Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\00440746450577075373182215
|
SQLite 3.x database, last written using SQLite version 3034000, page size 2048, file counter 6, database pages 53, cookie
0x22, schema 4, UTF-8, version-valid-for 6
|
dropped
|
||
C:\ProgramData\05817041688375942296226764
|
SQLite 3.x database, last written using SQLite version 3041002, file counter 9, database pages 43, 1st free page 42, free
pages 2, cookie 0x3f, schema 4, UTF-8, version-valid-for 9
|
dropped
|
||
C:\ProgramData\22428703343438507335441715
|
SQLite 3.x database, user version 12, last written using SQLite version 3037002, page size 32768, writer version 2, read version
2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
|
dropped
|
||
C:\ProgramData\22428703343438507335441715-shm
|
data
|
dropped
|
||
C:\ProgramData\30562671907380543272507388
|
SQLite 3.x database, last written using SQLite version 3041002, file counter 9, database pages 43, 1st free page 42, free
pages 2, cookie 0x3f, schema 4, UTF-8, version-valid-for 9
|
dropped
|
||
C:\ProgramData\35746121865178509047716708
|
SQLite 3.x database, last written using SQLite version 3034000, page size 2048, file counter 2, database pages 23, cookie
0xd, schema 4, UTF-8, version-valid-for 2
|
dropped
|
||
C:\ProgramData\37707990510604932654966133
|
SQLite 3.x database, last written using SQLite version 3041002, page size 2048, file counter 7, database pages 57, cookie
0x30, schema 4, UTF-8, version-valid-for 7
|
dropped
|
||
C:\ProgramData\38345013959471306846242542
|
SQLite 3.x database, last written using SQLite version 3034000, file counter 5, database pages 29, cookie 0x16, schema 4,
UTF-8, version-valid-for 5
|
dropped
|
||
C:\ProgramData\41854390081158473842695081
|
SQLite 3.x database, last written using SQLite version 3041002, page size 2048, file counter 2, database pages 25, cookie
0x10, schema 4, UTF-8, version-valid-for 2
|
dropped
|
||
C:\ProgramData\52766014303501464703169876
|
SQLite 3.x database, last written using SQLite version 3034000, file counter 11, database pages 8, 1st free page 8, free pages
1, cookie 0x4, schema 4, UTF-8, version-valid-for 11
|
dropped
|
||
C:\ProgramData\59242670612831660624168672
|
SQLite 3.x database, last written using SQLite version 3034000, page size 2048, file counter 6, database pages 53, cookie
0x22, schema 4, UTF-8, version-valid-for 6
|
dropped
|
||
C:\ProgramData\60379239670748708072323449
|
SQLite 3.x database, last written using SQLite version 3041002, page size 2048, file counter 7, database pages 57, cookie
0x30, schema 4, UTF-8, version-valid-for 7
|
dropped
|
||
C:\ProgramData\77364074545019038892817732
|
SQLite 3.x database, user version 74, last written using SQLite version 3041002, page size 32768, writer version 2, read version
2, file counter 3, database pages 52, 1st free page 43, free pages 8, cookie 0x3c, schema 4, UTF-8, version-valid-for 3
|
dropped
|
||
C:\ProgramData\77364074545019038892817732-shm
|
data
|
dropped
|
||
C:\ProgramData\93702365600485792059963927
|
SQLite 3.x database, last written using SQLite version 3034000, file counter 5, database pages 29, cookie 0x16, schema 4,
UTF-8, version-valid-for 5
|
dropped
|
||
C:\ProgramData\98279768849475661070206458
|
SQLite 3.x database, last written using SQLite version 3041002, file counter 14, database pages 22, 1st free page 6, free
pages 8, cookie 0x8, schema 4, UTF-8, version-valid-for 14
|
dropped
|
||
C:\ProgramData\freebl3.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\mozglue.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\msvcp140.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\nss3.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\softokn3.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\vcruntime140.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
There are 13 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
C:\Users\user\Desktop\file.exe
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://t.me/
|
unknown
|
||
https://t.me/vogogorx
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://t.me/vogogorv
|
unknown
|
||
http://195.201.254.123:6012/Mu
|
unknown
|
||
http://195.201.254.123:6012/sCodecs.dlls
|
unknown
|
||
http://195.201.254.123:6012/sp1.zip
|
195.201.254.123
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://www.google.com/chrome/thank-you.html?statcb=1&installdataindex=empty&defaultbrowser=0
|
unknown
|
||
http://195.201.254.123:6012/0
|
unknown
|
||
https://www.autoitscript.com/files/autoit3/autoit-v3-setup.zipQ
|
unknown
|
||
https://sdlc-esd.oracle.com/ESD6/JSCDL/jdk/8u321-b07/df5ad55fdd604472a86a45a217032c7d/jre-8u321-wind
|
unknown
|
||
https://t.me/vogogorracvotsp1.zipMozilla/5.0
|
unknown
|
||
https://www.google.com/chrome/
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://t.me/vogogorL
|
unknown
|
||
https://www.google.com/sorry/index?continue=https://www.google.com/search%3Fq%3Dmicrosoft%26oq%3Dmic
|
unknown
|
||
https://www.google.com/search?q=test&oq=test&aqs=chrome..69i57j0i131i433i512j0i512j0i131i433i512l2j0
|
unknown
|
||
https://stubdownloader.services.mozilla.com/?attribution_code=c291cmNlPXd3dy5nb29nbGUuY29tJm1lZGl1bT
|
unknown
|
||
https://steamcommunity.com/profiles/76561199545993403update.zip
|
unknown
|
||
https://www.google.com/https://www.google.com/chrome/Thu
|
unknown
|
||
https://www.google.com/search?q=microsoft&oq=microsoft&gs_lcrp=EgZjaHJvbWUqEAgAEAAYgwEY4wIYsQMYgAQyE
|
unknown
|
||
http://www.sqlite.org/copyright.html.
|
unknown
|
||
http://195.201.254.123:6012/b2ced91faf30889899f34458f95b8e93
|
195.201.254.123
|
||
https://www.google.com/search?q=microsoft&sourceid=chrome&ie=UTF-8microsoft
|
unknown
|
||
http://195.201.254.123:6012/b2ced91faf30889899f34458f95b8e93k
|
unknown
|
||
http://www.mozilla.com/en-US/blocklist/
|
unknown
|
||
https://aka.ms/vs/17/release/vc_redist.x64.exeD
|
unknown
|
||
https://mozilla.org0/
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://steamcommunity.com/profiles/76561199545993403
|
|||
https://javadl.oracle.com/webapps/download/AutoDL?BundleId=245807_df5ad55fdd604472a86a45a217032c7dM
|
unknown
|
||
http://195.201.254.123:6012/sp1.zipn)
|
unknown
|
||
http://195.201.254.123:6012/
|
195.201.254.123
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
https://www.autoitscript.com/cgi-bin/getfile.pl?autoit3/autoit-v3-setup.zip
|
unknown
|
||
https://www.google.com/search?q=test&sourceid=chrome&ie=UTF-8test
|
unknown
|
||
http://195.201.254.123:6012/m
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://dl.google.com/tag/s/appguid%3D%7B8A69D345-D564-463C-AFF1-A69D9E530F96%7D%26iid%3D%7B27E81B29
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://support.mozilla.org/products/firefox
|
unknown
|
||
https://www.google.com/chrome/thank-you.html?statcb=1&installdataindex=empty&defaultbrowser=0Google
|
unknown
|
||
https://www.google.com/favicon.ico
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://www.autoitscript.com/site/autoit/downloads/
|
unknown
|
||
https://www.google.com/chrome/Google
|
unknown
|
||
https://t.me/vogogor
|
149.154.167.99
|
||
https://www.autoitscript.com/site/autoit/downloads/https://www.autoitscript.com/site/Sun
|
unknown
|
||
https://www.google.com/sorry/index?continue=https://www.google.com/search%3Fq%3Dtest%26oq%3Dtest%26a
|
unknown
|
||
https://support.mozilla.org
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://www.google.com/search?q=microsoft&sourceid=chrome&ie=UTF-8microsoftt
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.allizom.troppus.
|
unknown
|
||
https://cdn.stubdownloader.services.mozilla.com/builds/firefox-stub/en-US/win/4b14f052f39ceffb32abd8
|
unknown
|
There are 46 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
t.me
|
149.154.167.99
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
149.154.167.99
|
t.me
|
United Kingdom
|
||
195.201.254.123
|
unknown
|
Germany
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
4100000
|
direct allocation
|
page execute and read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
4160000
|
direct allocation
|
page read and write
|
||
4886000
|
heap
|
page read and write
|
||
4478000
|
heap
|
page read and write
|
||
11271000
|
heap
|
page read and write
|
||
4337000
|
heap
|
page read and write
|
||
49FF000
|
heap
|
page read and write
|
||
1AABE750000
|
heap
|
page read and write
|
||
48BD000
|
heap
|
page read and write
|
||
4977000
|
heap
|
page read and write
|
||
12DA35C0000
|
heap
|
page read and write
|
||
12DA3F4D000
|
heap
|
page read and write
|
||
12DA3F6F000
|
heap
|
page read and write
|
||
476F000
|
heap
|
page read and write
|
||
43D2000
|
heap
|
page read and write
|
||
2517000
|
heap
|
page read and write
|
||
252EFA000
|
stack
|
page read and write
|
||
4986000
|
heap
|
page read and write
|
||
12DA3F7A000
|
heap
|
page read and write
|
||
48A2000
|
heap
|
page read and write
|
||
12DA3F40000
|
heap
|
page read and write
|
||
12DA3E15000
|
heap
|
page read and write
|
||
4B38000
|
heap
|
page read and write
|
||
1AABF280000
|
heap
|
page read and write
|
||
4840000
|
heap
|
page read and write
|
||
4606000
|
heap
|
page read and write
|
||
56BF000
|
stack
|
page read and write
|
||
472D000
|
heap
|
page read and write
|
||
11042000
|
heap
|
page read and write
|
||
49AA000
|
heap
|
page read and write
|
||
12DA3F59000
|
heap
|
page read and write
|
||
12DA3F70000
|
heap
|
page read and write
|
||
1AABF241000
|
heap
|
page read and write
|
||
249E3497000
|
heap
|
page read and write
|
||
2CBF9FE000
|
stack
|
page read and write
|
||
47FA000
|
heap
|
page read and write
|
||
46C2000
|
heap
|
page read and write
|
||
4983000
|
heap
|
page read and write
|
||
4A03000
|
heap
|
page read and write
|
||
10EAD000
|
heap
|
page read and write
|
||
47BC000
|
heap
|
page read and write
|
||
1AABE83F000
|
heap
|
page read and write
|
||
4822000
|
heap
|
page read and write
|
||
46A5000
|
heap
|
page read and write
|
||
45CD000
|
heap
|
page read and write
|
||
4648000
|
heap
|
page read and write
|
||
44CD000
|
heap
|
page read and write
|
||
4B7A000
|
heap
|
page read and write
|
||
163372D6000
|
heap
|
page read and write
|
||
447B000
|
heap
|
page read and write
|
||
10A3F000
|
heap
|
page read and write
|
||
12DA3F59000
|
heap
|
page read and write
|
||
25DB000
|
heap
|
page read and write
|
||
1AABE853000
|
heap
|
page read and write
|
||
61EB4000
|
direct allocation
|
page read and write
|
||
48DD000
|
heap
|
page read and write
|
||
1AABF265000
|
heap
|
page read and write
|
||
1D304D00000
|
heap
|
page read and write
|
||
12DA4668000
|
heap
|
page read and write
|
||
5BBD000
|
stack
|
page read and write
|
||
2551000
|
heap
|
page read and write
|
||
4507000
|
heap
|
page read and write
|
||
4AA1000
|
heap
|
page read and write
|
||
10EA0000
|
heap
|
page read and write
|
||
4B97000
|
heap
|
page read and write
|
||
45BC000
|
heap
|
page read and write
|
||
163372B0000
|
heap
|
page read and write
|
||
12DA36E0000
|
heap
|
page read and write
|
||
4873000
|
heap
|
page read and write
|
||
1AABE8A0000
|
heap
|
page read and write
|
||
49BD000
|
heap
|
page read and write
|
||
4835000
|
heap
|
page read and write
|
||
48E8000
|
heap
|
page read and write
|
||
12DA369B000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
48D2000
|
heap
|
page read and write
|
||
48AA000
|
heap
|
page read and write
|
||
1AABF293000
|
heap
|
page read and write
|
||
462D000
|
heap
|
page read and write
|
||
10EB1000
|
heap
|
page read and write
|
||
1AABE8A0000
|
heap
|
page read and write
|
||
45DC000
|
heap
|
page read and write
|
||
1AABF283000
|
heap
|
page read and write
|
||
10EBB000
|
heap
|
page read and write
|
||
1AABF293000
|
heap
|
page read and write
|
||
4593000
|
heap
|
page read and write
|
||
2CBF97F000
|
stack
|
page read and write
|
||
4351000
|
heap
|
page read and write
|
||
11A9F000
|
heap
|
page read and write
|
||
4538000
|
heap
|
page read and write
|
||
16337B03000
|
heap
|
page read and write
|
||
1AABF5DC000
|
heap
|
page read and write
|
||
43F6000
|
heap
|
page read and write
|
||
58632FF000
|
stack
|
page read and write
|
||
4707000
|
heap
|
page read and write
|
||
46D9000
|
heap
|
page read and write
|
||
249E3400000
|
heap
|
page read and write
|
||
4B34000
|
heap
|
page read and write
|
||
4944000
|
heap
|
page read and write
|
||
4A8B000
|
heap
|
page read and write
|
||
467000
|
unkown
|
page execute and read and write
|
||
16337298000
|
heap
|
page read and write
|
||
1AABE81E000
|
heap
|
page read and write
|
||
4767000
|
heap
|
page read and write
|
||
1AABF47B000
|
heap
|
page read and write
|
||
4687000
|
heap
|
page read and write
|
||
1D3066B0000
|
remote allocation
|
page read and write
|
||
12DA372B000
|
heap
|
page read and write
|
||
44C9000
|
heap
|
page read and write
|
||
10EB7000
|
heap
|
page read and write
|
||
45C4000
|
heap
|
page read and write
|
||
4948000
|
heap
|
page read and write
|
||
25A2000
|
heap
|
page read and write
|
||
1AABF2A5000
|
heap
|
page read and write
|
||
491B000
|
heap
|
page read and write
|
||
49F4000
|
heap
|
page read and write
|
||
1AABE864000
|
heap
|
page read and write
|
||
45FE000
|
heap
|
page read and write
|
||
1AABF27D000
|
heap
|
page read and write
|
||
4529000
|
heap
|
page read and write
|
||
1AABF294000
|
heap
|
page read and write
|
||
469A000
|
heap
|
page read and write
|
||
1AABE806000
|
heap
|
page read and write
|
||
47E4000
|
heap
|
page read and write
|
||
1AABE853000
|
heap
|
page read and write
|
||
24EE000
|
stack
|
page read and write
|
||
475C000
|
heap
|
page read and write
|
||
10EAF000
|
heap
|
page read and write
|
||
10FA0000
|
trusted library allocation
|
page read and write
|
||
49B9000
|
heap
|
page read and write
|
||
4EB2A7D000
|
stack
|
page read and write
|
||
25AA000
|
heap
|
page read and write
|
||
1AABF470000
|
heap
|
page read and write
|
||
4A0E000
|
heap
|
page read and write
|
||
1AABF26A000
|
heap
|
page read and write
|
||
4AEB000
|
heap
|
page read and write
|
||
16337B02000
|
heap
|
page read and write
|
||
1AABE9B0000
|
heap
|
page read and write
|
||
49FB000
|
heap
|
page read and write
|
||
4B67000
|
heap
|
page read and write
|
||
1AABE863000
|
heap
|
page read and write
|
||
12DA3F37000
|
heap
|
page read and write
|
||
12DA4661000
|
heap
|
page read and write
|
||
488A000
|
heap
|
page read and write
|
||
1AABE853000
|
heap
|
page read and write
|
||
4868000
|
heap
|
page read and write
|
||
45FA000
|
heap
|
page read and write
|
||
12DA3F5B000
|
heap
|
page read and write
|
||
1AABF27A000
|
heap
|
page read and write
|
||
249E3432000
|
heap
|
page read and write
|
||
4965000
|
heap
|
page read and write
|
||
12DA3F52000
|
heap
|
page read and write
|
||
249E3C02000
|
trusted library allocation
|
page read and write
|
||
4B3C000
|
heap
|
page read and write
|
||
48AE000
|
heap
|
page read and write
|
||
44E3000
|
heap
|
page read and write
|
||
10E99000
|
heap
|
page read and write
|
||
471A000
|
heap
|
page read and write
|
||
4917000
|
heap
|
page read and write
|
||
1AABF473000
|
heap
|
page read and write
|
||
1AABF293000
|
heap
|
page read and write
|
||
491F000
|
heap
|
page read and write
|
||
12DA36AC000
|
heap
|
page read and write
|
||
460F000
|
heap
|
page read and write
|
||
12DA3F79000
|
heap
|
page read and write
|
||
461B000
|
heap
|
page read and write
|
||
4EB267D000
|
stack
|
page read and write
|
||
45F7000
|
heap
|
page read and write
|
||
12DA3F80000
|
heap
|
page read and write
|
||
4376000
|
heap
|
page read and write
|
||
419E000
|
stack
|
page read and write
|
||
463C000
|
heap
|
page read and write
|
||
1AABF262000
|
heap
|
page read and write
|
||
5BF0000
|
remote allocation
|
page read and write
|
||
487E000
|
heap
|
page read and write
|
||
12DA367C000
|
heap
|
page read and write
|
||
46F3000
|
heap
|
page read and write
|
||
12DA3F56000
|
heap
|
page read and write
|
||
474D000
|
heap
|
page read and write
|
||
469E000
|
heap
|
page read and write
|
||
44F2000
|
heap
|
page read and write
|
||
10E99000
|
heap
|
page read and write
|
||
249E3431000
|
heap
|
page read and write
|
||
45D1000
|
heap
|
page read and write
|
||
45C0000
|
heap
|
page read and write
|
||
58634FE000
|
stack
|
page read and write
|
||
10E99000
|
heap
|
page read and write
|
||
1AABE7A0000
|
heap
|
page read and write
|
||
10EAC000
|
heap
|
page read and write
|
||
4626000
|
heap
|
page read and write
|
||
47A2000
|
heap
|
page read and write
|
||
483C000
|
heap
|
page read and write
|
||
482D000
|
heap
|
page read and write
|
||
1AABF28B000
|
heap
|
page read and write
|
||
16337B0A000
|
heap
|
page read and write
|
||
243D000
|
unkown
|
page readonly
|
||
439F000
|
heap
|
page read and write
|
||
1198E000
|
heap
|
page read and write
|
||
4602000
|
heap
|
page read and write
|
||
45A6000
|
heap
|
page read and write
|
||
449E000
|
heap
|
page read and write
|
||
46BC000
|
heap
|
page read and write
|
||
4755000
|
heap
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
1AABE83F000
|
heap
|
page read and write
|
||
1AABF2AD000
|
heap
|
page read and write
|
||
1AABF47A000
|
heap
|
page read and write
|
||
428E000
|
stack
|
page read and write
|
||
163372E2000
|
heap
|
page read and write
|
||
4AF6000
|
heap
|
page read and write
|
||
1AABE9C0000
|
heap
|
page read and write
|
||
2533FC000
|
stack
|
page read and write
|
||
4890000
|
heap
|
page read and write
|
||
46B0000
|
heap
|
page read and write
|
||
4970000
|
heap
|
page read and write
|
||
4390000
|
heap
|
page read and write
|
||
1AABF285000
|
heap
|
page read and write
|
||
1D304D13000
|
heap
|
page read and write
|
||
10E92000
|
heap
|
page read and write
|
||
1AABE825000
|
heap
|
page read and write
|
||
4A49000
|
heap
|
page read and write
|
||
4882000
|
heap
|
page read and write
|
||
1AABE88A000
|
heap
|
page read and write
|
||
2510000
|
heap
|
page read and write
|
||
254D000
|
heap
|
page read and write
|
||
1D304C00000
|
heap
|
page read and write
|
||
46FE000
|
heap
|
page read and write
|
||
2515000
|
heap
|
page read and write
|
||
61ECC000
|
direct allocation
|
page read and write
|
||
48B5000
|
heap
|
page read and write
|
||
12DA3F79000
|
heap
|
page read and write
|
||
2575000
|
heap
|
page read and write
|
||
43E9000
|
heap
|
page read and write
|
||
456F000
|
heap
|
page read and write
|
||
1633727D000
|
heap
|
page read and write
|
||
4968000
|
heap
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
468F000
|
heap
|
page read and write
|
||
4A16000
|
heap
|
page read and write
|
||
249E3458000
|
heap
|
page read and write
|
||
46B4000
|
heap
|
page read and write
|
||
10EB7000
|
heap
|
page read and write
|
||
1AABF293000
|
heap
|
page read and write
|
||
48C0000
|
heap
|
page read and write
|
||
1AABE811000
|
heap
|
page read and write
|
||
4364000
|
heap
|
page read and write
|
||
1633727E000
|
heap
|
page read and write
|
||
12DA3F5B000
|
heap
|
page read and write
|
||
49AE000
|
heap
|
page read and write
|
||
1AABF279000
|
heap
|
page read and write
|
||
24AE000
|
stack
|
page read and write
|
||
4859000
|
heap
|
page read and write
|
||
258F000
|
heap
|
page read and write
|
||
490A000
|
heap
|
page read and write
|
||
1D3066B0000
|
remote allocation
|
page read and write
|
||
249E3441000
|
heap
|
page read and write
|
||
4B88000
|
heap
|
page read and write
|
||
4758000
|
heap
|
page read and write
|
||
44DC000
|
heap
|
page read and write
|
||
4540000
|
heap
|
page read and write
|
||
61ED0000
|
direct allocation
|
page read and write
|
||
12DA3F57000
|
heap
|
page read and write
|
||
16337298000
|
heap
|
page read and write
|
||
1AABE88A000
|
heap
|
page read and write
|
||
4B49000
|
heap
|
page read and write
|
||
249E3438000
|
heap
|
page read and write
|
||
4788000
|
heap
|
page read and write
|
||
255C000
|
heap
|
page read and write
|
||
2532FC000
|
stack
|
page read and write
|
||
45B1000
|
heap
|
page read and write
|
||
4359000
|
heap
|
page read and write
|
||
1AABF283000
|
heap
|
page read and write
|
||
4893000
|
heap
|
page read and write
|
||
4826000
|
heap
|
page read and write
|
||
4831000
|
heap
|
page read and write
|
||
1AABE864000
|
heap
|
page read and write
|
||
1AABF293000
|
heap
|
page read and write
|
||
47E8000
|
heap
|
page read and write
|
||
44EF000
|
heap
|
page read and write
|
||
1D304D02000
|
heap
|
page read and write
|
||
1AABF264000
|
heap
|
page read and write
|
||
49D0000
|
heap
|
page read and write
|
||
16337251000
|
heap
|
page read and write
|
||
163372B1000
|
heap
|
page read and write
|
||
452D000
|
heap
|
page read and write
|
||
12DA372A000
|
heap
|
page read and write
|
||
487B000
|
heap
|
page read and write
|
||
49E9000
|
heap
|
page read and write
|
||
16337302000
|
heap
|
page read and write
|
||
2529CE000
|
stack
|
page read and write
|
||
1AABF47A000
|
heap
|
page read and write
|
||
43C3000
|
heap
|
page read and write
|
||
12DA368D000
|
heap
|
page read and write
|
||
46A9000
|
heap
|
page read and write
|
||
45E4000
|
heap
|
page read and write
|
||
4A32000
|
heap
|
page read and write
|
||
47D1000
|
heap
|
page read and write
|
||
249E344D000
|
heap
|
page read and write
|
||
4AE3000
|
heap
|
page read and write
|
||
4782000
|
heap
|
page read and write
|
||
4A9E000
|
heap
|
page read and write
|
||
1AABF285000
|
heap
|
page read and write
|
||
4817000
|
heap
|
page read and write
|
||
10E99000
|
heap
|
page read and write
|
||
58631FE000
|
stack
|
page read and write
|
||
1AABE7C9000
|
heap
|
page read and write
|
||
492A000
|
heap
|
page read and write
|
||
43B8000
|
heap
|
page read and write
|
||
4355000
|
heap
|
page read and write
|
||
12DA3F32000
|
heap
|
page read and write
|
||
16337216000
|
heap
|
page read and write
|
||
46EB000
|
heap
|
page read and write
|
||
4394000
|
heap
|
page read and write
|
||
10EBB000
|
heap
|
page read and write
|
||
12DA362F000
|
heap
|
page read and write
|
||
1AABF262000
|
heap
|
page read and write
|
||
16337B00000
|
heap
|
page read and write
|
||
4ADC000
|
heap
|
page read and write
|
||
1AABE7D1000
|
heap
|
page read and write
|
||
46EF000
|
heap
|
page read and write
|
||
1AABE83B000
|
heap
|
page read and write
|
||
4525000
|
heap
|
page read and write
|
||
4A3D000
|
heap
|
page read and write
|
||
2534FE000
|
stack
|
page read and write
|
||
4AEF000
|
heap
|
page read and write
|
||
44C2000
|
heap
|
page read and write
|
||
4B55000
|
heap
|
page read and write
|
||
12DA3DF0000
|
remote allocation
|
page read and write
|
||
1AABF27A000
|
heap
|
page read and write
|
||
10EBB000
|
heap
|
page read and write
|
||
4855000
|
heap
|
page read and write
|
||
259D000
|
heap
|
page read and write
|
||
4342000
|
heap
|
page read and write
|
||
486F000
|
heap
|
page read and write
|
||
1AABF29A000
|
heap
|
page read and write
|
||
249E3444000
|
heap
|
page read and write
|
||
1D3066B0000
|
remote allocation
|
page read and write
|
||
43BF000
|
heap
|
page read and write
|
||
48A6000
|
heap
|
page read and write
|
||
12DA3F30000
|
heap
|
page read and write
|
||
10EBB000
|
heap
|
page read and write
|
||
249E3462000
|
heap
|
page read and write
|
||
1AABE8A0000
|
heap
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
1AABE83F000
|
heap
|
page read and write
|
||
10EB7000
|
heap
|
page read and write
|
||
10A11000
|
heap
|
page read and write
|
||
249E348F000
|
heap
|
page read and write
|
||
4B8B000
|
heap
|
page read and write
|
||
1AABE88A000
|
heap
|
page read and write
|
||
1AABE853000
|
heap
|
page read and write
|
||
4597000
|
heap
|
page read and write
|
||
4330000
|
heap
|
page read and write
|
||
10FF0000
|
heap
|
page read and write
|
||
257D000
|
heap
|
page read and write
|
||
4802000
|
heap
|
page read and write
|
||
4B82000
|
heap
|
page read and write
|
||
4740000
|
heap
|
page read and write
|
||
462A000
|
heap
|
page read and write
|
||
249E3470000
|
heap
|
page read and write
|
||
10EBA000
|
heap
|
page read and write
|
||
49B6000
|
heap
|
page read and write
|
||
25A6000
|
heap
|
page read and write
|
||
16337213000
|
heap
|
page read and write
|
||
4B40000
|
heap
|
page read and write
|
||
25B5000
|
heap
|
page read and write
|
||
163372B4000
|
heap
|
page read and write
|
||
4806000
|
heap
|
page read and write
|
||
1AABF477000
|
heap
|
page read and write
|
||
4573000
|
heap
|
page read and write
|
||
4950000
|
heap
|
page read and write
|
||
1D304B20000
|
heap
|
page read and write
|
||
47B5000
|
heap
|
page read and write
|
||
12DA3613000
|
heap
|
page read and write
|
||
4704000
|
heap
|
page read and write
|
||
10EA0000
|
heap
|
page read and write
|
||
10EAD000
|
heap
|
page read and write
|
||
1AABE820000
|
heap
|
page read and write
|
||
25D7000
|
heap
|
page read and write
|
||
12DA3DF0000
|
remote allocation
|
page read and write
|
||
4470000
|
heap
|
page read and write
|
||
49C5000
|
heap
|
page read and write
|
||
12DA3F32000
|
heap
|
page read and write
|
||
48E4000
|
heap
|
page read and write
|
||
2558000
|
heap
|
page read and write
|
||
4EB24FC000
|
stack
|
page read and write
|
||
2528CB000
|
stack
|
page read and write
|
||
44C5000
|
heap
|
page read and write
|
||
455C000
|
heap
|
page read and write
|
||
12DA3F76000
|
heap
|
page read and write
|
||
1AABF360000
|
heap
|
page read and write
|
||
1AABF25F000
|
heap
|
page read and write
|
||
25BD000
|
heap
|
page read and write
|
||
1AABE88A000
|
heap
|
page read and write
|
||
45A9000
|
heap
|
page read and write
|
||
47B8000
|
heap
|
page read and write
|
||
249E3610000
|
heap
|
page read and write
|
||
1157C000
|
heap
|
page read and write
|
||
1AABF265000
|
heap
|
page read and write
|
||
1AABF475000
|
heap
|
page read and write
|
||
4914000
|
heap
|
page read and write
|
||
478F000
|
heap
|
page read and write
|
||
1AABE8A0000
|
heap
|
page read and write
|
||
4516000
|
heap
|
page read and write
|
||
1AABE853000
|
heap
|
page read and write
|
||
45A2000
|
heap
|
page read and write
|
||
43AE000
|
heap
|
page read and write
|
||
4851000
|
heap
|
page read and write
|
||
4613000
|
heap
|
page read and write
|
||
4A4C000
|
heap
|
page read and write
|
||
1AABE7C8000
|
heap
|
page read and write
|
||
11EBD000
|
stack
|
page read and write
|
||
1AABE88A000
|
heap
|
page read and write
|
||
10EA6000
|
heap
|
page read and write
|
||
1AABF5DC000
|
heap
|
page read and write
|
||
4546000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
12DA3F7C000
|
heap
|
page read and write
|
||
249E345C000
|
heap
|
page read and write
|
||
434E000
|
heap
|
page read and write
|
||
4A41000
|
heap
|
page read and write
|
||
454D000
|
heap
|
page read and write
|
||
249E345A000
|
heap
|
page read and write
|
||
47CD000
|
heap
|
page read and write
|
||
496C000
|
heap
|
page read and write
|
||
48FB000
|
heap
|
page read and write
|
||
48EC000
|
heap
|
page read and write
|
||
1AABF5D6000
|
heap
|
page read and write
|
||
25294F000
|
stack
|
page read and write
|
||
1AABF474000
|
heap
|
page read and write
|
||
44E0000
|
heap
|
page read and write
|
||
12DA4602000
|
heap
|
page read and write
|
||
4644000
|
heap
|
page read and write
|
||
1AABF29B000
|
heap
|
page read and write
|
||
1D0000
|
heap
|
page read and write
|
||
16337298000
|
heap
|
page read and write
|
||
11046000
|
heap
|
page read and write
|
||
5862D3B000
|
stack
|
page read and write
|
||
4320000
|
heap
|
page read and write
|
||
16337231000
|
heap
|
page read and write
|
||
448F000
|
heap
|
page read and write
|
||
2530FF000
|
stack
|
page read and write
|
||
48D9000
|
heap
|
page read and write
|
||
12DA35F0000
|
heap
|
page read and write
|
||
12DA4652000
|
heap
|
page read and write
|
||
4992000
|
heap
|
page read and write
|
||
249E3459000
|
heap
|
page read and write
|
||
43F0000
|
heap
|
page read and write
|
||
49EC000
|
heap
|
page read and write
|
||
10E93000
|
heap
|
page read and write
|
||
25CC000
|
heap
|
page read and write
|
||
497B000
|
heap
|
page read and write
|
||
1AABF5CC000
|
heap
|
page read and write
|
||
1AABF5C8000
|
heap
|
page read and write
|
||
4670000
|
heap
|
page read and write
|
||
45E0000
|
heap
|
page read and write
|
||
249E3AA0000
|
trusted library allocation
|
page read and write
|
||
45D5000
|
heap
|
page read and write
|
||
255F000
|
heap
|
page read and write
|
||
4844000
|
heap
|
page read and write
|
||
25D3000
|
heap
|
page read and write
|
||
44F6000
|
heap
|
page read and write
|
||
42EE000
|
stack
|
page read and write
|
||
12DA3F93000
|
heap
|
page read and write
|
||
499F000
|
heap
|
page read and write
|
||
49DD000
|
heap
|
page read and write
|
||
2CBFCFD000
|
stack
|
page read and write
|
||
4EB2BFD000
|
stack
|
page read and write
|
||
1D304BC0000
|
heap
|
page read and write
|
||
4956000
|
heap
|
page read and write
|
||
46D5000
|
heap
|
page read and write
|
||
4AAD000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
10E99000
|
heap
|
page read and write
|
||
10EA0000
|
heap
|
page read and write
|
||
1AABF7C3000
|
heap
|
page read and write
|
||
2542000
|
heap
|
page read and write
|
||
12DA3F72000
|
heap
|
page read and write
|
||
437D000
|
heap
|
page read and write
|
||
11472000
|
heap
|
page read and write
|
||
12DA363F000
|
heap
|
page read and write
|
||
448B000
|
heap
|
page read and write
|
||
1AABE83E000
|
heap
|
page read and write
|
||
16337298000
|
heap
|
page read and write
|
||
47E0000
|
heap
|
page read and write
|
||
481E000
|
heap
|
page read and write
|
||
12DA3F2A000
|
heap
|
page read and write
|
||
48F7000
|
heap
|
page read and write
|
||
480C000
|
heap
|
page read and write
|
||
249E342B000
|
heap
|
page read and write
|
||
47FE000
|
heap
|
page read and write
|
||
1AABE8A0000
|
heap
|
page read and write
|
||
2554000
|
heap
|
page read and write
|
||
43B4000
|
heap
|
page read and write
|
||
72D73FE000
|
stack
|
page read and write
|
||
12DA3F52000
|
heap
|
page read and write
|
||
4A36000
|
heap
|
page read and write
|
||
61ED4000
|
direct allocation
|
page readonly
|
||
4496000
|
heap
|
page read and write
|
||
4B07000
|
heap
|
page read and write
|
||
5ABE000
|
stack
|
page read and write
|
||
484E000
|
heap
|
page read and write
|
||
1AABE83B000
|
heap
|
page read and write
|
||
47D9000
|
heap
|
page read and write
|
||
12DA3F30000
|
heap
|
page read and write
|
||
72D6F8E000
|
stack
|
page read and write
|
||
1AABE88A000
|
heap
|
page read and write
|
||
12DA3F52000
|
heap
|
page read and write
|
||
2531FB000
|
stack
|
page read and write
|
||
1AABE853000
|
heap
|
page read and write
|
||
438C000
|
heap
|
page read and write
|
||
47A9000
|
heap
|
page read and write
|
||
4230000
|
heap
|
page read and write
|
||
16337170000
|
heap
|
page read and write
|
||
586307E000
|
stack
|
page read and write
|
||
4534000
|
heap
|
page read and write
|
||
1103E000
|
heap
|
page read and write
|
||
4B46000
|
heap
|
page read and write
|
||
4B58000
|
heap
|
page read and write
|
||
1AABF274000
|
heap
|
page read and write
|
||
1AABE809000
|
heap
|
page read and write
|
||
1AABF5C7000
|
heap
|
page read and write
|
||
4567000
|
heap
|
page read and write
|
||
489B000
|
heap
|
page read and write
|
||
48C4000
|
heap
|
page read and write
|
||
1AABE8A0000
|
heap
|
page read and write
|
||
2593000
|
heap
|
page read and write
|
||
10EA0000
|
heap
|
page read and write
|
||
4480000
|
heap
|
page read and write
|
||
494C000
|
heap
|
page read and write
|
||
12DA3F59000
|
heap
|
page read and write
|
||
49CC000
|
heap
|
page read and write
|
||
4B29000
|
heap
|
page read and write
|
||
2572000
|
heap
|
page read and write
|
||
4333000
|
heap
|
page read and write
|
||
44A5000
|
heap
|
page read and write
|
||
43CE000
|
heap
|
page read and write
|
||
44A1000
|
heap
|
page read and write
|
||
44E7000
|
heap
|
page read and write
|
||
4974000
|
heap
|
page read and write
|
||
1633727D000
|
heap
|
page read and write
|
||
4864000
|
heap
|
page read and write
|
||
4877000
|
heap
|
page read and write
|
||
249E3469000
|
heap
|
page read and write
|
||
49A3000
|
heap
|
page read and write
|
||
43BC000
|
heap
|
page read and write
|
||
49DA000
|
heap
|
page read and write
|
||
4998000
|
heap
|
page read and write
|
||
4B1A000
|
heap
|
page read and write
|
||
1AABF47E000
|
heap
|
page read and write
|
||
1AABF277000
|
heap
|
page read and write
|
||
1AABF25B000
|
heap
|
page read and write
|
||
43D6000
|
heap
|
page read and write
|
||
249E3463000
|
heap
|
page read and write
|
||
46CA000
|
heap
|
page read and write
|
||
4564000
|
heap
|
page read and write
|
||
249E34AA000
|
heap
|
page read and write
|
||
4B0B000
|
heap
|
page read and write
|
||
252D7E000
|
stack
|
page read and write
|
||
1D304C26000
|
heap
|
page read and write
|
||
4B22000
|
heap
|
page read and write
|
||
447D000
|
heap
|
page read and write
|
||
4AB4000
|
heap
|
page read and write
|
||
27EF000
|
stack
|
page read and write
|
||
4897000
|
heap
|
page read and write
|
||
249E346C000
|
heap
|
page read and write
|
||
47EB000
|
heap
|
page read and write
|
||
482A000
|
heap
|
page read and write
|
||
45E8000
|
heap
|
page read and write
|
||
249E3413000
|
heap
|
page read and write
|
||
4A96000
|
heap
|
page read and write
|
||
10A11000
|
heap
|
page read and write
|
||
433B000
|
heap
|
page read and write
|
||
4504000
|
heap
|
page read and write
|
||
4368000
|
heap
|
page read and write
|
||
4BA9000
|
heap
|
page read and write
|
||
4773000
|
heap
|
page read and write
|
||
5BF0000
|
remote allocation
|
page read and write
|
||
451A000
|
heap
|
page read and write
|
||
10E99000
|
heap
|
page read and write
|
||
471E000
|
heap
|
page read and write
|
||
1AABF279000
|
heap
|
page read and write
|
||
1AABF28B000
|
heap
|
page read and write
|
||
2579000
|
heap
|
page read and write
|
||
44A9000
|
heap
|
page read and write
|
||
4722000
|
heap
|
page read and write
|
||
408F000
|
stack
|
page read and write
|
||
163372B8000
|
heap
|
page read and write
|
||
12DA3550000
|
heap
|
page read and write
|
||
1AABF273000
|
heap
|
page read and write
|
||
1AABE825000
|
heap
|
page read and write
|
||
4932000
|
heap
|
page read and write
|
||
4734000
|
heap
|
page read and write
|
||
12DA3F55000
|
heap
|
page read and write
|
||
1AABE7DA000
|
heap
|
page read and write
|
||
10FDC000
|
stack
|
page read and write
|
||
16337070000
|
heap
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
45D9000
|
heap
|
page read and write
|
||
12DA3F56000
|
heap
|
page read and write
|
||
45CA000
|
heap
|
page read and write
|
||
459A000
|
heap
|
page read and write
|
||
43CB000
|
heap
|
page read and write
|
||
4522000
|
heap
|
page read and write
|
||
4549000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
4346000
|
heap
|
page read and write
|
||
12DA3F0E000
|
heap
|
page read and write
|
||
45AD000
|
heap
|
page read and write
|
||
249E345B000
|
heap
|
page read and write
|
||
1AABF29D000
|
heap
|
page read and write
|
||
12DA4600000
|
heap
|
page read and write
|
||
44B4000
|
heap
|
page read and write
|
||
2CBFBFF000
|
stack
|
page read and write
|
||
479A000
|
heap
|
page read and write
|
||
4372000
|
heap
|
page read and write
|
||
4B13000
|
heap
|
page read and write
|
||
4AA9000
|
heap
|
page read and write
|
||
4B2D000
|
heap
|
page read and write
|
||
1AABE825000
|
heap
|
page read and write
|
||
44E000
|
unkown
|
page write copy
|
||
1AABF282000
|
heap
|
page read and write
|
||
40F0000
|
heap
|
page read and write
|
||
10EBA000
|
heap
|
page read and write
|
||
1AABF472000
|
heap
|
page read and write
|
||
490E000
|
heap
|
page read and write
|
||
4AC2000
|
heap
|
page read and write
|
||
1D304C6E000
|
heap
|
page read and write
|
||
5F50000
|
unclassified section
|
page read and write
|
||
4EB297E000
|
stack
|
page read and write
|
||
12DA3D50000
|
trusted library allocation
|
page read and write
|
||
47AD000
|
heap
|
page read and write
|
||
12DA3713000
|
heap
|
page read and write
|
||
48CC000
|
heap
|
page read and write
|
||
4B76000
|
heap
|
page read and write
|
||
12DA3680000
|
heap
|
page read and write
|
||
46DC000
|
heap
|
page read and write
|
||
4A83000
|
heap
|
page read and write
|
||
12DA3F2A000
|
heap
|
page read and write
|
||
10EBA000
|
heap
|
page read and write
|
||
49E5000
|
heap
|
page read and write
|
||
4696000
|
heap
|
page read and write
|
||
5BF0000
|
remote allocation
|
page read and write
|
||
57BF000
|
stack
|
page read and write
|
||
1AABF290000
|
heap
|
page read and write
|
||
10FA0000
|
trusted library allocation
|
page read and write
|
||
4AE0000
|
heap
|
page read and write
|
||
1AABE7C4000
|
heap
|
page read and write
|
||
439B000
|
heap
|
page read and write
|
||
4B73000
|
heap
|
page read and write
|
||
2546000
|
heap
|
page read and write
|
||
44FA000
|
heap
|
page read and write
|
||
11020000
|
trusted library allocation
|
page read and write
|
||
4B6B000
|
heap
|
page read and write
|
||
61E01000
|
direct allocation
|
page execute read
|
||
458B000
|
heap
|
page read and write
|
||
1AABF477000
|
heap
|
page read and write
|
||
10EA0000
|
heap
|
page read and write
|
||
25C0000
|
heap
|
page read and write
|
||
25AE000
|
heap
|
page read and write
|
||
1103A000
|
heap
|
page read and write
|
||
1AABF28B000
|
heap
|
page read and write
|
||
2549000
|
heap
|
page read and write
|
||
10E99000
|
heap
|
page read and write
|
||
12DA3F6B000
|
heap
|
page read and write
|
||
25CF000
|
heap
|
page read and write
|
||
450B000
|
heap
|
page read and write
|
||
10EBB000
|
heap
|
page read and write
|
||
4ACD000
|
heap
|
page read and write
|
||
479E000
|
heap
|
page read and write
|
||
453C000
|
heap
|
page read and write
|
||
4716000
|
heap
|
page read and write
|
||
1AABF5C0000
|
heap
|
page read and write
|
||
1AABF5D8000
|
heap
|
page read and write
|
||
47F3000
|
heap
|
page read and write
|
||
163372B4000
|
heap
|
page read and write
|
||
1AABF290000
|
heap
|
page read and write
|
||
47C0000
|
heap
|
page read and write
|
||
44AD000
|
heap
|
page read and write
|
||
499B000
|
heap
|
page read and write
|
||
2580000
|
heap
|
page read and write
|
||
4A2B000
|
heap
|
page read and write
|
||
11270000
|
heap
|
page read and write
|
||
49B2000
|
heap
|
page read and write
|
||
4AFE000
|
heap
|
page read and write
|
||
12DA3E02000
|
heap
|
page read and write
|
||
48FF000
|
heap
|
page read and write
|
||
16337248000
|
heap
|
page read and write
|
||
4A1C000
|
heap
|
page read and write
|
||
4BCA000
|
heap
|
page read and write
|
||
468B000
|
heap
|
page read and write
|
||
1AABF25B000
|
heap
|
page read and write
|
||
1AABE864000
|
heap
|
page read and write
|
||
4939000
|
heap
|
page read and write
|
||
10EA0000
|
heap
|
page read and write
|
||
4A12000
|
heap
|
page read and write
|
||
61ECD000
|
direct allocation
|
page readonly
|
||
4A5F000
|
heap
|
page read and write
|
||
249E3443000
|
heap
|
page read and write
|
||
12DA460F000
|
heap
|
page read and write
|
||
12DA3F2C000
|
heap
|
page read and write
|
||
477A000
|
heap
|
page read and write
|
||
451E000
|
heap
|
page read and write
|
||
43DD000
|
heap
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
4961000
|
heap
|
page read and write
|
||
10E99000
|
heap
|
page read and write
|
||
4ABC000
|
heap
|
page read and write
|
||
4B4D000
|
heap
|
page read and write
|
||
10F90000
|
heap
|
page read and write
|
||
456B000
|
heap
|
page read and write
|
||
5862DBE000
|
stack
|
page read and write
|
||
43A6000
|
heap
|
page read and write
|
||
4B64000
|
heap
|
page read and write
|
||
10B10000
|
heap
|
page read and write
|
||
10E91000
|
heap
|
page read and write
|
||
1AABF27D000
|
heap
|
page read and write
|
||
457E000
|
heap
|
page read and write
|
||
473C000
|
heap
|
page read and write
|
||
4A8F000
|
heap
|
page read and write
|
||
249E3451000
|
heap
|
page read and write
|
||
12DA3F13000
|
heap
|
page read and write
|
||
249E3484000
|
heap
|
page read and write
|
||
12DA3702000
|
heap
|
page read and write
|
||
4738000
|
heap
|
page read and write
|
||
48C8000
|
heap
|
page read and write
|
||
243D000
|
unkown
|
page readonly
|
||
16337B03000
|
heap
|
page read and write
|
||
61ED3000
|
direct allocation
|
page read and write
|
||
249E3460000
|
heap
|
page read and write
|
||
249E3434000
|
heap
|
page read and write
|
||
4EB217B000
|
stack
|
page read and write
|
||
1AABF6C0000
|
heap
|
page read and write
|
||
72D72FF000
|
stack
|
page read and write
|
||
12DA3F66000
|
heap
|
page read and write
|
||
1D304C40000
|
heap
|
page read and write
|
||
1AABF285000
|
heap
|
page read and write
|
||
12DA362B000
|
heap
|
page read and write
|
||
4622000
|
heap
|
page read and write
|
||
486C000
|
heap
|
page read and write
|
||
2520000
|
heap
|
page read and write
|
||
1D304C8B000
|
heap
|
page read and write
|
||
1D304B90000
|
heap
|
page read and write
|
||
1AABF277000
|
heap
|
page read and write
|
||
4AD4000
|
heap
|
page read and write
|
||
4AFA000
|
heap
|
page read and write
|
||
44B8000
|
heap
|
page read and write
|
||
4793000
|
heap
|
page read and write
|
||
1AABF250000
|
heap
|
page read and write
|
||
47EF000
|
heap
|
page read and write
|
||
12DA36EC000
|
heap
|
page read and write
|
||
4A87000
|
heap
|
page read and write
|
||
12DA3F2D000
|
heap
|
page read and write
|
||
16337298000
|
heap
|
page read and write
|
||
1103A000
|
heap
|
page read and write
|
||
1AABE8A0000
|
heap
|
page read and write
|
||
1258C000
|
heap
|
page read and write
|
||
25E1000
|
heap
|
page read and write
|
||
108F7000
|
heap
|
page read and write
|
||
1D306680000
|
trusted library allocation
|
page read and write
|
||
1AABF28D000
|
heap
|
page read and write
|
||
477E000
|
heap
|
page read and write
|
||
12DA36A6000
|
heap
|
page read and write
|
||
1AABE88A000
|
heap
|
page read and write
|
||
49E1000
|
heap
|
page read and write
|
||
46FA000
|
heap
|
page read and write
|
||
4B6F000
|
heap
|
page read and write
|
||
493D000
|
heap
|
page read and write
|
||
163372DA000
|
heap
|
page read and write
|
||
252FFB000
|
stack
|
page read and write
|
||
10E90000
|
heap
|
page read and write
|
||
12DA3F00000
|
heap
|
page read and write
|
||
4487000
|
heap
|
page read and write
|
||
2584000
|
heap
|
page read and write
|
||
1AABE843000
|
heap
|
page read and write
|
||
4385000
|
heap
|
page read and write
|
||
4483000
|
heap
|
page read and write
|
||
46B000
|
unkown
|
page execute and read and write
|
||
12DA3F56000
|
heap
|
page read and write
|
||
1AABE7C0000
|
heap
|
page read and write
|
||
163372B1000
|
heap
|
page read and write
|
||
4AC5000
|
heap
|
page read and write
|
||
4839000
|
heap
|
page read and write
|
||
10E91000
|
heap
|
page read and write
|
||
19D000
|
stack
|
page read and write
|
||
4327000
|
heap
|
page read and write
|
||
12DA3DF0000
|
remote allocation
|
page read and write
|
||
1AABF283000
|
heap
|
page read and write
|
||
12DA3F8F000
|
heap
|
page read and write
|
||
4640000
|
heap
|
page read and write
|
||
4959000
|
heap
|
page read and write
|
||
25F8000
|
heap
|
page read and write
|
||
478B000
|
heap
|
page read and write
|
||
16337237000
|
heap
|
page read and write
|
||
476B000
|
heap
|
page read and write
|
||
1D304C56000
|
heap
|
page read and write
|
||
47A6000
|
heap
|
page read and write
|
||
1AABF47A000
|
heap
|
page read and write
|
||
12DA3F67000
|
heap
|
page read and write
|
||
11376000
|
heap
|
page read and write
|
||
41DE000
|
stack
|
page read and write
|
||
46CD000
|
heap
|
page read and write
|
||
4776000
|
heap
|
page read and write
|
||
4813000
|
heap
|
page read and write
|
||
12DA3F63000
|
heap
|
page read and write
|
||
4558000
|
heap
|
page read and write
|
||
16337010000
|
heap
|
page read and write
|
||
434A000
|
heap
|
page read and write
|
||
495D000
|
heap
|
page read and write
|
||
4379000
|
heap
|
page read and write
|
||
44D4000
|
heap
|
page read and write
|
||
48F0000
|
heap
|
page read and write
|
||
4906000
|
heap
|
page read and write
|
||
12DA3E00000
|
heap
|
page read and write
|
||
1AABE8A0000
|
heap
|
page read and write
|
||
1AABF277000
|
heap
|
page read and write
|
||
4746000
|
heap
|
page read and write
|
||
1D304C13000
|
heap
|
page read and write
|
||
1AABF258000
|
heap
|
page read and write
|
||
4AB8000
|
heap
|
page read and write
|
||
249E345F000
|
heap
|
page read and write
|
||
4A2E000
|
heap
|
page read and write
|
||
48D5000
|
heap
|
page read and write
|
||
4635000
|
heap
|
page read and write
|
||
4B1E000
|
heap
|
page read and write
|
||
1AABF293000
|
heap
|
page read and write
|
||
16337298000
|
heap
|
page read and write
|
||
449A000
|
heap
|
page read and write
|
||
470F000
|
heap
|
page read and write
|
||
4AD1000
|
heap
|
page read and write
|
||
4EB21FF000
|
stack
|
page read and write
|
||
10E96000
|
heap
|
page read and write
|
||
1AABE8B2000
|
heap
|
page read and write
|
||
10EB0000
|
heap
|
page read and write
|
||
47D5000
|
heap
|
page read and write
|
||
481B000
|
heap
|
page read and write
|
||
1AABF280000
|
heap
|
page read and write
|
||
43DA000
|
heap
|
page read and write
|
||
252E000
|
heap
|
page read and write
|
||
256A000
|
heap
|
page read and write
|
||
252DFE000
|
stack
|
page read and write
|
||
4764000
|
heap
|
page read and write
|
||
480F000
|
heap
|
page read and write
|
||
497F000
|
heap
|
page read and write
|
||
4A07000
|
heap
|
page read and write
|
||
12DA3F3B000
|
heap
|
page read and write
|
||
2CBFB7C000
|
stack
|
page read and write
|
||
163371A0000
|
trusted library allocation
|
page read and write
|
||
45F3000
|
heap
|
page read and write
|
||
46A1000
|
heap
|
page read and write
|
||
11066000
|
heap
|
page read and write
|
||
4B0F000
|
heap
|
page read and write
|
||
1AABE853000
|
heap
|
page read and write
|
||
458F000
|
heap
|
page read and write
|
||
4492000
|
heap
|
page read and write
|
||
4B60000
|
heap
|
page read and write
|
||
4A80000
|
heap
|
page read and write
|
||
45B8000
|
heap
|
page read and write
|
||
44FE000
|
heap
|
page read and write
|
||
16337298000
|
heap
|
page read and write
|
||
4A50000
|
heap
|
page read and write
|
||
61E00000
|
direct allocation
|
page execute and read and write
|
||
46B8000
|
heap
|
page read and write
|
||
59BF000
|
stack
|
page read and write
|
||
1AABF351000
|
heap
|
page read and write
|
||
252CF9000
|
stack
|
page read and write
|
||
4AD8000
|
heap
|
page read and write
|
||
1AABF283000
|
heap
|
page read and write
|
||
1AABF280000
|
heap
|
page read and write
|
||
1D306802000
|
trusted library allocation
|
page read and write
|
||
1AABF274000
|
heap
|
page read and write
|
||
4555000
|
heap
|
page read and write
|
||
12DA3F5D000
|
heap
|
page read and write
|
||
48B9000
|
heap
|
page read and write
|
||
1AABE841000
|
heap
|
page read and write
|
||
1AABE9B5000
|
heap
|
page read and write
|
||
4713000
|
heap
|
page read and write
|
||
25C8000
|
heap
|
page read and write
|
||
4A45000
|
heap
|
page read and write
|
||
1AABF292000
|
heap
|
page read and write
|
||
1AABF27D000
|
heap
|
page read and write
|
||
1AABE8A0000
|
heap
|
page read and write
|
||
252A000
|
heap
|
page read and write
|
||
12DA3F5F000
|
heap
|
page read and write
|
||
12DA365E000
|
heap
|
page read and write
|
||
1AABF280000
|
heap
|
page read and write
|
||
436C000
|
heap
|
page read and write
|
||
1633725E000
|
heap
|
page read and write
|
||
464E000
|
heap
|
page read and write
|
||
46E4000
|
heap
|
page read and write
|
||
1116C000
|
heap
|
page read and write
|
||
4551000
|
heap
|
page read and write
|
||
12DA3F55000
|
heap
|
page read and write
|
||
249E346E000
|
heap
|
page read and write
|
||
1AABE83F000
|
heap
|
page read and write
|
||
249E3428000
|
heap
|
page read and write
|
||
25B1000
|
heap
|
page read and write
|
||
1AABF280000
|
heap
|
page read and write
|
||
4923000
|
heap
|
page read and write
|
||
1AABF7CF000
|
heap
|
page read and write
|
||
4A54000
|
heap
|
page read and write
|
||
4848000
|
heap
|
page read and write
|
||
11889000
|
heap
|
page read and write
|
||
12DA3F72000
|
heap
|
page read and write
|
||
4683000
|
heap
|
page read and write
|
||
10EBB000
|
heap
|
page read and write
|
||
43E5000
|
heap
|
page read and write
|
||
1AABF275000
|
heap
|
page read and write
|
||
16337253000
|
heap
|
page read and write
|
||
43AA000
|
heap
|
page read and write
|
||
12DA3684000
|
heap
|
page read and write
|
||
1D304C83000
|
heap
|
page read and write
|
||
4A92000
|
heap
|
page read and write
|
||
16337200000
|
heap
|
page read and write
|
||
446E000
|
stack
|
page read and write
|
||
1633727E000
|
heap
|
page read and write
|
||
450F000
|
heap
|
page read and write
|
||
1AABF240000
|
heap
|
page read and write
|
||
163372C2000
|
heap
|
page read and write
|
||
47C4000
|
heap
|
page read and write
|
||
2CBFC7F000
|
stack
|
page read and write
|
||
1AABE7CB000
|
heap
|
page read and write
|
||
249E348B000
|
heap
|
page read and write
|
||
4680000
|
heap
|
page read and write
|
||
11030000
|
heap
|
page read and write
|
||
4A1F000
|
heap
|
page read and write
|
||
1AABF271000
|
heap
|
page read and write
|
||
1AABE88A000
|
heap
|
page read and write
|
||
2CBF8FF000
|
stack
|
page read and write
|
||
2517000
|
heap
|
page read and write
|
||
4090000
|
direct allocation
|
page execute and read and write
|
||
1AABE88A000
|
heap
|
page read and write
|
||
43C7000
|
heap
|
page read and write
|
||
49F8000
|
heap
|
page read and write
|
||
1AABE8A0000
|
heap
|
page read and write
|
||
12DA4673000
|
heap
|
page read and write
|
||
4725000
|
heap
|
page read and write
|
||
435D000
|
heap
|
page read and write
|
||
1D304BF0000
|
trusted library allocation
|
page read and write
|
||
44EB000
|
heap
|
page read and write
|
||
163372B0000
|
heap
|
page read and write
|
||
4B51000
|
heap
|
page read and write
|
||
12DA3F5A000
|
heap
|
page read and write
|
||
485D000
|
heap
|
page read and write
|
||
249E3468000
|
heap
|
page read and write
|
||
4B7E000
|
heap
|
page read and write
|
||
2CBFA7B000
|
stack
|
page read and write
|
||
1AABF5CF000
|
heap
|
page read and write
|
||
10A10000
|
heap
|
page read and write
|
||
4B93000
|
heap
|
page read and write
|
||
498A000
|
heap
|
page read and write
|
||
4576000
|
heap
|
page read and write
|
||
2567000
|
heap
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
2597000
|
heap
|
page read and write
|
||
5D2F000
|
stack
|
page read and write
|
||
12DA3681000
|
heap
|
page read and write
|
||
249E3310000
|
heap
|
page read and write
|
||
43A3000
|
heap
|
page read and write
|
||
4388000
|
heap
|
page read and write
|
||
4B16000
|
heap
|
page read and write
|
||
4513000
|
heap
|
page read and write
|
||
45EF000
|
heap
|
page read and write
|
||
1AABF290000
|
heap
|
page read and write
|
||
163372B8000
|
heap
|
page read and write
|
||
4860000
|
heap
|
page read and write
|
||
47F7000
|
heap
|
page read and write
|
||
4749000
|
heap
|
page read and write
|
||
4582000
|
heap
|
page read and write
|
||
1AABE7C7000
|
heap
|
page read and write
|
||
2CBFAFE000
|
stack
|
page read and write
|
||
249E3461000
|
heap
|
page read and write
|
||
1AABF47E000
|
heap
|
page read and write
|
||
1AABE8A0000
|
heap
|
page read and write
|
||
48E1000
|
heap
|
page read and write
|
||
1D304C2B000
|
heap
|
page read and write
|
||
4531000
|
heap
|
page read and write
|
||
46E0000
|
heap
|
page read and write
|
||
25C4000
|
heap
|
page read and write
|
||
2606000
|
heap
|
page read and write
|
||
12DA3F56000
|
heap
|
page read and write
|
||
16337A02000
|
heap
|
page read and write
|
||
492E000
|
heap
|
page read and write
|
||
4327000
|
heap
|
page read and write
|
||
498E000
|
heap
|
page read and write
|
||
25B9000
|
heap
|
page read and write
|
||
44B0000
|
heap
|
page read and write
|
||
1AABE88A000
|
heap
|
page read and write
|
||
4A7E000
|
heap
|
page read and write
|
||
12DA3600000
|
heap
|
page read and write
|
||
4B5C000
|
heap
|
page read and write
|
||
49F0000
|
heap
|
page read and write
|
||
461E000
|
heap
|
page read and write
|
||
12DA466A000
|
heap
|
page read and write
|
||
12DA36B1000
|
heap
|
page read and write
|
||
4AF2000
|
heap
|
page read and write
|
||
11271000
|
heap
|
page read and write
|
||
4729000
|
heap
|
page read and write
|
||
249E345D000
|
heap
|
page read and write
|
||
470B000
|
heap
|
page read and write
|
||
49C8000
|
heap
|
page read and write
|
||
12DA3F55000
|
heap
|
page read and write
|
||
12DA3F52000
|
heap
|
page read and write
|
||
4397000
|
heap
|
page read and write
|
||
4AA5000
|
heap
|
page read and write
|
||
43EC000
|
heap
|
page read and write
|
||
45B5000
|
heap
|
page read and write
|
||
12DA3F10000
|
heap
|
page read and write
|
||
16337B02000
|
heap
|
page read and write
|
||
249E3455000
|
heap
|
page read and write
|
||
58633FF000
|
stack
|
page read and write
|
||
47B1000
|
heap
|
page read and write
|
||
4A23000
|
heap
|
page read and write
|
||
1AABF293000
|
heap
|
page read and write
|
||
47CA000
|
heap
|
page read and write
|
||
459E000
|
heap
|
page read and write
|
||
1AABF2B1000
|
heap
|
page read and write
|
||
72D6E8C000
|
stack
|
page read and write
|
||
4B25000
|
heap
|
page read and write
|
||
258C000
|
heap
|
page read and write
|
||
44BC000
|
heap
|
page read and write
|
||
4A58000
|
heap
|
page read and write
|
||
1AABF29A000
|
heap
|
page read and write
|
||
44D8000
|
heap
|
page read and write
|
||
4381000
|
heap
|
page read and write
|
||
4B8F000
|
heap
|
page read and write
|
||
12DA3F74000
|
heap
|
page read and write
|
||
49D4000
|
heap
|
page read and write
|
||
4560000
|
heap
|
page read and write
|
||
46E8000
|
heap
|
page read and write
|
||
4A3A000
|
heap
|
page read and write
|
||
4692000
|
heap
|
page read and write
|
||
16337285000
|
heap
|
page read and write
|
||
4AB0000
|
heap
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
1AABF5D1000
|
heap
|
page read and write
|
||
4AC9000
|
heap
|
page read and write
|
||
256E000
|
heap
|
page read and write
|
||
4AE7000
|
heap
|
page read and write
|
||
10EA0000
|
heap
|
page read and write
|
||
46AD000
|
heap
|
page read and write
|
||
2563000
|
heap
|
page read and write
|
||
47DC000
|
heap
|
page read and write
|
||
10E95000
|
heap
|
page read and write
|
||
16337B0A000
|
heap
|
page read and write
|
||
10EA0000
|
heap
|
page read and write
|
||
4B04000
|
heap
|
page read and write
|
||
249E3502000
|
heap
|
page read and write
|
||
12DA3F79000
|
heap
|
page read and write
|
||
178000
|
stack
|
page read and write
|
||
249E32A0000
|
heap
|
page read and write
|
||
1AABF280000
|
heap
|
page read and write
|
||
2588000
|
heap
|
page read and write
|
||
4360000
|
heap
|
page read and write
|
||
1AABE853000
|
heap
|
page read and write
|
||
249E3422000
|
heap
|
page read and write
|
||
12DA3F5B000
|
heap
|
page read and write
|
||
46C6000
|
heap
|
page read and write
|
||
4639000
|
heap
|
page read and write
|
||
12DA4646000
|
heap
|
page read and write
|
||
24F0000
|
heap
|
page read and write
|
||
12DA4613000
|
heap
|
page read and write
|
||
4797000
|
heap
|
page read and write
|
||
48F3000
|
heap
|
page read and write
|
||
4935000
|
heap
|
page read and write
|
||
4EB2AFE000
|
stack
|
page read and write
|
||
1AABF287000
|
heap
|
page read and write
|
||
46F7000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
433F000
|
heap
|
page read and write
|
||
2CBF877000
|
stack
|
page read and write
|
||
421E000
|
stack
|
page read and write
|
||
1AABF290000
|
heap
|
page read and write
|
||
4A9A000
|
heap
|
page read and write
|
||
4941000
|
heap
|
page read and write
|
||
4A27000
|
heap
|
page read and write
|
||
4A0A000
|
heap
|
page read and write
|
||
4588000
|
heap
|
page read and write
|
||
457A000
|
heap
|
page read and write
|
||
43E1000
|
heap
|
page read and write
|
||
4C90000
|
heap
|
page read and write
|
||
460C000
|
heap
|
page read and write
|
||
249E3457000
|
heap
|
page read and write
|
||
10EAD000
|
heap
|
page read and write
|
||
A98C000
|
heap
|
page read and write
|
||
5C2E000
|
stack
|
page read and write
|
||
4902000
|
heap
|
page read and write
|
||
4926000
|
heap
|
page read and write
|
||
1104C000
|
heap
|
page read and write
|
||
12DA3F29000
|
heap
|
page read and write
|
||
489F000
|
heap
|
page read and write
|
||
1AABE8B2000
|
heap
|
page read and write
|
||
58BF000
|
stack
|
page read and write
|
||
16337285000
|
heap
|
page read and write
|
||
4617000
|
heap
|
page read and write
|
||
4BA6000
|
heap
|
page read and write
|
||
1AABE88A000
|
heap
|
page read and write
|
||
249E3492000
|
heap
|
page read and write
|
||
61EB7000
|
direct allocation
|
page readonly
|
||
1AABF277000
|
heap
|
page read and write
|
||
4760000
|
heap
|
page read and write
|
||
49A7000
|
heap
|
page read and write
|
||
45EB000
|
heap
|
page read and write
|
||
1D304D17000
|
heap
|
page read and write
|
||
12DA3DD0000
|
remote allocation
|
page read and write
|
There are 1096 hidden memdumps, click here to show them.