5D9000
|
stack
|
page read and write
|
||
C69B4FE000
|
stack
|
page read and write
|
||
387C000
|
heap
|
page read and write
|
||
302A000
|
heap
|
page read and write
|
||
1F08A3F0000
|
heap
|
page read and write
|
||
3A6E000
|
stack
|
page read and write
|
||
33F5000
|
heap
|
page read and write
|
||
3E9000
|
unkown
|
page read and write
|
||
97EE000
|
stack
|
page read and write
|
||
F67E000
|
stack
|
page read and write
|
||
24B4000
|
heap
|
page read and write
|
||
122C5000
|
heap
|
page read and write
|
||
3110000
|
heap
|
page read and write
|
||
2AEA000
|
heap
|
page read and write
|
||
82C000
|
heap
|
page read and write
|
||
3293000
|
heap
|
page read and write
|
||
6C796000
|
unkown
|
page read and write
|
||
2C38000
|
heap
|
page read and write
|
||
1000B000
|
unkown
|
page execute and write copy
|
||
273C000
|
heap
|
page read and write
|
||
726E000
|
stack
|
page read and write
|
||
2E15000
|
heap
|
page read and write
|
||
D62E000
|
stack
|
page read and write
|
||
6C320000
|
unkown
|
page execute and read and write
|
||
6D6E000
|
stack
|
page read and write
|
||
2FB8000
|
heap
|
page read and write
|
||
317F000
|
stack
|
page read and write
|
||
F20000
|
heap
|
page read and write
|
||
6D0AB000
|
unkown
|
page execute and read and write
|
||
6CE1B000
|
unkown
|
page execute and read and write
|
||
31C7000
|
heap
|
page read and write
|
||
3105000
|
heap
|
page read and write
|
||
1517000
|
heap
|
page read and write
|
||
2FC2000
|
heap
|
page read and write
|
||
1677000
|
heap
|
page read and write
|
||
3856000
|
heap
|
page read and write
|
||
260A000
|
heap
|
page read and write
|
||
1997ABDC000
|
heap
|
page read and write
|
||
2DEE000
|
stack
|
page read and write
|
||
21D4000
|
heap
|
page read and write
|
||
3FFE000
|
stack
|
page read and write
|
||
6CE11000
|
unkown
|
page execute and read and write
|
||
88F000
|
heap
|
page read and write
|
||
1E8D7000
|
unkown
|
page execute and read and write
|
||
D70000
|
heap
|
page read and write
|
||
1EFD4680000
|
heap
|
page read and write
|
||
381B000
|
heap
|
page read and write
|
||
2190000
|
heap
|
page read and write
|
||
26EDB480000
|
trusted library allocation
|
page read and write
|
||
2800000
|
heap
|
page read and write
|
||
8862BBE000
|
stack
|
page read and write
|
||
2BE2000
|
heap
|
page read and write
|
||
B9AE000
|
stack
|
page read and write
|
||
27C50DF0000
|
trusted library allocation
|
page read and write
|
||
6D0B9000
|
unkown
|
page execute and read and write
|
||
26ED5C00000
|
heap
|
page read and write
|
||
3983000
|
heap
|
page read and write
|
||
A1EE000
|
stack
|
page read and write
|
||
15C7000
|
heap
|
page read and write
|
||
2FB3000
|
heap
|
page read and write
|
||
2580000
|
heap
|
page read and write
|
||
866E000
|
stack
|
page read and write
|
||
21E0000
|
heap
|
page read and write
|
||
EBAE000
|
stack
|
page read and write
|
||
496E000
|
stack
|
page read and write
|
||
DA2E000
|
stack
|
page read and write
|
||
B82E000
|
stack
|
page read and write
|
||
26EDB490000
|
trusted library allocation
|
page read and write
|
||
1AA4000
|
heap
|
page read and write
|
||
2B5D000
|
stack
|
page read and write
|
||
1080E000
|
stack
|
page read and write
|
||
6D0E7000
|
unkown
|
page read and write
|
||
9B6E000
|
stack
|
page read and write
|
||
1F08A493000
|
heap
|
page read and write
|
||
31EE000
|
heap
|
page read and write
|
||
6C59E000
|
unkown
|
page execute and read and write
|
||
106CE000
|
stack
|
page read and write
|
||
24FE000
|
heap
|
page read and write
|
||
30F1000
|
heap
|
page read and write
|
||
122EB000
|
heap
|
page read and write
|
||
2217000
|
heap
|
page read and write
|
||
5D2D000
|
stack
|
page read and write
|
||
6D089000
|
unkown
|
page execute and read and write
|
||
330F000
|
stack
|
page read and write
|
||
334D000
|
heap
|
page read and write
|
||
2B82000
|
heap
|
page read and write
|
||
1C3FAA15000
|
heap
|
page read and write
|
||
330000
|
heap
|
page read and write
|
||
C67000
|
heap
|
page read and write
|
||
FB7D000
|
stack
|
page read and write
|
||
10BCE000
|
stack
|
page read and write
|
||
1516000
|
heap
|
page read and write
|
||
2CB3000
|
heap
|
page read and write
|
||
1F08A493000
|
heap
|
page read and write
|
||
26ED5C3F000
|
heap
|
page read and write
|
||
890000
|
heap
|
page read and write
|
||
21D7000
|
heap
|
page read and write
|
||
EF2E000
|
stack
|
page read and write
|
||
6C3AF000
|
unkown
|
page execute and write copy
|
||
3290000
|
heap
|
page read and write
|
||
432E000
|
stack
|
page read and write
|
||
F8BE000
|
stack
|
page read and write
|
||
3A0000
|
heap
|
page read and write
|
||
2819000
|
heap
|
page read and write
|
||
225B762B000
|
heap
|
page read and write
|
||
34B8000
|
heap
|
page read and write
|
||
1E8D7000
|
unkown
|
page execute and read and write
|
||
3680000
|
heap
|
page read and write
|
||
2EFF000
|
heap
|
page read and write
|
||
67E000
|
stack
|
page read and write
|
||
21D1000
|
heap
|
page read and write
|
||
2C4D000
|
heap
|
page read and write
|
||
2A5B000
|
heap
|
page read and write
|
||
3115000
|
heap
|
page read and write
|
||
22F5000
|
heap
|
page read and write
|
||
21D1000
|
heap
|
page read and write
|
||
193F000
|
stack
|
page read and write
|
||
26EDB326000
|
heap
|
page read and write
|
||
6C8E1000
|
unkown
|
page execute and read and write
|
||
1E3C000
|
heap
|
page read and write
|
||
1130E000
|
stack
|
page read and write
|
||
46EE000
|
stack
|
page read and write
|
||
AF9017B000
|
stack
|
page read and write
|
||
2D7F000
|
heap
|
page read and write
|
||
88C000
|
heap
|
page read and write
|
||
2591000
|
heap
|
page read and write
|
||
1E9BC000
|
unkown
|
page read and write
|
||
27CD2BA0000
|
trusted library allocation
|
page read and write
|
||
2F78000
|
heap
|
page read and write
|
There are 2949 hidden memdumps, click here to show them.