Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
papercut-hive.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\is-B2R1D.tmp\client\pc-print-client.exe
|
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-B2R1D.tmp\queue_install.log
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Prs295.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Setup Log 2024-10-25 #001.txt
|
Unicode text, UTF-8 (with BOM) text, with very long lines (375), with CRLF, LF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-7B4BH.tmp\papercut-hive.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-B2R1D.tmp\_isetup\_setup64.tmp
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-B2R1D.tmp\antivirus-info.log
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-B2R1D.tmp\client\PC-Global-Print-Driver\.gitattributes
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-B2R1D.tmp\client\PC-Global-Print-Driver\pcglobal.cat
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-B2R1D.tmp\client\PC-Global-Print-Driver\pcglobal.inf
|
Windows setup INFormation
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-B2R1D.tmp\client\PC-Global-Print-Driver\pcglobal.ppd
|
PPD file, version "4.3"
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-B2R1D.tmp\client\PC-Global-Print-Driver\pcntns.ppd
|
PPD file, version "4.3"
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-B2R1D.tmp\client\printer-settings-us-ca.bin
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-B2R1D.tmp\client\printer-settings.bin
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-B2R1D.tmp\data\config\cloud-region.conf
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-B2R1D.tmp\ghost-trap-installer-1.5.10.03.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-B2R1D.tmp\idp.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-B2R1D.tmp\post.bmp
|
PC bitmap, Windows 3.x format, 420 x 250 x 16, image size 210002, resolution 2834 x 2834 px/m, cbSize 210056, bits offset
54
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-B2R1D.tmp\vcredist_x64.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-B2R1D.tmp\~execwithresult.txt
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\{4744f51b-c3b4-8c45-9965-84928136fda2}\SETF815.tmp
|
PPD file, version "4.3"
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{4744f51b-c3b4-8c45-9965-84928136fda2}\SETF836.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{4744f51b-c3b4-8c45-9965-84928136fda2}\SETF846.tmp
|
Windows setup INFormation
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{4744f51b-c3b4-8c45-9965-84928136fda2}\SETF867.tmp
|
PPD file, version "4.3"
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{4744f51b-c3b4-8c45-9965-84928136fda2}\pcglobal.cat (copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{4744f51b-c3b4-8c45-9965-84928136fda2}\pcglobal.inf (copy)
|
Windows setup INFormation
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{4744f51b-c3b4-8c45-9965-84928136fda2}\pcglobal.ppd (copy)
|
PPD file, version "4.3"
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{4744f51b-c3b4-8c45-9965-84928136fda2}\pcntns.ppd (copy)
|
PPD file, version "4.3"
|
dropped
|
||
C:\Windows\INF\oem4.inf
|
Windows setup INFormation
|
dropped
|
||
C:\Windows\INF\setupapi.dev.log
|
Generic INItialization configuration [BeginLog]
|
dropped
|
||
C:\Windows\System32\DriverStore\Temp\{db7c9079-64f3-cb4a-9c36-b79a3d2cd1fb}\SETF9DB.tmp
|
PPD file, version "4.3"
|
dropped
|
||
C:\Windows\System32\DriverStore\Temp\{db7c9079-64f3-cb4a-9c36-b79a3d2cd1fb}\SETF9EB.tmp
|
data
|
dropped
|
||
C:\Windows\System32\DriverStore\Temp\{db7c9079-64f3-cb4a-9c36-b79a3d2cd1fb}\SETF9FC.tmp
|
Windows setup INFormation
|
dropped
|
||
C:\Windows\System32\DriverStore\Temp\{db7c9079-64f3-cb4a-9c36-b79a3d2cd1fb}\SETFA0C.tmp
|
PPD file, version "4.3"
|
dropped
|
||
C:\Windows\System32\DriverStore\Temp\{db7c9079-64f3-cb4a-9c36-b79a3d2cd1fb}\pcglobal.cat (copy)
|
data
|
dropped
|
||
C:\Windows\System32\DriverStore\Temp\{db7c9079-64f3-cb4a-9c36-b79a3d2cd1fb}\pcglobal.inf (copy)
|
Windows setup INFormation
|
dropped
|
||
C:\Windows\System32\DriverStore\Temp\{db7c9079-64f3-cb4a-9c36-b79a3d2cd1fb}\pcglobal.ppd (copy)
|
PPD file, version "4.3"
|
dropped
|
||
C:\Windows\System32\DriverStore\Temp\{db7c9079-64f3-cb4a-9c36-b79a3d2cd1fb}\pcntns.ppd (copy)
|
PPD file, version "4.3"
|
dropped
|
||
C:\Windows\System32\catroot2\dberr.txt
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Windows\System32\spool\drivers\x64\3\pcntns.BPD
|
data
|
dropped
|
There are 31 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\cmd.exe
|
"C:\Windows\system32\cmd.exe" "C:\Windows\system32\cmd.exe" /S /C ""netstat" -anb > "C:\Users\user\AppData\Local\Temp\is-B2R1D.tmp\~execwithresult.txt""
|
||
C:\Windows\System32\NETSTAT.EXE
|
"netstat" -anb
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\system32\cmd.exe" /C wmic /namespace:\\root\SecurityCenter2 path AntiVirusProduct get * /value > "C:\Users\user\AppData\Local\Temp\is-B2R1D.tmp\antivirus-info.log"
2>&1
|
||
C:\Users\user\AppData\Local\Temp\is-B2R1D.tmp\client\pc-print-client.exe
|
"C:\Users\user\AppData\Local\Temp\is-B2R1D.tmp\client\pc-print-client.exe" -installPrintQueue -printerId="PaperCut Printer"
-printerName="PaperCut Printer" "-driverFilePath=C:\Users\user\AppData\Local\Temp\is-B2R1D.tmp\client\PC-Global-Print-Driver\PCGlobal.inf"
-logFile="C:\Users\user\AppData\Local\Temp\is-B2R1D.tmp\queue_install.log"
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe printui.dll,PrintUIEntry /ia /m "PaperCut Global PostScript - NTNS" /f C:\Users\user\AppData\Local\Temp\is-B2R1D.tmp\client\PC-Global-Print-Driver\PCGlobal.inf
/u
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe printui.dll,PrintUIEntry /y /if /b "PaperCut Printer" /x /n "PaperCut Printer" /m "PaperCut Global PostScript
- NTNS" /r http://localhost:9265/printers/papercutpocket /u /q
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe printui.dll,PrintUIEntry /q /y /n "PaperCut Printer"
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe printui.dll,PrintUIEntry /q /Sr /n "PaperCut Printer" /a C:\Users\user\AppData\Local\Temp\is-B2R1D.tmp\client\printer-settings.bin
p h i r g u d c 2
|
||
C:\Users\user\Desktop\papercut-hive.exe
|
"C:\Users\user\Desktop\papercut-hive.exe"
|
||
C:\Users\user\AppData\Local\Temp\is-7B4BH.tmp\papercut-hive.tmp
|
"C:\Users\user\AppData\Local\Temp\is-7B4BH.tmp\papercut-hive.tmp" /SL5="$1047A,31229352,845824,C:\Users\user\Desktop\papercut-hive.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\wbem\WMIC.exe
|
wmic /namespace:\\root\SecurityCenter2 path AntiVirusProduct get * /value
|
||
C:\Windows\System32\taskkill.exe
|
"taskkill.exe" /f /im "pc-print-client-service.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\taskkill.exe
|
"taskkill.exe" /f /im "pc-print-client.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\net.exe
|
"net.exe" start spooler
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\net1.exe
|
C:\Windows\system32\net1 start spooler
|
||
C:\Windows\System32\drvinst.exe
|
DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{4744f51b-c3b4-8c45-9965-84928136fda2}\pcglobal.inf" "9" "48fde5adf"
"000000000000015C" "WinSta0\Default" "0000000000000144" "208" "c:\users\user\appdata\local\temp\is-b2r1d.tmp\client\pc-global-print-driver"
|
||
C:\Windows\System32\PrintIsolationHost.exe
|
C:\Windows\system32\PrintIsolationHost.exe -Embedding
|
There are 12 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://github.com/PaperCutSoftware/GhostTrapn;
|
unknown
|
||
https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
|
unknown
|
||
https://aka.ms/vs/17/release/vc_redist.x64.exe==
|
unknown
|
||
http://www.papercut.com/
|
unknown
|
||
https://.papercusoftwarehttp://lus-genestesttstau-stagitemplate
|
unknown
|
||
http://www.bohemiancoding.com/sketch
|
unknown
|
||
https://protobuf.dev/reference/go/faq#namespace-conflictin
|
unknown
|
||
https://pc-pmitc.appspot.com//print-client/secure/printclient-gateway/org/%s/upload-support-logs/v1c
|
unknown
|
||
https://aka.ms/YoS(&
|
unknown
|
||
http://127.0.0.1:9263image:
|
unknown
|
||
https://www.papercut.com/kb/PaperCutPocketHive/PrinterInstallerIssue#portconflict
|
unknown
|
||
https://aka.ms/vs/17/release/vc_redist.x64.exeH
|
unknown
|
||
https://aka.ms/vs/17/release/vc_redist.x64.exe
|
104.119.110.121
|
||
https://cdn1.papercut.com/files/open-source/ghost-trap/ghost-trap-installer-1.5.10.03.exe
|
52.222.214.120
|
||
https://aka.ms/
|
unknown
|
||
https://aka.ms/vs/17/release/vc_redist.x64.exet))
|
unknown
|
||
https://www.papercut.com/kb/PaperCutPocketHive/PrinterInstallerIssue#win
|
unknown
|
||
http://appsyndication.org/2006/appsynapplicationc:
|
unknown
|
||
https://multiverse.papercut.com
|
unknown
|
||
https://multiverse.papercut.software
|
unknown
|
||
https://www.remobjects.com/ps
|
unknown
|
||
http://localhostus-genesisstaginggngkernel32.dllC:
|
unknown
|
||
https://au-staging.pmitc.papercut.softwareinsufficient
|
unknown
|
||
https://www.innosetup.com/
|
unknown
|
||
https://www.papercut.com/kb/PaperCutPocketHive/PrinterInstallerIssue#services
|
unknown
|
||
https://pmitc.papercut.com/
|
unknown
|
||
https://au.pmitc.papercut.comhttps://eu.pmitc.papercut.comhttps://uk.pmitc.papercut.cominteger
|
unknown
|
||
https://aka.ms/vs/17/release/vc_redist.x64.exe4
|
unknown
|
||
http://bourbon.io
|
unknown
|
||
https://127.0.0.1:9266idna:
|
unknown
|
||
http://www.papercut.com/Yk
|
unknown
|
||
https://cdn1.papercut.com/
|
unknown
|
||
http://www.papercut.com/0http://www.papercut.com/0http://www.papercut.com/
|
unknown
|
||
https://github.com/PaperCutSoftware/GhostTrap
|
unknown
|
||
https://installer-downloader-dot-pc-pmitc.appspot.com/public/installer-downloader/upload-installer-l
|
unknown
|
There are 25 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
fg.microsoft.map.fastly.net
|
199.232.210.172
|
||
d1d4ywpuwg1f9b.cloudfront.net
|
52.222.214.120
|
||
aka.ms
|
104.119.110.121
|
||
pmitc.papercut.com
|
34.111.87.71
|
||
cdn1.papercut.com
|
unknown
|
||
198.187.3.20.in-addr.arpa
|
unknown
|
||
197.87.175.4.in-addr.arpa
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
52.222.214.120
|
d1d4ywpuwg1f9b.cloudfront.net
|
United States
|
||
34.111.87.71
|
pmitc.papercut.com
|
United States
|
||
104.119.110.121
|
aka.ms
|
United States
|
||
199.232.210.172
|
fg.microsoft.map.fastly.net
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\RFC1156Agent\CurrentVersion\Parameters
|
TrapPollTimeMilliSecs
|
||
HKEY_LOCAL_MACHINE\SYSTEM\Setup\SetupapiLogStatus
|
setupapi.dev.log
|
||
HKEY_CURRENT_USER\Printers\Settings\Wizard
|
Default Attributes
|
||
HKEY_CURRENT_USER\Printers\Defaults\{9D3832B6-0358-4CFC-A417-56B61534AE5D}
|
NULL
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows
|
IsMRUEstablished
|
||
HKEY_CURRENT_USER\Printers\DevModes2
|
PaperCut Printer
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
A3E000
|
heap
|
page read and write
|
||
A4E000
|
heap
|
page read and write
|
||
16AAE920000
|
direct allocation
|
page read and write
|
||
13B2000
|
unkown
|
page readonly
|
||
A2D000
|
heap
|
page read and write
|
||
A4E000
|
heap
|
page read and write
|
||
C0000E2000
|
direct allocation
|
page read and write
|
||
15A7000
|
heap
|
page read and write
|
||
1609000
|
heap
|
page read and write
|
||
A3E000
|
heap
|
page read and write
|
||
A3E000
|
heap
|
page read and write
|
||
1548000
|
heap
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
1E21B9AA000
|
heap
|
page read and write
|
||
1572000
|
heap
|
page read and write
|
||
201583F0000
|
heap
|
page read and write
|
||
C0000E0000
|
direct allocation
|
page read and write
|
||
1742000
|
unkown
|
page read and write
|
||
1E21B720000
|
trusted library allocation
|
page read and write
|
||
19888760000
|
heap
|
page read and write
|
||
C000112000
|
direct allocation
|
page read and write
|
||
1E21B970000
|
heap
|
page read and write
|
||
181A42C9000
|
heap
|
page read and write
|
||
1CBD5F60000
|
heap
|
page read and write
|
||
1CBD5BE0000
|
heap
|
page read and write
|
||
C000222000
|
direct allocation
|
page read and write
|
||
C000282000
|
direct allocation
|
page read and write
|
||
A3E000
|
heap
|
page read and write
|
||
28F1D450000
|
heap
|
page read and write
|
||
3039000
|
direct allocation
|
page read and write
|
||
1A0C0630000
|
heap
|
page read and write
|
||
19888A65000
|
heap
|
page read and write
|
||
1E21B98E000
|
heap
|
page read and write
|
||
C00013C000
|
direct allocation
|
page read and write
|
||
1E21B7D8000
|
heap
|
page read and write
|
||
F7C887F000
|
stack
|
page read and write
|
||
1571000
|
heap
|
page read and write
|
||
A2D000
|
heap
|
page read and write
|
||
1E21BE50000
|
heap
|
page read and write
|
||
C000020000
|
direct allocation
|
page read and write
|
||
C00025C000
|
direct allocation
|
page read and write
|
||
C0000B8000
|
direct allocation
|
page read and write
|
||
41DF000
|
direct allocation
|
page read and write
|
||
3007000
|
direct allocation
|
page read and write
|
||
636F000
|
stack
|
page read and write
|
||
C0002A8000
|
direct allocation
|
page read and write
|
||
181A4460000
|
heap
|
page read and write
|
||
EBB000
|
stack
|
page read and write
|
||
C000236000
|
direct allocation
|
page read and write
|
||
28F1D275000
|
heap
|
page read and write
|
||
1790000
|
unkown
|
page read and write
|
||
C00042E000
|
direct allocation
|
page read and write
|
||
181A4244000
|
heap
|
page read and write
|
||
181A4266000
|
heap
|
page read and write
|
||
C000338000
|
direct allocation
|
page read and write
|
||
16A88966000
|
heap
|
page read and write
|
||
16AAE892000
|
direct allocation
|
page read and write
|
||
C00005E000
|
direct allocation
|
page read and write
|
||
1C860A80000
|
heap
|
page read and write
|
||
181A422B000
|
heap
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
C000364000
|
direct allocation
|
page read and write
|
||
C000066000
|
direct allocation
|
page read and write
|
||
67553FD000
|
stack
|
page read and write
|
||
C0003F8000
|
direct allocation
|
page read and write
|
||
C00000A000
|
direct allocation
|
page read and write
|
||
C00042A000
|
direct allocation
|
page read and write
|
||
181A425C000
|
heap
|
page read and write
|
||
1E21BF07000
|
heap
|
page read and write
|
||
A3E000
|
heap
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
C000048000
|
direct allocation
|
page read and write
|
||
579000
|
unkown
|
page read and write
|
||
180F000
|
unkown
|
page readonly
|
||
A53000
|
heap
|
page read and write
|
||
1C85EF17000
|
heap
|
page read and write
|
||
C0000A8000
|
direct allocation
|
page read and write
|
||
A3E000
|
heap
|
page read and write
|
||
15D1000
|
heap
|
page read and write
|
||
C0000D8000
|
direct allocation
|
page read and write
|
||
A2D000
|
heap
|
page read and write
|
||
181A4286000
|
heap
|
page read and write
|
||
A37000
|
heap
|
page read and write
|
||
C000217000
|
direct allocation
|
page read and write
|
||
20158356000
|
heap
|
page read and write
|
||
6754DFE000
|
stack
|
page read and write
|
||
181A4254000
|
heap
|
page read and write
|
||
6755BFE000
|
stack
|
page read and write
|
||
6510000
|
remote allocation
|
page read and write
|
||
1581000
|
heap
|
page read and write
|
||
C000146000
|
direct allocation
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
C000238000
|
direct allocation
|
page read and write
|
||
24817AB2000
|
heap
|
page read and write
|
||
C00002A000
|
direct allocation
|
page read and write
|
||
67557FC000
|
stack
|
page read and write
|
||
181A42B0000
|
heap
|
page read and write
|
||
A4E000
|
heap
|
page read and write
|
||
C000176000
|
direct allocation
|
page read and write
|
||
A53000
|
heap
|
page read and write
|
||
181A4266000
|
heap
|
page read and write
|
||
A48000
|
heap
|
page read and write
|
||
428D000
|
direct allocation
|
page read and write
|
||
1E21B988000
|
heap
|
page read and write
|
||
1E21B7B7000
|
heap
|
page read and write
|
||
A2D000
|
heap
|
page read and write
|
||
181A4251000
|
heap
|
page read and write
|
||
C000260000
|
direct allocation
|
page read and write
|
||
14F9000
|
heap
|
page read and write
|
||
174E000
|
unkown
|
page read and write
|
||
A3E000
|
heap
|
page read and write
|
||
17CE000
|
direct allocation
|
page read and write
|
||
C0000D2000
|
direct allocation
|
page read and write
|
||
2FF8000
|
direct allocation
|
page read and write
|
||
A3E000
|
heap
|
page read and write
|
||
1C85F1C5000
|
heap
|
page read and write
|
||
CA7A27E000
|
unkown
|
page read and write
|
||
179C000
|
unkown
|
page read and write
|
||
C00031A000
|
direct allocation
|
page read and write
|
||
C00011C000
|
direct allocation
|
page read and write
|
||
308B000
|
direct allocation
|
page read and write
|
||
181A42B0000
|
heap
|
page read and write
|
||
2FB0000
|
direct allocation
|
page read and write
|
||
69AF69C000
|
stack
|
page read and write
|
||
A4E000
|
heap
|
page read and write
|
||
181A425C000
|
heap
|
page read and write
|
||
A3E000
|
heap
|
page read and write
|
||
C00021B000
|
direct allocation
|
page read and write
|
||
C000386000
|
direct allocation
|
page read and write
|
||
A4E000
|
heap
|
page read and write
|
||
181A426B000
|
heap
|
page read and write
|
||
A2D000
|
heap
|
page read and write
|
||
181A4266000
|
heap
|
page read and write
|
||
177D000
|
direct allocation
|
page read and write
|
||
1E21B7D4000
|
heap
|
page read and write
|
||
C000022000
|
direct allocation
|
page read and write
|
||
181A4288000
|
heap
|
page read and write
|
||
3FD8000
|
direct allocation
|
page read and write
|
||
1E21B7F6000
|
heap
|
page read and write
|
||
1E21B985000
|
heap
|
page read and write
|
||
A4E000
|
heap
|
page read and write
|
||
C00003E000
|
direct allocation
|
page read and write
|
||
181A4275000
|
heap
|
page read and write
|
||
C000428000
|
direct allocation
|
page read and write
|
||
A4F000
|
heap
|
page read and write
|
||
A2D000
|
heap
|
page read and write
|
||
1740000
|
unkown
|
page read and write
|
||
1CBD5CF0000
|
heap
|
page read and write
|
||
C00031E000
|
direct allocation
|
page read and write
|
||
ABE487C000
|
stack
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
A48000
|
heap
|
page read and write
|
||
181A4288000
|
heap
|
page read and write
|
||
6EE857F000
|
stack
|
page read and write
|
||
181A42DA000
|
heap
|
page read and write
|
||
14E0000
|
direct allocation
|
page execute and read and write
|
||
CA7A3FE000
|
stack
|
page read and write
|
||
A3E000
|
heap
|
page read and write
|
||
C00028C000
|
direct allocation
|
page read and write
|
||
A2D000
|
heap
|
page read and write
|
||
181A425C000
|
heap
|
page read and write
|
||
A3E000
|
heap
|
page read and write
|
||
C00004F000
|
direct allocation
|
page read and write
|
||
28F1D285000
|
heap
|
page read and write
|
||
17A1000
|
direct allocation
|
page read and write
|
||
17B7000
|
direct allocation
|
page read and write
|
||
28F1D240000
|
heap
|
page read and write
|
||
16AAE50B000
|
direct allocation
|
page read and write
|
||
C00001E000
|
direct allocation
|
page read and write
|
||
181A426B000
|
heap
|
page read and write
|
||
C000322000
|
direct allocation
|
page read and write
|
||
1E21B988000
|
heap
|
page read and write
|
||
A36000
|
heap
|
page read and write
|
||
A3E000
|
heap
|
page read and write
|
||
181A4251000
|
heap
|
page read and write
|
||
181A427D000
|
heap
|
page read and write
|
||
181A4305000
|
heap
|
page read and write
|
||
69AF79F000
|
stack
|
page read and write
|
||
24817AA6000
|
heap
|
page read and write
|
||
C000202000
|
direct allocation
|
page read and write
|
||
A3E000
|
heap
|
page read and write
|
||
1E21B7F9000
|
heap
|
page read and write
|
||
16A88BF5000
|
heap
|
page read and write
|
||
C00035A000
|
direct allocation
|
page read and write
|
||
3D495DF000
|
stack
|
page read and write
|
||
13D5000
|
heap
|
page read and write
|
||
C0000BE000
|
direct allocation
|
page read and write
|
||
24817AAA000
|
heap
|
page read and write
|
||
2015834A000
|
heap
|
page read and write
|
||
24817AE0000
|
heap
|
page read and write
|
||
A51000
|
heap
|
page read and write
|
||
D6BFB7F000
|
stack
|
page read and write
|
||
6754FFE000
|
stack
|
page read and write
|
||
A2D000
|
heap
|
page read and write
|
||
181A4200000
|
heap
|
page read and write
|
||
C00014D000
|
direct allocation
|
page read and write
|
||
C000026000
|
direct allocation
|
page read and write
|
||
C00000C000
|
direct allocation
|
page read and write
|
||
ABE497E000
|
stack
|
page read and write
|
||
176F000
|
direct allocation
|
page read and write
|
||
23F79898000
|
heap
|
page read and write
|
||
4010000
|
heap
|
page read and write
|
||
181A425C000
|
heap
|
page read and write
|
||
1CBD5DD0000
|
heap
|
page read and write
|
||
A3E000
|
heap
|
page read and write
|
||
C0000FF000
|
direct allocation
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
666A000
|
heap
|
page read and write
|
||
16A88919000
|
direct allocation
|
page read and write
|
||
A3E000
|
heap
|
page read and write
|
||
A2D000
|
heap
|
page read and write
|
||
1E21B982000
|
heap
|
page read and write
|
||
A3E000
|
heap
|
page read and write
|
||
A4E000
|
heap
|
page read and write
|
||
1A0C0915000
|
heap
|
page read and write
|
||
181A425F000
|
heap
|
page read and write
|
||
181A427C000
|
heap
|
page read and write
|
||
4273000
|
direct allocation
|
page read and write
|
||
C0003D8000
|
direct allocation
|
page read and write
|
||
3040000
|
direct allocation
|
page read and write
|
||
C000398000
|
direct allocation
|
page read and write
|
||
17A3000
|
unkown
|
page write copy
|
||
A4E000
|
heap
|
page read and write
|
||
1E21BF0A000
|
heap
|
page read and write
|
||
28F1D28D000
|
heap
|
page read and write
|
||
19888940000
|
heap
|
page read and write
|
||
A53000
|
heap
|
page read and write
|
||
1CBD5C43000
|
heap
|
page read and write
|
||
A2D000
|
heap
|
page read and write
|
||
F7C87FE000
|
stack
|
page read and write
|
||
28F1D305000
|
heap
|
page read and write
|
||
2FD4000
|
direct allocation
|
page read and write
|
||
7F0DB000
|
direct allocation
|
page read and write
|
||
666F000
|
heap
|
page read and write
|
||
1CBD5C28000
|
heap
|
page read and write
|
||
C000240000
|
direct allocation
|
page read and write
|
||
1836000
|
direct allocation
|
page read and write
|
||
A36000
|
heap
|
page read and write
|
||
1E21B984000
|
heap
|
page read and write
|
||
C000160000
|
direct allocation
|
page read and write
|
||
C000366000
|
direct allocation
|
page read and write
|
||
A37000
|
heap
|
page read and write
|
||
1E21B7D5000
|
heap
|
page read and write
|
||
1E21B99A000
|
heap
|
page read and write
|
||
CA7A2FE000
|
stack
|
page read and write
|
||
A2D000
|
heap
|
page read and write
|
||
A2D000
|
heap
|
page read and write
|
||
1562000
|
heap
|
page read and write
|
||
24817AA6000
|
heap
|
page read and write
|
||
C0000DE000
|
direct allocation
|
page read and write
|
||
B00000
|
unkown
|
page readonly
|
||
A3E000
|
heap
|
page read and write
|
||
30DA000
|
direct allocation
|
page read and write
|
||
C00032C000
|
direct allocation
|
page read and write
|
||
1E21B99A000
|
heap
|
page read and write
|
||
1CBD5C39000
|
heap
|
page read and write
|
||
2A40000
|
trusted library allocation
|
page read and write
|
||
2015832A000
|
heap
|
page read and write
|
||
162F000
|
stack
|
page read and write
|
||
181A4244000
|
heap
|
page read and write
|
||
C00022A000
|
direct allocation
|
page read and write
|
||
16AAE8D0000
|
direct allocation
|
page read and write
|
||
A3E000
|
heap
|
page read and write
|
||
A3E000
|
heap
|
page read and write
|
||
C000310000
|
direct allocation
|
page read and write
|
||
28F1D301000
|
heap
|
page read and write
|
||
C000080000
|
direct allocation
|
page read and write
|
||
28F1D505000
|
heap
|
page read and write
|
||
A2D000
|
heap
|
page read and write
|
||
C000252000
|
direct allocation
|
page read and write
|
||
201582F0000
|
heap
|
page read and write
|
||
4218000
|
direct allocation
|
page read and write
|
||
57B000
|
unkown
|
page read and write
|
||
181A4254000
|
heap
|
page read and write
|
||
1609000
|
heap
|
page read and write
|
||
181A426B000
|
heap
|
page read and write
|
||
181A4254000
|
heap
|
page read and write
|
||
1E21D7F0000
|
heap
|
page read and write
|
||
A4E000
|
heap
|
page read and write
|
||
28F1D430000
|
heap
|
page read and write
|
||
13D0000
|
heap
|
page read and write
|
||
C0000C4000
|
direct allocation
|
page read and write
|
||
181A426B000
|
heap
|
page read and write
|
||
3F80000
|
direct allocation
|
page read and write
|
||
C000256000
|
direct allocation
|
page read and write
|
||
24817AC8000
|
heap
|
page read and write
|
||
C00032E000
|
direct allocation
|
page read and write
|
||
28F1D273000
|
heap
|
page read and write
|
||
A4E000
|
heap
|
page read and write
|
||
1812000
|
direct allocation
|
page read and write
|
||
181A4274000
|
heap
|
page read and write
|
||
41FA000
|
direct allocation
|
page read and write
|
||
A3E000
|
heap
|
page read and write
|
||
A44000
|
heap
|
page read and write
|
||
C0000BA000
|
direct allocation
|
page read and write
|
||
1CBD5C37000
|
heap
|
page read and write
|
||
1E21B7D7000
|
heap
|
page read and write
|
||
14F5000
|
heap
|
page read and write
|
||
1E21B97E000
|
heap
|
page read and write
|
||
C000420000
|
direct allocation
|
page read and write
|
||
A3E000
|
heap
|
page read and write
|
||
2015833B000
|
heap
|
page read and write
|
||
A3E000
|
heap
|
page read and write
|
||
C00005A000
|
direct allocation
|
page read and write
|
||
1E21B7F6000
|
heap
|
page read and write
|
||
C0002FA000
|
direct allocation
|
page read and write
|
||
C0003B0000
|
direct allocation
|
page read and write
|
||
C000279000
|
direct allocation
|
page read and write
|
||
B85000
|
heap
|
page read and write
|
||
A4E000
|
heap
|
page read and write
|
||
1853000
|
direct allocation
|
page read and write
|
||
C000258000
|
direct allocation
|
page read and write
|
||
A3E000
|
heap
|
page read and write
|
||
181A4275000
|
heap
|
page read and write
|
||
42B1000
|
direct allocation
|
page read and write
|
||
3430000
|
heap
|
page read and write
|
||
15F2000
|
heap
|
page read and write
|
||
24817AD3000
|
heap
|
page read and write
|
||
6EE84FE000
|
stack
|
page read and write
|
||
A53000
|
heap
|
page read and write
|
||
26EB000
|
stack
|
page read and write
|
||
181A42E5000
|
heap
|
page read and write
|
||
182B000
|
unkown
|
page readonly
|
||
181A42CF000
|
heap
|
page read and write
|
||
181A426E000
|
heap
|
page read and write
|
||
28F1F160000
|
trusted library allocation
|
page read and write
|
||
C000230000
|
direct allocation
|
page read and write
|
||
15FB000
|
heap
|
page read and write
|
||
C0000EE000
|
direct allocation
|
page read and write
|
||
30C4000
|
direct allocation
|
page read and write
|
||
A30000
|
unkown
|
page readonly
|
||
181A42C8000
|
heap
|
page read and write
|
||
E27000
|
unkown
|
page readonly
|
||
A2D000
|
heap
|
page read and write
|
||
A4E000
|
heap
|
page read and write
|
||
A53000
|
heap
|
page read and write
|
||
30A8000
|
direct allocation
|
page read and write
|
||
181A42E5000
|
heap
|
page read and write
|
||
C000400000
|
direct allocation
|
page read and write
|
||
C0002F6000
|
direct allocation
|
page read and write
|
||
1562000
|
heap
|
page read and write
|
||
2242FBD9000
|
heap
|
page read and write
|
||
A37000
|
heap
|
page read and write
|
||
A3E000
|
heap
|
page read and write
|
||
15D5000
|
heap
|
page read and write
|
||
A3E000
|
heap
|
page read and write
|
||
1E21B7F9000
|
heap
|
page read and write
|
||
181A424B000
|
heap
|
page read and write
|
||
A4B5696000
|
stack
|
page read and write
|
||
15F7000
|
heap
|
page read and write
|
||
3FBC000
|
direct allocation
|
page read and write
|
||
174D000
|
unkown
|
page write copy
|
||
4C4E000
|
stack
|
page read and write
|
||
5CFD2FE000
|
stack
|
page read and write
|
||
157C000
|
heap
|
page read and write
|
||
D6BFA7F000
|
stack
|
page read and write
|
||
A3E000
|
heap
|
page read and write
|
||
C00022C000
|
direct allocation
|
page read and write
|
||
F7C88FF000
|
stack
|
page read and write
|
||
1880000
|
heap
|
page read and write
|
||
C0000EC000
|
direct allocation
|
page read and write
|
||
C000030000
|
direct allocation
|
page read and write
|
||
A3E000
|
heap
|
page read and write
|
||
156D000
|
heap
|
page read and write
|
||
1603000
|
heap
|
page read and write
|
||
1CBD5C34000
|
heap
|
page read and write
|
||
A3E000
|
heap
|
page read and write
|
||
A2D000
|
heap
|
page read and write
|
||
1576000
|
heap
|
page read and write
|
||
2015831C000
|
heap
|
page read and write
|
||
C000498000
|
direct allocation
|
page read and write
|
||
44B5000
|
direct allocation
|
page read and write
|
||
C0002DC000
|
direct allocation
|
page read and write
|
||
1E21BF0E000
|
heap
|
page read and write
|
||
A2D000
|
heap
|
page read and write
|
||
C00042C000
|
direct allocation
|
page read and write
|
||
24817AC4000
|
heap
|
page read and write
|
||
17A4000
|
unkown
|
page read and write
|
||
C000024000
|
direct allocation
|
page read and write
|
||
179A000
|
direct allocation
|
page read and write
|
||
1569000
|
heap
|
page read and write
|
||
1E21B7E5000
|
heap
|
page read and write
|
||
C0003F0000
|
direct allocation
|
page read and write
|
||
181A42E5000
|
heap
|
page read and write
|
||
1CBD5C15000
|
heap
|
page read and write
|
||
181A42B2000
|
heap
|
page read and write
|
||
6EE8176000
|
stack
|
page read and write
|
||
A53000
|
heap
|
page read and write
|
||
C00032A000
|
direct allocation
|
page read and write
|
||
24817AD3000
|
heap
|
page read and write
|
||
181A4100000
|
heap
|
page read and write
|
||
A52000
|
heap
|
page read and write
|
||
A3E000
|
heap
|
page read and write
|
||
C00020C000
|
direct allocation
|
page read and write
|
||
1577000
|
heap
|
page read and write
|
||
1CBD5C37000
|
heap
|
page read and write
|
||
A3E000
|
heap
|
page read and write
|
||
181A426B000
|
heap
|
page read and write
|
||
28F1D350000
|
heap
|
page read and write
|
||
304B000
|
direct allocation
|
page read and write
|
||
181A4236000
|
heap
|
page read and write
|
||
181A4254000
|
heap
|
page read and write
|
||
6755FFF000
|
stack
|
page read and write
|
||
1290000
|
heap
|
page read and write
|
||
181A4266000
|
heap
|
page read and write
|
||
DB5000
|
unkown
|
page read and write
|
||
1748000
|
direct allocation
|
page read and write
|
||
1E21B9A5000
|
heap
|
page read and write
|
||
42A7000
|
direct allocation
|
page read and write
|
||
1510000
|
heap
|
page read and write
|
||
1C85F1C0000
|
heap
|
page read and write
|
||
C000368000
|
direct allocation
|
page read and write
|
||
C000132000
|
direct allocation
|
page read and write
|
||
15B3000
|
heap
|
page read and write
|
||
16A88950000
|
direct allocation
|
page read and write
|
||
C00011A000
|
direct allocation
|
page read and write
|
||
D6BF7CF000
|
stack
|
page read and write
|
||
24817ACC000
|
heap
|
page read and write
|
||
1CBD5DF0000
|
heap
|
page read and write
|
||
1E21B9A1000
|
heap
|
page read and write
|
||
1300000
|
heap
|
page read and write
|
||
C000110000
|
direct allocation
|
page read and write
|
||
424B000
|
direct allocation
|
page read and write
|
||
1E21BA9D000
|
heap
|
page read and write
|
||
1988876D000
|
heap
|
page read and write
|
||
C0000DC000
|
direct allocation
|
page read and write
|
||
17B0000
|
direct allocation
|
page read and write
|
||
BFF17CE000
|
unkown
|
page read and write
|
||
305D000
|
direct allocation
|
page read and write
|
||
1E21B99A000
|
heap
|
page read and write
|
||
C000290000
|
direct allocation
|
page read and write
|
||
181A4305000
|
heap
|
page read and write
|
||
181A4288000
|
heap
|
page read and write
|
||
1796000
|
unkown
|
page write copy
|
||
AE2FD9D000
|
stack
|
page read and write
|
||
A4E000
|
heap
|
page read and write
|
||
C00009D000
|
direct allocation
|
page read and write
|
||
181A4286000
|
heap
|
page read and write
|
||
A4E000
|
heap
|
page read and write
|
||
A2D000
|
heap
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
A2D000
|
heap
|
page read and write
|
||
A53000
|
heap
|
page read and write
|
||
181A4251000
|
heap
|
page read and write
|
||
181A4220000
|
heap
|
page read and write
|
||
1E21B98E000
|
heap
|
page read and write
|
||
15C8000
|
heap
|
page read and write
|
||
24817A88000
|
heap
|
page read and write
|
||
154F000
|
heap
|
page read and write
|
||
A53000
|
heap
|
page read and write
|
||
182B000
|
unkown
|
page readonly
|
||
14D0000
|
heap
|
page read and write
|
||
C00024A000
|
direct allocation
|
page read and write
|
||
12EE000
|
stack
|
page read and write
|
||
A4E000
|
heap
|
page read and write
|
||
181A4288000
|
heap
|
page read and write
|
||
23F7B470000
|
heap
|
page read and write
|
||
181A4251000
|
heap
|
page read and write
|
||
1551000
|
heap
|
page read and write
|
||
180F000
|
unkown
|
page readonly
|
||
CA7A47F000
|
stack
|
page read and write
|
||
A4E000
|
heap
|
page read and write
|
||
1E21BF0E000
|
heap
|
page read and write
|
||
A55000
|
heap
|
page read and write
|
||
181A42E5000
|
heap
|
page read and write
|
||
181A4239000
|
heap
|
page read and write
|
||
4FCC000
|
stack
|
page read and write
|
||
A48000
|
heap
|
page read and write
|
||
34B0000
|
heap
|
page read and write
|
||
C000277000
|
direct allocation
|
page read and write
|
||
180E000
|
unkown
|
page write copy
|
||
654E000
|
stack
|
page read and write
|
||
1C85EF1E000
|
heap
|
page read and write
|
||
1E21B9AD000
|
heap
|
page read and write
|
||
181A4286000
|
heap
|
page read and write
|
||
589000
|
unkown
|
page readonly
|
||
C000006000
|
direct allocation
|
page read and write
|
||
4230000
|
direct allocation
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
24817AB7000
|
heap
|
page read and write
|
||
181A425F000
|
heap
|
page read and write
|
||
69AF71E000
|
stack
|
page read and write
|
||
B5F000
|
stack
|
page read and write
|
||
15D0000
|
heap
|
page read and write
|
||
A4E000
|
heap
|
page read and write
|
||
4207000
|
direct allocation
|
page read and write
|
||
1A0C0910000
|
heap
|
page read and write
|
||
2242FBD0000
|
heap
|
page read and write
|
||
20158316000
|
heap
|
page read and write
|
||
4D4E000
|
stack
|
page read and write
|
||
A2D000
|
heap
|
page read and write
|
||
425B000
|
direct allocation
|
page read and write
|
||
1CBD5C03000
|
heap
|
page read and write
|
||
19888767000
|
heap
|
page read and write
|
||
C00017E000
|
direct allocation
|
page read and write
|
||
C0000BC000
|
direct allocation
|
page read and write
|
||
429C000
|
direct allocation
|
page read and write
|
||
1861000
|
direct allocation
|
page read and write
|
||
181A42C2000
|
heap
|
page read and write
|
||
1797000
|
unkown
|
page read and write
|
||
178C000
|
direct allocation
|
page read and write
|
||
DB0000
|
unkown
|
page read and write
|
||
4D1000
|
unkown
|
page execute read
|
||
160E000
|
heap
|
page read and write
|
||
C0002FC000
|
direct allocation
|
page read and write
|
||
A2D000
|
heap
|
page read and write
|
||
C000072000
|
direct allocation
|
page read and write
|
||
A3E000
|
heap
|
page read and write
|
||
A3E000
|
heap
|
page read and write
|
||
184C000
|
direct allocation
|
page read and write
|
||
1E21B97F000
|
heap
|
page read and write
|
||
C00049E000
|
direct allocation
|
page read and write
|
||
181A4305000
|
heap
|
page read and write
|
||
C000210000
|
direct allocation
|
page read and write
|
||
1E21B7FE000
|
heap
|
page read and write
|
||
28F1D271000
|
heap
|
page read and write
|
||
28F1D275000
|
heap
|
page read and write
|
||
1E21B7F6000
|
heap
|
page read and write
|
||
1E21B989000
|
heap
|
page read and write
|
||
1E21B720000
|
trusted library allocation
|
page read and write
|
||
181A426D000
|
heap
|
page read and write
|
||
201584D0000
|
heap
|
page read and write
|
||
1E21B99A000
|
heap
|
page read and write
|
||
23F7B940000
|
heap
|
page read and write
|
||
36F0000
|
heap
|
page read and write
|
||
F7C877E000
|
stack
|
page read and write
|
||
181A4272000
|
heap
|
page read and write
|
||
181A4268000
|
heap
|
page read and write
|
||
4015000
|
heap
|
page read and write
|
||
A2D000
|
heap
|
page read and write
|
||
C000272000
|
direct allocation
|
page read and write
|
||
181A4271000
|
heap
|
page read and write
|
||
23F7B2C0000
|
heap
|
page read and write
|
||
B01000
|
unkown
|
page execute read
|
||
28F1D2D8000
|
heap
|
page read and write
|
||
A2D000
|
heap
|
page read and write
|
||
24817AD9000
|
heap
|
page read and write
|
||
3F90000
|
direct allocation
|
page read and write
|
||
1C85EEE0000
|
heap
|
page read and write
|
||
A2D000
|
heap
|
page read and write
|
||
17BE000
|
direct allocation
|
page read and write
|
||
24817AD4000
|
heap
|
page read and write
|
||
181A426B000
|
heap
|
page read and write
|
||
16A887F0000
|
heap
|
page read and write
|
||
181A4305000
|
heap
|
page read and write
|
||
C000350000
|
direct allocation
|
page read and write
|
||
1798000
|
unkown
|
page write copy
|
||
CA79F9B000
|
stack
|
page read and write
|
||
19888860000
|
heap
|
page read and write
|
||
41EA000
|
direct allocation
|
page read and write
|
||
C00030A000
|
direct allocation
|
page read and write
|
||
1563000
|
heap
|
page read and write
|
||
A4E000
|
heap
|
page read and write
|
||
15EC000
|
heap
|
page read and write
|
||
185A000
|
direct allocation
|
page read and write
|
||
A4B5A7F000
|
stack
|
page read and write
|
||
1E21B97C000
|
heap
|
page read and write
|
||
1568000
|
heap
|
page read and write
|
||
1E21B7FD000
|
heap
|
page read and write
|
||
C000232000
|
direct allocation
|
page read and write
|
||
27EE000
|
stack
|
page read and write
|
||
1E21BF07000
|
heap
|
page read and write
|
||
1CBD5C35000
|
heap
|
page read and write
|
||
6510000
|
remote allocation
|
page read and write
|
||
1CBD5F65000
|
heap
|
page read and write
|
||
181A425C000
|
heap
|
page read and write
|
||
A37000
|
heap
|
page read and write
|
||
C000053000
|
direct allocation
|
page read and write
|
||
181A4305000
|
heap
|
page read and write
|
||
A2D000
|
heap
|
page read and write
|
||
F7C867B000
|
stack
|
page read and write
|
||
181A4286000
|
heap
|
page read and write
|
||
A4E000
|
heap
|
page read and write
|
||
181A42E3000
|
heap
|
page read and write
|
||
C0000CC000
|
direct allocation
|
page read and write
|
||
1E21BF0A000
|
heap
|
page read and write
|
||
201584F0000
|
heap
|
page read and write
|
||
63BE000
|
stack
|
page read and write
|
||
17D5000
|
direct allocation
|
page read and write
|
||
15ED000
|
heap
|
page read and write
|
||
23F79A60000
|
heap
|
page read and write
|
||
181A4257000
|
heap
|
page read and write
|
||
4AFE000
|
direct allocation
|
page read and write
|
||
28F1D2E0000
|
heap
|
page read and write
|
||
1E21B6D0000
|
heap
|
page read and write
|
||
1E21B98E000
|
heap
|
page read and write
|
||
C000094000
|
direct allocation
|
page read and write
|
||
C00034A000
|
direct allocation
|
page read and write
|
||
24817AA6000
|
heap
|
page read and write
|
||
A3E000
|
heap
|
page read and write
|
||
181A4254000
|
heap
|
page read and write
|
||
181A4266000
|
heap
|
page read and write
|
||
B80000
|
heap
|
page read and write
|
||
1E21BF00000
|
heap
|
page read and write
|
||
F85000
|
unkown
|
page readonly
|
||
1844000
|
direct allocation
|
page read and write
|
||
A53000
|
heap
|
page read and write
|
||
C000264000
|
direct allocation
|
page read and write
|
||
C000118000
|
direct allocation
|
page read and write
|
||
C0000F2000
|
direct allocation
|
page read and write
|
||
C000200000
|
direct allocation
|
page read and write
|
||
24817AD0000
|
heap
|
page read and write
|
||
30D3000
|
direct allocation
|
page read and write
|
||
1741000
|
unkown
|
page write copy
|
||
A2D000
|
heap
|
page read and write
|
||
A53000
|
heap
|
page read and write
|
||
A2D000
|
heap
|
page read and write
|
||
181A4274000
|
heap
|
page read and write
|
||
16A88BC6000
|
direct allocation
|
page read and write
|
||
1E21B7F6000
|
heap
|
page read and write
|
||
23F79780000
|
heap
|
page read and write
|
||
64BE000
|
stack
|
page read and write
|
||
A53000
|
heap
|
page read and write
|
||
1E21B97C000
|
heap
|
page read and write
|
||
C00021D000
|
direct allocation
|
page read and write
|
||
3F80000
|
direct allocation
|
page read and write
|
||
A3E000
|
heap
|
page read and write
|
||
15E9000
|
heap
|
page read and write
|
||
34D0000
|
direct allocation
|
page read and write
|
||
16A888D0000
|
heap
|
page read and write
|
||
DAE000
|
unkown
|
page read and write
|
||
A4B5BFE000
|
stack
|
page read and write
|
||
C00035E000
|
direct allocation
|
page read and write
|
||
3FA0000
|
heap
|
page read and write
|
||
A4E000
|
heap
|
page read and write
|
||
181A4269000
|
heap
|
page read and write
|
||
1C85EEC0000
|
heap
|
page read and write
|
||
181A424B000
|
heap
|
page read and write
|
||
C000084000
|
direct allocation
|
page read and write
|
||
3064000
|
direct allocation
|
page read and write
|
||
181A426E000
|
heap
|
page read and write
|
||
1740000
|
unkown
|
page write copy
|
||
4ECD000
|
stack
|
page read and write
|
||
181A4309000
|
heap
|
page read and write
|
||
1E21B98E000
|
heap
|
page read and write
|
||
C00030E000
|
direct allocation
|
page read and write
|
||
4310000
|
direct allocation
|
page read and write
|
||
1E21B9A0000
|
heap
|
page read and write
|
||
181A4286000
|
heap
|
page read and write
|
||
A2D000
|
heap
|
page read and write
|
||
15E5000
|
heap
|
page read and write
|
||
181A4275000
|
heap
|
page read and write
|
||
C000328000
|
direct allocation
|
page read and write
|
||
1E21B7A0000
|
heap
|
page read and write
|
||
A3E000
|
heap
|
page read and write
|
||
C000308000
|
direct allocation
|
page read and write
|
||
A3E000
|
heap
|
page read and write
|
||
1CBD5C15000
|
heap
|
page read and write
|
||
2242FAF0000
|
heap
|
page read and write
|
||
A4E000
|
heap
|
page read and write
|
||
34D0000
|
direct allocation
|
page read and write
|
||
C000140000
|
direct allocation
|
page read and write
|
||
181A4305000
|
heap
|
page read and write
|
||
181A426D000
|
heap
|
page read and write
|
||
C0000F0000
|
direct allocation
|
page read and write
|
||
D6BFAFF000
|
stack
|
page read and write
|
||
28F1D2A2000
|
heap
|
page read and write
|
||
1360000
|
heap
|
page read and write
|
||
181A42E5000
|
heap
|
page read and write
|
||
2015833B000
|
heap
|
page read and write
|
||
6760000
|
heap
|
page read and write
|
||
6755DFD000
|
stack
|
page read and write
|
||
A4F000
|
heap
|
page read and write
|
||
6510000
|
remote allocation
|
page read and write
|
||
C000086000
|
direct allocation
|
page read and write
|
||
A3E000
|
heap
|
page read and write
|
||
181A4272000
|
heap
|
page read and write
|
||
1E21B98E000
|
heap
|
page read and write
|
||
23F79860000
|
heap
|
page read and write
|
||
2242FB80000
|
heap
|
page read and write
|
||
C0002D8000
|
direct allocation
|
page read and write
|
||
582000
|
unkown
|
page read and write
|
||
24817DC0000
|
heap
|
page read and write
|
||
1E21BF04000
|
heap
|
page read and write
|
||
17FE000
|
unkown
|
page read and write
|
||
A3E000
|
heap
|
page read and write
|
||
1E21B98E000
|
heap
|
page read and write
|
||
4268000
|
direct allocation
|
page read and write
|
||
1E21B9AD000
|
heap
|
page read and write
|
||
16A88960000
|
heap
|
page read and write
|
||
12A0000
|
heap
|
page read and write
|
||
BFF1A7E000
|
stack
|
page read and write
|
||
17D1000
|
unkown
|
page read and write
|
||
15AB000
|
heap
|
page read and write
|
||
181A4286000
|
heap
|
page read and write
|
||
C000174000
|
direct allocation
|
page read and write
|
||
C000320000
|
direct allocation
|
page read and write
|
||
A31000
|
unkown
|
page execute read
|
||
1A0C0840000
|
heap
|
page read and write
|
||
24817A80000
|
heap
|
page read and write
|
||
6650000
|
heap
|
page read and write
|
||
C000204000
|
direct allocation
|
page read and write
|
||
30CC000
|
direct allocation
|
page read and write
|
||
181A424B000
|
heap
|
page read and write
|
||
24817AD9000
|
heap
|
page read and write
|
||
A4B571E000
|
stack
|
page read and write
|
||
F85000
|
unkown
|
page readonly
|
||
181A42E3000
|
heap
|
page read and write
|
||
35FE000
|
stack
|
page read and write
|
||
A3E000
|
heap
|
page read and write
|
||
1C85EEB0000
|
heap
|
page read and write
|
||
C000426000
|
direct allocation
|
page read and write
|
||
C0003D0000
|
direct allocation
|
page read and write
|
||
2242F9F0000
|
heap
|
page read and write
|
||
181A4251000
|
heap
|
page read and write
|
||
1A0C072F000
|
heap
|
page read and write
|
||
1E21B7B7000
|
heap
|
page read and write
|
||
C00036C000
|
direct allocation
|
page read and write
|
||
23F79A65000
|
heap
|
page read and write
|
||
181A4286000
|
heap
|
page read and write
|
||
C000186000
|
direct allocation
|
page read and write
|
||
C000422000
|
direct allocation
|
page read and write
|
||
A2D000
|
heap
|
page read and write
|
||
C0003DA000
|
direct allocation
|
page read and write
|
||
C00025A000
|
direct allocation
|
page read and write
|
||
181A4465000
|
heap
|
page read and write
|
||
1E21B99A000
|
heap
|
page read and write
|
||
5CFD37E000
|
stack
|
page read and write
|
||
A2D000
|
heap
|
page read and write
|
||
C000055000
|
direct allocation
|
page read and write
|
||
1CBD5C38000
|
heap
|
page read and write
|
||
154B000
|
heap
|
page read and write
|
||
A4E000
|
heap
|
page read and write
|
||
1868000
|
direct allocation
|
page read and write
|
||
A2D000
|
heap
|
page read and write
|
||
30E8000
|
direct allocation
|
page read and write
|
||
C000396000
|
direct allocation
|
page read and write
|
||
4D8D000
|
stack
|
page read and write
|
||
A2D000
|
heap
|
page read and write
|
||
1E21B7A8000
|
heap
|
page read and write
|
||
A2D000
|
heap
|
page read and write
|
||
3056000
|
direct allocation
|
page read and write
|
||
1E21BA90000
|
heap
|
page read and write
|
||
A4E000
|
heap
|
page read and write
|
||
F7C86FF000
|
stack
|
page read and write
|
||
1E21B700000
|
heap
|
page read and write
|
||
4D0000
|
unkown
|
page readonly
|
||
17E3000
|
direct allocation
|
page read and write
|
||
C000028000
|
direct allocation
|
page read and write
|
||
1518000
|
heap
|
page read and write
|
||
C0000D4000
|
direct allocation
|
page read and write
|
||
A4E000
|
heap
|
page read and write
|
||
181A42B2000
|
heap
|
page read and write
|
||
24817DC5000
|
heap
|
page read and write
|
||
C000248000
|
direct allocation
|
page read and write
|
||
A3E000
|
heap
|
page read and write
|
||
C00026C000
|
direct allocation
|
page read and write
|
||
4E8E000
|
stack
|
page read and write
|
||
9E8000
|
heap
|
page read and write
|
||
181A425F000
|
heap
|
page read and write
|
||
C000480000
|
direct allocation
|
page read and write
|
||
160E000
|
heap
|
page read and write
|
||
24817ACB000
|
heap
|
page read and write
|
||
15ED000
|
heap
|
page read and write
|
||
17C5000
|
direct allocation
|
page read and write
|
||
DC5000
|
unkown
|
page readonly
|
||
1E21B750000
|
heap
|
page read and write
|
||
67555FE000
|
stack
|
page read and write
|
||
1E21BF05000
|
heap
|
page read and write
|
||
181A4266000
|
heap
|
page read and write
|
||
15FA000
|
heap
|
page read and write
|
||
3610000
|
heap
|
page read and write
|
||
4211000
|
direct allocation
|
page read and write
|
||
A4F000
|
heap
|
page read and write
|
||
181A4275000
|
heap
|
page read and write
|
||
181A426B000
|
heap
|
page read and write
|
||
A2D000
|
heap
|
page read and write
|
||
A2D000
|
heap
|
page read and write
|
||
A2D000
|
heap
|
page read and write
|
||
16A88914000
|
direct allocation
|
page read and write
|
||
A4B5B7F000
|
stack
|
page read and write
|
||
182F000
|
direct allocation
|
page read and write
|
||
1CBD5C09000
|
heap
|
page read and write
|
||
A2D000
|
heap
|
page read and write
|
||
C000314000
|
direct allocation
|
page read and write
|
||
1E21B803000
|
heap
|
page read and write
|
||
16A88910000
|
direct allocation
|
page read and write
|
||
A4E000
|
heap
|
page read and write
|
||
1586000
|
heap
|
page read and write
|
||
2FB8000
|
direct allocation
|
page read and write
|
||
A3E000
|
heap
|
page read and write
|
||
A53000
|
heap
|
page read and write
|
||
371F000
|
stack
|
page read and write
|
||
C00025E000
|
direct allocation
|
page read and write
|
||
181A4286000
|
heap
|
page read and write
|
||
67551FF000
|
stack
|
page read and write
|
||
1565000
|
heap
|
page read and write
|
||
181A4271000
|
heap
|
page read and write
|
||
C000352000
|
direct allocation
|
page read and write
|
||
3FB4000
|
direct allocation
|
page read and write
|
||
2A30000
|
heap
|
page read and write
|
||
A3E000
|
heap
|
page read and write
|
||
1E21B6E0000
|
heap
|
page read and write
|
||
24817AC7000
|
heap
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
24817D70000
|
heap
|
page read and write
|
||
1E21B977000
|
heap
|
page read and write
|
||
20158353000
|
heap
|
page read and write
|
||
C000360000
|
direct allocation
|
page read and write
|
||
181A4286000
|
heap
|
page read and write
|
||
1E21B7B2000
|
heap
|
page read and write
|
||
1E21B99A000
|
heap
|
page read and write
|
||
C00024E000
|
direct allocation
|
page read and write
|
||
C00005C000
|
direct allocation
|
page read and write
|
||
1761000
|
direct allocation
|
page read and write
|
||
C000275000
|
direct allocation
|
page read and write
|
||
307B000
|
direct allocation
|
page read and write
|
||
A51000
|
heap
|
page read and write
|
||
A53000
|
heap
|
page read and write
|
||
1CBD5C28000
|
heap
|
page read and write
|
||
20158354000
|
heap
|
page read and write
|
||
A2D000
|
heap
|
page read and write
|
||
13B2000
|
unkown
|
page readonly
|
||
28F1D500000
|
heap
|
page read and write
|
||
28F1D285000
|
heap
|
page read and write
|
||
C00006A000
|
direct allocation
|
page read and write
|
||
C0000C6000
|
direct allocation
|
page read and write
|
||
181A425F000
|
heap
|
page read and write
|
||
A3E000
|
heap
|
page read and write
|
||
FBC000
|
stack
|
page read and write
|
||
3092000
|
direct allocation
|
page read and write
|
||
C00013E000
|
direct allocation
|
page read and write
|
||
A2D000
|
heap
|
page read and write
|
||
1E21B720000
|
trusted library allocation
|
page read and write
|
||
1A0C0739000
|
heap
|
page read and write
|
||
1595000
|
heap
|
page read and write
|
||
2015834A000
|
heap
|
page read and write
|
||
DBD000
|
unkown
|
page read and write
|
||
1C85EF10000
|
heap
|
page read and write
|
||
AE2FC9B000
|
stack
|
page read and write
|
||
C000004000
|
direct allocation
|
page read and write
|
||
181A4287000
|
heap
|
page read and write
|
||
1CBD5C28000
|
heap
|
page read and write
|
||
19888960000
|
heap
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
201582F8000
|
heap
|
page read and write
|
||
A3E000
|
heap
|
page read and write
|
||
A3E000
|
heap
|
page read and write
|
||
A3E000
|
heap
|
page read and write
|
||
181A426B000
|
heap
|
page read and write
|
||
D6BF6C7000
|
stack
|
page read and write
|
||
C000037000
|
direct allocation
|
page read and write
|
||
A4E000
|
heap
|
page read and write
|
||
1E21B983000
|
heap
|
page read and write
|
||
15DE000
|
heap
|
page read and write
|
||
4229000
|
direct allocation
|
page read and write
|
||
23F79990000
|
heap
|
page read and write
|
||
1E21B98E000
|
heap
|
page read and write
|
||
16A88BB0000
|
direct allocation
|
page read and write
|
||
C000340000
|
direct allocation
|
page read and write
|
||
A36000
|
heap
|
page read and write
|
||
C000070000
|
direct allocation
|
page read and write
|
||
2FCD000
|
direct allocation
|
page read and write
|
||
1220000
|
heap
|
page read and write
|
||
1E21B806000
|
heap
|
page read and write
|
||
181A41E0000
|
heap
|
page read and write
|
||
C000138000
|
direct allocation
|
page read and write
|
||
A53000
|
heap
|
page read and write
|
||
1558000
|
heap
|
page read and write
|
||
A48000
|
heap
|
page read and write
|
||
470C000
|
direct allocation
|
page read and write
|
||
181A425C000
|
heap
|
page read and write
|
||
28F1D249000
|
heap
|
page read and write
|
||
A4E000
|
heap
|
page read and write
|
||
1E21B7F9000
|
heap
|
page read and write
|
||
C0000FC000
|
direct allocation
|
page read and write
|
||
1E21B988000
|
heap
|
page read and write
|
||
A4E000
|
heap
|
page read and write
|
||
16A88B80000
|
direct allocation
|
page read and write
|
||
A3E000
|
heap
|
page read and write
|
||
1E21B99F000
|
heap
|
page read and write
|
||
181A426B000
|
heap
|
page read and write
|
||
17A8000
|
direct allocation
|
page read and write
|
||
DC7000
|
unkown
|
page readonly
|
||
1350000
|
heap
|
page read and write
|
||
C00012A000
|
direct allocation
|
page read and write
|
||
C0000E8000
|
direct allocation
|
page read and write
|
||
423A000
|
direct allocation
|
page read and write
|
||
C000250000
|
direct allocation
|
page read and write
|
||
1768000
|
direct allocation
|
page read and write
|
||
A4B579E000
|
stack
|
page read and write
|
||
1E21B7F9000
|
heap
|
page read and write
|
||
A3E000
|
heap
|
page read and write
|
||
A4E000
|
heap
|
page read and write
|
||
2FDC000
|
direct allocation
|
page read and write
|
||
1819000
|
direct allocation
|
page read and write
|
||
C000254000
|
direct allocation
|
page read and write
|
||
16A888F0000
|
heap
|
page read and write
|
||
6754BFB000
|
stack
|
page read and write
|
||
C00001A000
|
direct allocation
|
page read and write
|
||
6EE847E000
|
stack
|
page read and write
|
||
181A4255000
|
heap
|
page read and write
|
||
C000430000
|
direct allocation
|
page read and write
|
||
181A4254000
|
heap
|
page read and write
|
||
2015833B000
|
heap
|
page read and write
|
||
A3E000
|
heap
|
page read and write
|
||
180E000
|
unkown
|
page write copy
|
||
30B6000
|
direct allocation
|
page read and write
|
||
C000438000
|
direct allocation
|
page read and write
|
||
15F6000
|
heap
|
page read and write
|
||
1828000
|
direct allocation
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
C000382000
|
direct allocation
|
page read and write
|
||
1368000
|
heap
|
page read and write
|
||
4205000
|
direct allocation
|
page read and write
|
||
A2D000
|
heap
|
page read and write
|
||
C000104000
|
direct allocation
|
page read and write
|
||
587000
|
unkown
|
page readonly
|
||
1E21B99D000
|
heap
|
page read and write
|
||
20158345000
|
heap
|
page read and write
|
||
5CFD27E000
|
stack
|
page read and write
|
||
7F0C0000
|
direct allocation
|
page read and write
|
||
2FEA000
|
direct allocation
|
page read and write
|
||
A4E000
|
heap
|
page read and write
|
||
A2D000
|
heap
|
page read and write
|
||
A2D000
|
heap
|
page read and write
|
||
AE2FD1E000
|
stack
|
page read and write
|
||
1555000
|
heap
|
page read and write
|
||
A3E000
|
heap
|
page read and write
|
||
20158625000
|
heap
|
page read and write
|
||
1E21B720000
|
trusted library allocation
|
page read and write
|
||
C000008000
|
direct allocation
|
page read and write
|
||
1750000
|
unkown
|
page write copy
|
||
C00033A000
|
direct allocation
|
page read and write
|
||
1E21B9AD000
|
heap
|
page read and write
|
||
16A88B88000
|
direct allocation
|
page read and write
|
||
3780000
|
trusted library allocation
|
page read and write
|
||
A4E000
|
heap
|
page read and write
|
||
C000326000
|
direct allocation
|
page read and write
|
||
2A33000
|
heap
|
page read and write
|
||
A3E000
|
heap
|
page read and write
|
||
181A425C000
|
heap
|
page read and write
|
||
A4B5AFE000
|
stack
|
page read and write
|
||
20158329000
|
heap
|
page read and write
|
||
A2D000
|
heap
|
page read and write
|
||
1776000
|
direct allocation
|
page read and write
|
||
1E21BA9B000
|
heap
|
page read and write
|
||
248179E0000
|
heap
|
page read and write
|
||
A4E000
|
heap
|
page read and write
|
||
181A42E5000
|
heap
|
page read and write
|
||
A4E000
|
heap
|
page read and write
|
||
181A4268000
|
heap
|
page read and write
|
||
1A0C0820000
|
heap
|
page read and write
|
||
C000334000
|
direct allocation
|
page read and write
|
||
1E21B7E6000
|
heap
|
page read and write
|
||
15F7000
|
heap
|
page read and write
|
||
34B3000
|
heap
|
page read and write
|
||
1CBD5C16000
|
heap
|
page read and write
|
||
1E21B809000
|
heap
|
page read and write
|
||
16AAE500000
|
direct allocation
|
page read and write
|
||
C000324000
|
direct allocation
|
page read and write
|
||
181A4253000
|
heap
|
page read and write
|
||
C00030C000
|
direct allocation
|
page read and write
|
||
C000362000
|
direct allocation
|
page read and write
|
||
C0000A6000
|
direct allocation
|
page read and write
|
||
156E000
|
heap
|
page read and write
|
||
C000114000
|
direct allocation
|
page read and write
|
||
C000354000
|
direct allocation
|
page read and write
|
||
C000144000
|
direct allocation
|
page read and write
|
||
A4E000
|
heap
|
page read and write
|
||
A4E000
|
heap
|
page read and write
|
||
A2D000
|
heap
|
page read and write
|
||
28F1D285000
|
heap
|
page read and write
|
||
C0000A1000
|
direct allocation
|
page read and write
|
||
A2D000
|
heap
|
page read and write
|
||
A2D000
|
heap
|
page read and write
|
||
C000316000
|
direct allocation
|
page read and write
|
||
C000032000
|
direct allocation
|
page read and write
|
||
181A425C000
|
heap
|
page read and write
|
||
1E21B7F9000
|
heap
|
page read and write
|
||
C000356000
|
direct allocation
|
page read and write
|
||
157C000
|
heap
|
page read and write
|
||
A2D000
|
heap
|
page read and write
|
||
181A425C000
|
heap
|
page read and write
|
||
7F3DA000
|
direct allocation
|
page read and write
|
||
181A426B000
|
heap
|
page read and write
|
||
181A426B000
|
heap
|
page read and write
|
||
A4E000
|
heap
|
page read and write
|
||
A4E000
|
heap
|
page read and write
|
||
28F0000
|
heap
|
page read and write
|
||
181A4275000
|
heap
|
page read and write
|
||
16A88B8E000
|
direct allocation
|
page read and write
|
||
A2C000
|
heap
|
page read and write
|
||
17D7000
|
unkown
|
page read and write
|
||
181A4251000
|
heap
|
page read and write
|
||
28F1EDE0000
|
heap
|
page read and write
|
||
C0000B6000
|
direct allocation
|
page read and write
|
||
A2D000
|
heap
|
page read and write
|
||
1E21BF03000
|
heap
|
page read and write
|
||
A2D000
|
heap
|
page read and write
|
||
181A4275000
|
heap
|
page read and write
|
||
ABE48FE000
|
stack
|
page read and write
|
||
1820000
|
direct allocation
|
page read and write
|
||
4209000
|
direct allocation
|
page read and write
|
||
24817AB7000
|
heap
|
page read and write
|
||
A2D000
|
heap
|
page read and write
|
||
24817AB7000
|
heap
|
page read and write
|
||
28F1D2C2000
|
heap
|
page read and write
|
||
A3E000
|
heap
|
page read and write
|
||
1E21B979000
|
heap
|
page read and write
|
||
1E21BF0A000
|
heap
|
page read and write
|
||
5CFCFCC000
|
stack
|
page read and write
|
||
35EE000
|
direct allocation
|
page read and write
|
||
666A000
|
heap
|
page read and write
|
||
157A000
|
heap
|
page read and write
|
||
C0000A3000
|
direct allocation
|
page read and write
|
||
67559FF000
|
stack
|
page read and write
|
||
15E4000
|
heap
|
page read and write
|
||
181A4309000
|
heap
|
page read and write
|
||
181A4266000
|
heap
|
page read and write
|
||
A2D000
|
heap
|
page read and write
|
||
126E000
|
stack
|
page read and write
|
||
181A425C000
|
heap
|
page read and write
|
||
A4E000
|
heap
|
page read and write
|
||
A2D000
|
heap
|
page read and write
|
||
A4E000
|
heap
|
page read and write
|
||
D6BF74F000
|
stack
|
page read and write
|
||
BFF1BFE000
|
stack
|
page read and write
|
||
14F0000
|
heap
|
page read and write
|
||
A4E000
|
heap
|
page read and write
|
||
181A42CD000
|
heap
|
page read and write
|
||
181A4269000
|
heap
|
page read and write
|
||
181A4286000
|
heap
|
page read and write
|
||
A3E000
|
heap
|
page read and write
|
||
24817AB2000
|
heap
|
page read and write
|
||
C000188000
|
direct allocation
|
page read and write
|
||
A3E000
|
heap
|
page read and write
|
||
3FC6000
|
direct allocation
|
page read and write
|
||
C000058000
|
direct allocation
|
page read and write
|
||
2015834D000
|
heap
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
16A8896C000
|
heap
|
page read and write
|
||
28EB000
|
stack
|
page read and write
|
||
C000122000
|
direct allocation
|
page read and write
|
||
C00015E000
|
direct allocation
|
page read and write
|
||
1270000
|
heap
|
page read and write
|
||
1E21B987000
|
heap
|
page read and write
|
||
C0000E4000
|
direct allocation
|
page read and write
|
||
A2D000
|
heap
|
page read and write
|
||
154B000
|
heap
|
page read and write
|
||
C0000C2000
|
direct allocation
|
page read and write
|
||
A3E000
|
heap
|
page read and write
|
||
579000
|
unkown
|
page write copy
|
||
C000302000
|
direct allocation
|
page read and write
|
||
3D494DD000
|
stack
|
page read and write
|
||
1A0C0720000
|
heap
|
page read and write
|
||
3F80000
|
direct allocation
|
page read and write
|
||
1E21B989000
|
heap
|
page read and write
|
||
C000092000
|
direct allocation
|
page read and write
|
||
3D4955F000
|
stack
|
page read and write
|
||
16A88BF0000
|
heap
|
page read and write
|
||
A4F000
|
heap
|
page read and write
|
||
C000214000
|
direct allocation
|
page read and write
|
||
A3C000
|
heap
|
page read and write
|
||
179E000
|
unkown
|
page write copy
|
||
20158317000
|
heap
|
page read and write
|
||
2FFF000
|
direct allocation
|
page read and write
|
||
C000124000
|
direct allocation
|
page read and write
|
||
1E21BF02000
|
heap
|
page read and write
|
||
23F79890000
|
heap
|
page read and write
|
||
A3E000
|
heap
|
page read and write
|
||
C00012C000
|
direct allocation
|
page read and write
|
||
DC0000
|
unkown
|
page write copy
|
||
C000062000
|
direct allocation
|
page read and write
|
||
30E1000
|
direct allocation
|
page read and write
|
||
A53000
|
heap
|
page read and write
|
||
3084000
|
direct allocation
|
page read and write
|
||
28F1D272000
|
heap
|
page read and write
|
||
19888A60000
|
heap
|
page read and write
|
||
C000045000
|
direct allocation
|
page read and write
|
||
A2D000
|
heap
|
page read and write
|
||
1CBD5C34000
|
heap
|
page read and write
|
||
2FBF000
|
direct allocation
|
page read and write
|
||
3074000
|
direct allocation
|
page read and write
|
||
1CBD5C33000
|
heap
|
page read and write
|
||
1784000
|
direct allocation
|
page read and write
|
||
C000234000
|
direct allocation
|
page read and write
|
||
18A0000
|
heap
|
page read and write
|
||
28F1D2D4000
|
heap
|
page read and write
|
||
A2D000
|
heap
|
page read and write
|
||
A3E000
|
heap
|
page read and write
|
||
A3E000
|
heap
|
page read and write
|
||
24817AB6000
|
heap
|
page read and write
|
||
1A0C0728000
|
heap
|
page read and write
|
||
1E21BF0B000
|
heap
|
page read and write
|
||
28F1D2A2000
|
heap
|
page read and write
|
||
A3E000
|
heap
|
page read and write
|
||
A2D000
|
heap
|
page read and write
|
||
181A4254000
|
heap
|
page read and write
|
||
24817A10000
|
heap
|
page read and write
|
||
A53000
|
heap
|
page read and write
|
||
C00023A000
|
direct allocation
|
page read and write
|
||
17DC000
|
direct allocation
|
page read and write
|
||
16AAE910000
|
direct allocation
|
page read and write
|
||
A2D000
|
heap
|
page read and write
|
||
181A423E000
|
heap
|
page read and write
|
||
DAE000
|
unkown
|
page write copy
|
||
2FF1000
|
direct allocation
|
page read and write
|
||
A2D000
|
heap
|
page read and write
|
||
180B000
|
direct allocation
|
page read and write
|
||
1E21B99A000
|
heap
|
page read and write
|
||
1E21B7D5000
|
heap
|
page read and write
|
||
181A42E3000
|
heap
|
page read and write
|
||
20158620000
|
heap
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
500E000
|
stack
|
page read and write
|
||
1295000
|
heap
|
page read and write
|
||
A2D000
|
heap
|
page read and write
|
||
1590000
|
heap
|
page read and write
|
||
183D000
|
direct allocation
|
page read and write
|
||
C000219000
|
direct allocation
|
page read and write
|
||
C00035C000
|
direct allocation
|
page read and write
|
||
427E000
|
direct allocation
|
page read and write
|
||
A31000
|
unkown
|
page execute read
|
||
248179F0000
|
heap
|
page read and write
|
||
C00033E000
|
direct allocation
|
page read and write
|
||
181A425F000
|
heap
|
page read and write
|
||
3F90000
|
direct allocation
|
page read and write
|
||
C0000B0000
|
direct allocation
|
page read and write
|
||
1E21B7D5000
|
heap
|
page read and write
|
||
A53000
|
heap
|
page read and write
|
||
A2D000
|
heap
|
page read and write
|
||
28F1D292000
|
heap
|
page read and write
|
||
16AAE890000
|
direct allocation
|
page read and write
|
||
A2D000
|
heap
|
page read and write
|
||
16AAE912000
|
direct allocation
|
page read and write
|
||
C0002F4000
|
direct allocation
|
page read and write
|
||
181A42E3000
|
heap
|
page read and write
|
||
181A423A000
|
heap
|
page read and write
|
||
C000348000
|
direct allocation
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
6EE81FE000
|
stack
|
page read and write
|
||
F93000
|
stack
|
page read and write
|
||
C00034E000
|
direct allocation
|
page read and write
|
||
A30000
|
unkown
|
page readonly
|
||
A2D000
|
heap
|
page read and write
|
||
A54000
|
heap
|
page read and write
|
||
2242FAD0000
|
heap
|
page read and write
|
||
2FE3000
|
direct allocation
|
page read and write
|
||
A36000
|
heap
|
page read and write
|
||
CA7A37E000
|
stack
|
page read and write
|
||
55C000
|
stack
|
page read and write
|
||
A3E000
|
heap
|
page read and write
|
||
181A42E3000
|
heap
|
page read and write
|
||
C000330000
|
direct allocation
|
page read and write
|
||
C00027B000
|
direct allocation
|
page read and write
|
||
C000244000
|
direct allocation
|
page read and write
|
||
181A4266000
|
heap
|
page read and write
|
||
1E21BA95000
|
heap
|
page read and write
|
||
181A424F000
|
heap
|
page read and write
|
||
16A889B3000
|
heap
|
page read and write
|
||
C000358000
|
direct allocation
|
page read and write
|
||
1CBD5C34000
|
heap
|
page read and write
|
||
C0000CA000
|
direct allocation
|
page read and write
|
||
181A424B000
|
heap
|
page read and write
|
||
1E21B983000
|
heap
|
page read and write
|
||
664E000
|
stack
|
page read and write
|
||
16A88BB7000
|
direct allocation
|
page read and write
|
||
A52000
|
heap
|
page read and write
|
||
A2D000
|
heap
|
page read and write
|
||
1CBD5BE8000
|
heap
|
page read and write
|
||
A4E000
|
heap
|
page read and write
|
||
181A4244000
|
heap
|
page read and write
|
||
A2D000
|
heap
|
page read and write
|
||
C0002CA000
|
direct allocation
|
page read and write
|
||
17A2000
|
unkown
|
page read and write
|
||
A4E000
|
heap
|
page read and write
|
||
C000192000
|
direct allocation
|
page read and write
|
||
BFF1AFE000
|
stack
|
page read and write
|
||
BFF1B7E000
|
stack
|
page read and write
|
||
181A424B000
|
heap
|
page read and write
|
||
1793000
|
direct allocation
|
page read and write
|
||
A3E000
|
heap
|
page read and write
|
||
A4E000
|
heap
|
page read and write
|
||
1603000
|
heap
|
page read and write
|
||
A3E000
|
heap
|
page read and write
|
||
C000002000
|
direct allocation
|
page read and write
|
||
276B000
|
stack
|
page read and write
|
||
181A4286000
|
heap
|
page read and write
|
||
15F2000
|
heap
|
page read and write
|
||
C00033C000
|
direct allocation
|
page read and write
|
||
A2D000
|
heap
|
page read and write
|
||
C0002D4000
|
direct allocation
|
page read and write
|
||
A3E000
|
heap
|
page read and write
|
||
1590000
|
heap
|
page read and write
|
||
585000
|
unkown
|
page write copy
|
||
A55000
|
heap
|
page read and write
|
||
24817AC2000
|
heap
|
page read and write
|
||
A3E000
|
heap
|
page read and write
|
||
181A4287000
|
heap
|
page read and write
|
||
BFF174B000
|
stack
|
page read and write
|
There are 1181 hidden memdumps, click here to show them.